Analyze side-channel vulnerability in your hardware before you build it.

FortifyIQ's trace analysis tool, TraceIQ, automatically extracts cryptographic keys from power traces of target devices. The keys correspond to a collection of test data consisting of pairs of plain and cipher texts. In addition, TraceIQ highlights hardware design issues that cause information leakage.

  • The types and instances of the cells with leaks
  • Which clock pulses or cycles are problematic
  • Design stability in the presence of glitches
  • And more

TraceIQ can process actual traces from physical hardware or simulated traces from virtual models, such as when using TraceIQ with FortifyIQ's power consumption simulator, PowerIQ. Traces can be provided in the standard oscilloscope format (LeCroy) or in a format defined by the user with the help of simple syntax. Analysis of the results can be presented as a key value with a report on how it was extracted – both visually in a graph (illustrating leaks) and in a report.

TraceIQ carries out its analysis based on known side-channel attack strategies, including the classic Differential Power Analysis (DPA) attack, the split-flow attack by Moradi, the template attack, as well as a growing library of attacks discovered or created by FortifyIQ.

TraceIQ Highlights:

TraceIQ supports all widely used symmetric encryption algorithms.

TraceIQ can support new encryption algorithms as they become available, without recompilation, by way of a simple plug-in.

TraceIQ includes a tool for easy generation of custom test data (pairs of plain and cipher texts) or, alternatively, you can use test data generated with your own tools.

TraceIQ lets you mount HO-DPA attacks, i.e., attacks using multiple data sources and different time offsets.

TraceIQ has a tool and simple language that let you define hypotheses about the manipulation of a cryptographic key and data to see if the hypotheses correlate with power consumption.
The program automatically stops analyzing traces when it determines it has enough information to unambiguously find the secret key.

The program can process an enormous collection of trace files.

If the program is stopped for any reason, it can resume at the spot where it was interrupted or just before, as needed.

A multithreaded architecture automatically optimizes the analysis based on the capabilities of any host system.
Users find TraceIQ more effective and flexible than competing approaches. Its ease of use makes it ideal for occasional users while numerous options are available for expert users looking to optimize the system for complex cases. FortifyIQ's experts are always available for consultations about ways to maximize the utility of the system for your particular application.