FortiPQC Hardware Solutions

FortiPQC HW provides a comprehensive suite of post-quantum cryptography hardware, including CryptoBoxes, IP cores, and Root-of-Trust modules. Our CryptoBoxes support both classical and post-quantum algorithms, making them ideal for the migration period when interoperability with existing systems is required.

All solutions implement ML-KEM and ML-DSA aligned with NIST PQC standards, are FOTA-updatable to address emerging attacks, feature configurable trade-offs for PPA, and offer certifiable high-assurance resistance to side-channel (SCA) and fault-injection (FIA) attacks.

FortiPQC Hardware IPs

FortiPQC Hardware soft IPs deliver post-quantum cryptography with certifiable resistance to side-channel and fault-injection attacks (SCA/FIA). Implementing ML-KEM and ML-DSA aligned with NIST PQC standards, these cores provide extraordinary PPA, and field-proven physical security.

Architecture & Features

  • Fully implementation-, foundry-, and technology-agnostic.
  • Operates standalone or integrated into CryptoBoxes and Roots of Trust (RoTs).
  • Configurable for performance, power, and area targets.
  • Resistant to side-channel and fault injection attacks.
  • Supports FIPS 140-3 up to Level 4, Common Criteria AVA_VAN.5, SESIP up to Level 5 certification targets.
  • Compatible with FortifyIQ’s unified API, enabling:
Seamless integration with FortiPQC software libraries
OTA updates of post-quantum algorithms without redesigning deployed hardware
Simplified migration from classical to post-quantum cryptography
Flexible combination of hardware and software security layers

Use Cases:
FortiPQC Hardware soft IPs

FortiPQC hardware soft IPs provide post-quantum, SCA/FIA-resistant security with exceptional Power-Performance-Area (PPA) and full design portability. They integrate seamlessly into any semiconductor platform, from cost-constrained embedded devices to advanced data-center and multi-chip systems.

General-Purpose and Custom Silicon

Easily integrated into any ASIC, SoC, or FPGA.

Roots of Trust and Secure Elements

Combine PQC with AES, HMAC-SHA2, and RSA/ECC for complete high-assurance cryptography.

Edge, IoT, and Industrial Devices

Compact, low-power configurations maintaining real-time performance.

Cloud, Telecom, and Data Infrastructure

Hardware acceleration for PQ key exchange and signatures at scale.

Defense, Aerospace, and Critical Systems

Optional radiation-tolerant builds for long-term and harsh-environment resilience.

Long-Lifecycle Devices

Future-proof protection ensuring confidentiality and integrity of data over decades.

Features excellent PPA efficiency with robust protection against side-channel and fault-injection attacks.



Tunable to each deployment’s needs.
Ideal for future-proof security in embedded systems, chips, and chiplets.

Hybrid PQC and Classical Crypto (PQ-CryptoBox Hybrid)

FortifyIQ’s CryptoBoxes and Roots of Trust (RoTs) integrate post-quantum (ML-KEM/ML-DSA) and classical cryptography (AES, HMAC, PKA) in a unified, high-assurance architecture. This hybrid approach allows secure coexistence and gradual migration to post-quantum cryptography while maintaining interoperability with existing infrastructure.

Architecture & Features

  • Combines PQC and classical algorithms in one hardware or mixed hardware & software module
  • Implementation-, foundry-, and technology-agnostic (soft IP cores)
  • Tunable for device- and industry-specific requirements
  • Matches naive PQC hardware implementations in performance and latency
  • Resistant to side-channel and fault-injection attacks, certifiable to FIPS 140-3 up to Level 4, Common Criteria AVA_VAN.5, SESIP up to Level 5
  • Benefits from the unified API, enabling:
Firmware-OTA (FOTA) updates of PQC algorithms on hybrid modules
Flexibility to combine HW and SW for optimal performance and efficiency
Consistent deployment interface across hardware, software, or hybrid architectures
Future-proof upgrades as new PQC algorithms or countermeasures become available

Use Cases:

  • High-assurance chiplets and SoCs requiring hybrid cryptography support
  • CryptoBoxes and RoTs for cloud, edge, and embedded security
  • Gradual migration from classical to post-quantum cryptography
  • Systems requiring dual-protection for regulatory compliance and high-assurance operations
  • Aerospace and defense applications requiring flexible and radiation-tolerant hybrid cryptography

Features excellent PPA efficiency with robust protection against side-channel and fault-injection attacks.



Tunable to each deployment’s needs.
Ideal for future-proof security in embedded systems, chips, and chiplets.

Hybrid: Classical + Post-Quantum Cryptographic Solutions

Datasheets available upon request

Delivers exceptional power, performance, and area efficiency while supporting both classical public-key cryptography (RSA, ECC) and post-quantum algorithms (ML-KEM, ML-DSA).

Their flexible architecture unifies key exchange, digital signatures, authenticated encryption, secure boot, and firmware updates, with advanced protections against side-channel and fault injection attacks, providing a secure, future-proof foundation for long life-cycle applications.

Integrated Secure Crypto Subsystems

Datasheets available upon request
Datasheets available upon request

Family of fully customisable Roots of Trust designed for a wide range of applications. All RoTs are hardened against side-channel and fault injection attacks, ensuring strong security even in highly constrained or hostile environments.

The portfolio includes specialized variants for IoT, cloud, chiplets, general-purpose (balanced), and edge AI, providing flexible integration and performance trade-offs to suit your system requirements. FortifyIQ RoTs are fully compatible with Caliptra, supporting robust cryptographic operations, secure key management, and on-the-fly encryption where applicable.

Root-of-Trust IP

FIQ-RoT01B
Edge AI – Balanced
FIQ-RoT02F
Cloud – Fast
FIQ-RoT03C
IoT – Compact
FIQ-RoT04B
Chiplet – Balanced
FIQ-RoT05B
General Purpose – Balanced
Datasheets available upon request
Datasheets available upon request

Discover FortiPQC Software Libraries

We’re here to help you unlock the potential of AI at the edge.
Fortify’s AES security evaluation by SGS

“Summary. The leakage analysis (Welch t-test) on over 30 million traces did not show statistically significant first- and second-order differences between trace sets with fixed and random inputs. The template-based DPA analysis, on the pseudo-random trace set for the profiling phase (15 million traces) and on a sub-set of 300k fix input traces for matching phase targeting the first-round S-box output, and template attack on ciphertext, did not indicate any potential information leakage.”

” The results for the soft IP presented in the report were obtained on the TOE which is the basic hardware implementation of the soft IP without additional levels of security (e.g. that are present in a secure silicon layout). Therefore the internal strength of the soft IP itself was evaluated. This indicates that the investigated features and parameters of the soft IP implementation should be robust against SCA and fault injection attacks in different implementations including ASIC. Nevertheless, according to the Common Criteria rules, the strength of the final composite product must be evaluated on its own.”

Request Technical Details