Secure Software Cryptography
For Real-World Devices
FortifyIQ’s cryptographic software libraries bring high-assurance security to devices that can’t rely on hardware protection — whether due to cost constraints or field deployment.
Our hardened AES and HMAC-SHA2 libraries, engineered to resist side-channel and fault-injection attacks (SCA/FIA), are designed for high throughput and proven in mass market deployment. Asymmetric crypto (ECC, RSA) and PQC (coming soon) hardened against SCA/FIA is also offered in software.
Request Technical Details
Our hardened AES and HMAC-SHA2 libraries, engineered to resist side-channel and fault-injection attacks (SCA/FIA), are designed for high throughput and proven in mass market deployment. Asymmetric crypto (ECC, RSA) and PQC (coming soon) hardened against SCA/FIA is also offered in software.
Why Choose FortifyIQ?
Physically Hardened Software
Based on patented algorithmic SCA/FIA countermeasures, not statistical tricks or obfuscation.
High Performance
Up to 100 Mbps on a 1.2 GHz ARM CPU; up to 900 Mbps on a 3.4 GHz laptop.
Processor-Agnostic
Compatible across all major processor architectures — including ARM, RISC-V, x86, DSPs, MCUs, MPUs, and CPUs — via OTA (Over-the-Air) download.
No hardware crypto or secure enclave required.
Security-Proven Algorithms
Validated in SW to meet the highest standards of resistance to physical and cache attacks.
Security Compliance
Meets the security requirements of FIPS 140-3 and Common Criteria at all levels, including AVA_VAN.5.
Field-Upgradable
Secures devices with vulnerable or limited hardware, including cost-sensitive and already-deployed systems by OTA (Over The Air) download.
Active Attack Response
The optional detection of fault injection even when no code modification occurs, triggering shutdown or zeroization.
Asymmetric Cryptography
Side-channel and fault-injection protected public-key cryptography, and PQC (Kyber, Dilithium). For secure boot, key exchange, and digital signatures.
(SCA/FIA-hardened PQC coming soon.)
Why Choose FortifyIQ?
Physically Hardened Software
Based on patented algorithmic SCA/FIA countermeasures, not statistical tricks or obfuscation.
High Performance
Up to 100 Mbps on a 1.2 GHz ARM CPU; up to 900 Mbps on a 3.4 GHz laptop.
Processor-Agnostic
Compatible across all major processor architectures — including ARM, RISC-V, x86, DSPs, MCUs, MPUs, and CPUs — via OTA (Over-the-Air) download. No hardware crypto or secure enclave required.
Security-Proven Algorithms
Security Compliance
Meets the security requirements of FIPS 140-3 and Common Criteria at all levels, including AVA_VAN.5.
Field-Upgradable
Secures devices with vulnerable or limited hardware, including cost-sensitive and already-deployed systems by OTA (Over The Air) download.
Active Attack Response
The optional detection of fault injection even when no code modification occurs, triggering shutdown or zeroization.
Asymmetric Support, including PQC
Side-channel and fault-injection protected public-key cryptography, and PQC (Kyber, Dilithium). For secure boot, key exchange, and digital signatures.
(SCA/FIA-hardened PQC coming soon.)
Cryptographic Software Libraries
For legacy, cost-sensitive, or already-deployed platforms that lack hardware crypto.
Secure message authentication with the same high resistance to physical attacks
Asymmetric Cryptographic Libraries
Where Asymmetric and PQC Software Crypto Fits
FortifyIQ’s hardened asymmetric libraries, including PQC are designed for security-critical operations when performance is not a limiting factor. (AES and HMAC are inherently resistant to quantum attacks with appropriate key sizes.)
Hardened Public Key (ECC, RSA, etc.) cryptography in — for secure boot, and key exchange on platforms without hardware accelerators
Hardened post-quantum cryptography in software for secure boot, and key exchange on platforms without hardware accelerators
Use Cases
Legacy Devices
Add security through software upgrades when hardware changes aren’t possible
IoT Nodes
Add SCA/FIA resilience to ultra-low-power or low-cost designs
Automotive ECUs
Meet the security requirements of ISO/SAE 21434 and R155 via software
Medical Devices
Protect data and safety-critical functionality without hardware redesign
Consumer Electronics
Harden digital content decryption on legacy processors
Legacy Devices
Add security through software upgrades when hardware changes aren’t possible
IoT Nodes
Add SCA/FIA resilience to ultra-low-power or low-cost designs
Automotive ECUs
Meet the security requirements of ISO/SAE 21434 and R155 via software
Medical Devices
Protect data and safety-critical functionality without hardware redesign
Consumer Electronics
Harden digital content decryption on legacy processors
Proven in Deployment
Our software libraries are already deployed in large-scale consumer applications, such as UHD content decryption on a legacy 1 GHz CPU with limited cache, where real-time performance is essential and traditional software crypto fails to deliver.
Regulatory-Ready Security
FortifyIQ’s libraries are built to meet the most demanding global security requirements:
FIPS 140-3 Levels 3,4-aligned (for side-channel and fault injection resilience)
Common Criteria and SESIP compliant at all levels, rigorously validated to highest cryptographic security levels
Support cryptographic security compliance with EN 303 645, IEC 62443, R155/R156, HIPAA, and more
Ready to Secure
Your Devices Today?
FortifyIQ’s software cryptography brings high-performance, physically hardened security to devices that can’t afford speci-alized hardware — but can’t afford to be unprotected.