This is the only pure SW solution in the market.The underlying protection is purely algorithmic and implementation-agnostic. Resistance to attacks was validated analytically and on a physical device. The protection is based on the Threshold Implementation (TI) approach, the security of which has been proven.
Tech Specs
- Part Number HMAC-SHA2-DPA-FIA SW library
- Short description Advanced DPA- and FIA-resistant FortiMac HMAC SHA2 SW library
- Compliant standard FIPS-180-4
- Provider FortifyIQ, Inc.
- Availability Now
Benefits
- Countermeasures against power and electromagnetic analysis attacks by pure SW means
- Can fix unprotected/vulnerable HW solutions already in the field
- Excellent performance