This section features FortifyIQ's academic publications, presenting AES protection techniques against side-channel and fault injection attacks and side-channel attacks on SHA-2-based HMAC.
Learn MoreHigh-assurance cryptographic implementations of AES, HMAC, PKA, PQC, CryptoBox, and Root-of-Trust families, plus software libraries, all exceptionally efficient (PPA-optimized).
See MoreProvide high-assurance cryptographic protection, engineered for AVA_VAN.5 compliance and designed for high-security certification.
Secures both new and already-deployed devices, including those without hardware countermeasures, and is proven in millions of systems.
Provides ultra-strong protection against SCA, FIA, and cache attacks.
What are side-channel and fault-injection attacks, and why would your device need protection against them? Etc.
Provides a comprehensive suite of post-quantum cryptography hardware, including CryptoBoxes, IP cores, and Root-of-Trust modules.
Provide high-assurance cryptographic protection, engineered for AVA_VAN.5 compliance and designed for high-security certification.
CryptoBoxes and Roots of Trust (RoTs) integrate post-quantum and classical cryptography in a unified, high-assurance architecture.
Why post-quantum cryptography matters? Etc.
The most popular myths and facts about post-quantum cryptography.
Enables engineers to evaluate and strengthen hardware designs against fault injection attacks, e.g., DFA, SIFA, and AFA.
Pre-silicon EDA tool suite designed to identify, analyze, and mitigate side-channel vulnerabilities in hardware designs from RTL.
Mathematically sound and practically validated patented/patent-pending countermeasures, ensuring resistance to the most advanced physical attacks.
Mathematically sound and practically validated patented/patent-pending countermeasures, ensuring resistance to the most advanced physical attacks.
How does FortifyIQ validate resistance to side-channel and fault-injection attacks? Etc.
Resilient cryptographic protection for payment systems, digital banking, and secure financial infrastructure.
Secure cryptographic foundations for identity systems, defense infrastructure, and digital government platforms.
From payment cards to e-passports, SIMs, and digital ID tokens, smart cards and digital identity solutions power critical transactions.
Securing network infrastructure, subscriber identity, and cloud-native telecommunication systems.
Automotive Cybersecurity IPs and Tools for ECUs, ADAS, AV and In-Vehicle-Infotainment (IVI) Systems.
Robust, certifiable security solutions for next-generation industrial automation and control systems.
Cryptographic security tailored to the needs of energy systems: robust protection against side-channel and fault injection attacks.
Safeguarding energy, water, and transportation systems with certifiable hardware and software security.
Cryptographic protection engineered for the longevity, safety, and regulatory demands of rail and transportation systems.
Ultra-high-throughput, physically secure cryptographic IP for cloud and data center silicon.
Cryptographic protection for IoT systems, with unmatched resistance to side-channel analysis and fault injection attacks.
Secure cryptography and OTA updates for ultra-constrained, mission-critical medical electronics.
Robust, efficient cryptographic protections for media platforms that resist real-world physical attacks with minimal performance tradeoffs.
Cryptographic solutions purpose-built for silicon IP protection, licensing enforcement, and clone detection.
In healthcare, we provide comprehensive cryptographic solutions — from traditional to post-quantum cryptography.
This section features FortifyIQ's academic publications, presenting AES protection techniques against side-channel and fault injection attacks and side-channel attacks on SHA-2-based HMAC.
Learn MoreThis section demonstrates how FortifyIQ validates cryptographic solutions, compares ours against other secure cores, and showcases FortiEDA for evaluating and developing secure designs.
Learn MoreOur explanatory videos break down complex hardware security concepts into clear, visual stories, showcasing how FortifyIQ's technologies detect and prevent side-channel and fault-injection attacks.
Learn MorePioneers in hardware-based security innovation, combining cutting-edge cryptography with advanced defense mechanisms, dedicated to safeguarding the digital world’s most critical assets.
Learn MoreOur services ensure that security, performance, power, and area are balanced optimally, without compromising certifiable high-assurance protection against side-channel and fault-injection attacks.
Learn MoreAt FortifyIQ, our R&D team is a unique blend of industry veterans with deep expertise in mathematics and cybersecurity, alongside talented young engineers who bring fresh perspectives and innovative thinking.
Learn MoreWe seek exceptional individuals who are passionate about tackling the toughest challenges facing hardware manufacturers today and ready to take on whatever comes next.
Join UsFortifyIQ’s cryptographic software libraries deliver high-assurance protection for devices that lack dedicated hardware security, are already in the field, or need secure execution in sensitive applications.
The stack includes AES, HMAC-SHA2, ECC, RSA, and post-quantum algorithms (PQC), all hardened against side-channel and fault injection attacks (SCA/FIA), highly configurable, and optimized for high throughput. A unified API ensures seamless integration with hardware IPs, enabling flexible deployment from legacy devices to high-security systems
Our hardened AES and HMAC-SHA2 libraries, engineered to resist side-channel and fault-injection attacks (SCA/FIA), are designed for high throughput and proven in mass market deployment. Asymmetric crypto (ECC, RSA) and PQC (coming soon) hardened against SCA/FIA is also offered in software.
Based on patented algorithmic SCA/FIAprotections, not statistical tricks or obfuscation.
FortiAES-SW achieves up to 100 Mbps on a 1.2 GHz ARM CPU; up to 900 Mbps on a 3.4 GHz laptop.
Compatible across all major processor architectures — including ARM, RISC-V, x86, DSPs, MCUs, MPUs, and CPUs — via OTA (Over-the-Air) download.
No hardware crypto or secure enclave required for implementation.
Proven in hardware implementations, and validated in SW to meet the highest standards of resistance to physical and cache attacks.
Meets the security requirements of FIPS 140-3 and Common Criteria at all levels, including AVA_VAN.5.
Secures devices with vulnerable or limited hardware, including cost-sensitive and already-deployed systems by OTA (Over The Air) download.
The detection of fault injection even when no code modification occurs.
Side-channel and fault-injection protected public-key cryptography, and PQC. For secure boot, key exchange, and digital signatures.
Based on patented algorithmic SCA/FIA countermeasures, not statistical tricks or obfuscation.
Up to 100 Mbps on a 1.2 GHz ARM CPU; up to 900 Mbps on a 3.4 GHz laptop.
Compatible across all major processor architectures — including ARM, RISC-V, x86, DSPs, MCUs, MPUs, and CPUs — via OTA (Over-the-Air) download. No hardware crypto or secure enclave required.
Meets the security requirements of FIPS 140-3 and Common Criteria at all levels, including AVA_VAN.5.
Secures devices with vulnerable or limited hardware, including cost-sensitive and already-deployed systems by OTA (Over The Air) download.
The optional detection of fault injection even when no code modification occurs, triggering shutdown or zeroization.
Side-channel and fault-injection protected public-key cryptography, and PQC (Kyber, Dilithium). For secure boot, key exchange, and digital signatures.
(SCA/FIA-hardened PQC coming soon.)
Where Asymmetric and PQC Software Crypto Fits
FortifyIQ’s hardened asymmetric libraries, including PQC are designed for security-critical operations when performance is not a limiting factor. (AES and HMAC are inherently resistant to quantum attacks with appropriate key sizes.)
Hardened Public Key (ECC, RSA, etc.) cryptography in — for secure boot, and key exchange on platforms without hardware accelerators
Hardened post-quantum cryptography in software for secure boot, and key exchange on platforms without hardware accelerators
Add security through software upgrades when hardware changes aren’t possible
Meet the security requirements of ISO/SAE 21434 and R155 via software
Protect data and safety-critical functionality without hardware redesign
Harden digital content decryption on legacy processors
Add security through software upgrades when hardware changes aren’t possible
Add SCA/FIA resilience to ultra-low-power or low-cost designs
Meet the security requirements of ISO/SAE 21434 and R155 via software
Protect data and safety-critical functionality without hardware redesign
Harden digital content decryption on legacy processors
Our software libraries are already deployed in large-scale consumer applications, such as UHD content decryption on a legacy 1 GHz CPU with limited cache, where real-time performance is essential and traditional software crypto fails to deliver.
FortifyIQ’s libraries are built to meet the most demanding global security requirements:
FIPS 140-3 Levels 3,4-aligned (for side-channel and fault injection resilience)
Common Criteria and SESIP compliant at all levels, rigorously validated to highest cryptographic security levels
Support cryptographic security compliance with EN 303 645, IEC 62443, R155/R156, HIPAA, and more
FortifyIQ’s software cryptography brings high-performance, physically hardened security to devices that can’t afford speci-alized hardware — but can’t afford to be unprotected.