This section features FortifyIQ's academic publications, presenting AES protection techniques against side-channel and fault injection attacks and side-channel attacks on SHA-2-based HMAC.
Learn MoreHigh-assurance cryptographic implementations of AES, HMAC, PKA, PQC, CryptoBox, and Root-of-Trust families, plus software libraries, all exceptionally efficient (PPA-optimized).
See MoreProvide high-assurance cryptographic protection, engineered for AVA_VAN.5 compliance and designed for high-security certification.
Secures both new and already-deployed devices, including those without hardware countermeasures, and is proven in millions of systems.
Provides ultra-strong protection against SCA, FIA, and cache attacks.
What are side-channel and fault-injection attacks, and why would your device need protection against them? Etc.
Provides a comprehensive suite of post-quantum cryptography hardware, including CryptoBoxes, IP cores, and Root-of-Trust modules.
Provide high-assurance cryptographic protection, engineered for AVA_VAN.5 compliance and designed for high-security certification.
CryptoBoxes and Roots of Trust (RoTs) integrate post-quantum and classical cryptography in a unified, high-assurance architecture.
Why post-quantum cryptography matters? Etc.
The most popular myths and facts about post-quantum cryptography.
Enables engineers to evaluate and strengthen hardware designs against fault injection attacks, e.g., DFA, SIFA, and AFA.
Pre-silicon EDA tool suite designed to identify, analyze, and mitigate side-channel vulnerabilities in hardware designs from RTL.
Mathematically sound and practically validated patented/patent-pending countermeasures, ensuring resistance to the most advanced physical attacks.
Mathematically sound and practically validated patented/patent-pending countermeasures, ensuring resistance to the most advanced physical attacks.
How does FortifyIQ validate resistance to side-channel and fault-injection attacks? Etc.
Resilient cryptographic protection for payment systems, digital banking, and secure financial infrastructure.
Secure cryptographic foundations for identity systems, defense infrastructure, and digital government platforms.
From payment cards to e-passports, SIMs, and digital ID tokens, smart cards and digital identity solutions power critical transactions.
Securing network infrastructure, subscriber identity, and cloud-native telecommunication systems.
Automotive Cybersecurity IPs and Tools for ECUs, ADAS, AV and In-Vehicle-Infotainment (IVI) Systems.
Robust, certifiable security solutions for next-generation industrial automation and control systems.
Cryptographic security tailored to the needs of energy systems: robust protection against side-channel and fault injection attacks.
Safeguarding energy, water, and transportation systems with certifiable hardware and software security.
Cryptographic protection engineered for the longevity, safety, and regulatory demands of rail and transportation systems.
Ultra-high-throughput, physically secure cryptographic IP for cloud and data center silicon.
Cryptographic protection for IoT systems, with unmatched resistance to side-channel analysis and fault injection attacks.
Secure cryptography and OTA updates for ultra-constrained, mission-critical medical electronics.
Robust, efficient cryptographic protections for media platforms that resist real-world physical attacks with minimal performance tradeoffs.
Cryptographic solutions purpose-built for silicon IP protection, licensing enforcement, and clone detection.
In healthcare, we provide comprehensive cryptographic solutions — from traditional to post-quantum cryptography.
This section features FortifyIQ's academic publications, presenting AES protection techniques against side-channel and fault injection attacks and side-channel attacks on SHA-2-based HMAC.
Learn MoreThis section demonstrates how FortifyIQ validates cryptographic solutions, compares ours against other secure cores, and showcases FortiEDA for evaluating and developing secure designs.
Learn MoreOur explanatory videos break down complex hardware security concepts into clear, visual stories, showcasing how FortifyIQ's technologies detect and prevent side-channel and fault-injection attacks.
Learn MorePioneers in hardware-based security innovation, combining cutting-edge cryptography with advanced defense mechanisms, dedicated to safeguarding the digital world’s most critical assets.
Learn MoreOur services ensure that security, performance, power, and area are balanced optimally, without compromising certifiable high-assurance protection against side-channel and fault-injection attacks.
Learn MoreAt FortifyIQ, our R&D team is a unique blend of industry veterans with deep expertise in mathematics and cybersecurity, alongside talented young engineers who bring fresh perspectives and innovative thinking.
Learn MoreWe seek exceptional individuals who are passionate about tackling the toughest challenges facing hardware manufacturers today and ready to take on whatever comes next.
Join Us
FortifyIQ delivers cryptographic IP and software libraries, and roots of trust that are validated, documented, and can be configured to help your products meet even the highest standards of security and regulatory compliance. Using our advanced EDA tools and closely guided integration support, we ensure that the protections validated in our labs are preserved in your actual devices. This approach gives you a trusted foundation for NIST FIPS 140-3 level 4, Common Criteria up to EAL6+, and industry-specific certifications, while reducing the complexity, time, and cost of achieving compliance. Together, these validations give customers the confidence that FortifyIQ technology provides enduring security for today and tomorrow, including the post-quantum era.
It’s a comprehensive framework for verifying that all FortifyIQ software libraries and hardware IPs meet the highest security and compliance requirements. We combine rigorous practical attacks, statistical leakage testing (TVLA), formal proofs in simulation, on an FPGA board, and in silicon (where applicable), and third-party lab validations to ensure resilience against side-channel (SCA) and fault-injection (FIA) attacks, as well as software-level cache attacks. All solutions are engineered to meet or exceed even NIST FIPS 140-3 level 4, Common Criteria AVA_VAN.5, and other industry standards.
Validation is performed using FortifyIQ’s advanced EDA platform, FortiEDA, which supports massive side-channel trace acquisition. Using these traces, we validate our designs through TVLA statistical assessment and by executing a full range of side-channel and fault-injection (SCA and FIA) attacks against our own implementations. We then validate on FPGA boards and, when appropriate, in silicon. Where applicable, we also employ third-party evaluations. For example, our AES algorithm was validated at the highest security level by the Common Criteria–accredited SGS Brightsight laboratory.
Examples:
In simple terms, if there is no leakage, there is nothing for an attacker to exploit, and side-channel attacks become impossible. More technically, our pre-silicon assessment applies the same statistical tests used by accredited evaluation labs for FIPS 140-3 and Common Criteria certification. Because the results are validated against real device measurements, a non-leaking outcome in our pre-silicon analysis demonstrates that the design should remain secure post-fabrication.
FortifyIQ solutions are designed to simplify certification and meet security standards:
Yes. Official certification requires an accredited third-party evaluation. We provide full documentation to make this easier:
Our documentation package accelerates audits and reduces the risk and cost of certification.
A table is provided at the bottom of this page. These certifications provide a certified, standards-based cryptographic foundation. For example:
FortifyIQ products cover the cryptographic and RoT components, which are usually the most technically challenging parts of compliance.
Governments, financial institutions, and critical infrastructure sectors are moving toward mandatory deployment of post-quantum cryptography (PQC) in the coming decade.
FortifyIQ provides both hardware and software PQC implementations that are fully SCA/FIA resistant, giving customers a secure foundation for future-proof compliance.
Today, there are no regulations that mandate PQC specifically for the semiconductor design/IP sector of the industry. However, several application industries already face binding timelines:
Government & Defense (U.S.) – Federal agencies must follow NIST PQC standards (FIPS 203–205), with migration milestones under NSM-10 and CNSA 2.0, beginning in 2026 and extending through 2035.
Financial Institutions – Regulators and industry bodies (e.g., FFIEC in the U.S., ECB in Europe) are signaling PQC adoption requirements, since banking is part of critical infrastructure.
Critical Infrastructure & Energy (EU) – The EU PQC roadmap requires Member States to begin migration by 2026 and secure critical infrastructure with PQC by 2030.
Telecom & Automotive – Early draft standards already call for PQC-ready security in connected devices and networks.
FortifyIQ offers PQC-protected IP cores and assessment tools, scheduled to be ready by the end of 2025. This ensures our customers can meet upcoming mandates across these regulated sectors well before enforcement deadlines.
Our hardware portfolio includes an SCA/FIA-resistant ECC/RSA + PQC IP core and the FortifyIQ Cryptobox, which unifies SCA/FIA-protected AES, HMAC, ECC/RSA, and PQC within one architecture. These hardware IPs fully support hybrid classical + PQC schemes (ML-KEM, ML-DSA) and include integration support for secure migration and key-parameter choices. Our software libraries provide the same ECC/RSA and PQC algorithms, also with SCA/FIA resistance, for deployment on existing devices.
AES-256 and HMAC-512 are inherently quantum-safe.
Many FortifyIQ products are certification-ready, aligning with FIPS 140-3, Common Criteria, and other relevant standards. While not all products ship with certification, they are validated and documented to enable rapid certification in customer deployments.
Customers receive:
We offer the following services:
Power Analysis
Electromagnetic Analysis
Timing and Information-Theoretic Attacks
Electrical / Optical Faults
Statistical / Safe-Error Faults
Yes. FortifyIQ offers access to its Side-Channel Studio and Fault Injection Studio as a service. Customers can license these EDA tools to perform TVLA testing and run practical SCA/FIA attacks.
FortifyIQ Compliance Matrix
FortifyIQ products are built to meet the most stringent global security standards (while each product is configurable to meet your specific assurance and PPA needs). Internal validation has been performed according to CC AVA_VAN.5 methodology and FIPS 140-3 Level 3/4 requirements. External certifications (Common Criteria EAL, FIPS 140-3 CMVP) are supported on customer request.
Symmetric Cryptography
AES (HW & SW)
AVA_VAN.5
FIPS 197, FIPS 140-3 L4
SO/IEC 18033-3, ISO/IEC 19790
SP 800-38A, 38C, 38D/G
HMAC-SHA2 (HW & SW)
AVA_VAN.5
FIPS 198-1, FIPS 180-4, FIPS 140-3 L4
ISO/IEC 10118-3, 9797-2, 19790
SP 800-107, 56C, 185
Asymmetric Cryptography
PKA (HW & SW, RSA/ECC)
AVA_VAN.5
FIPS 186-5, FIPS 140-3 L4
ISO/IEC 14888, 15946
SP 800-56A/B, 57, 131A
PQC (HW & SW, KEM/DSA)
AVA_VAN.5
FIPS 140-3 (PQC profiles)
ISO/IEC 18033-6 draft, 14888-3/4
SP 800-208, NIST PQC (ML-KEM, ML-DSA)
Platforms & Tools
Roots of Trust (RoT)
AVA_VAN.5
FIPS 140-3 L4, FIPS 186-5, SP 800-90 RNGs
ISO/IEC 19790, 15408, 11770
SP 800-57, 90, 63, 193
Cryptobox IP (AES, HMAC, PKA, PQC)
AVA_VAN.5
FIPS 140-3 L4 composite
ISO/IEC 19790, 11770, 14888, 18033
SP 800-56, 57, 131A, PQC suite
EDA Tools (SCA/FIA Evaluation)
Supports AVA_VAN.5
Pre-certification support for FIPS 140-3 L4
ISO/IEC 15408-3, 17825
SP 800-90B, 140C/D/E
Ask us!