FortifyIQ delivers cryptographic IP and software libraries, and roots of trust that are validated, documented, and can be configured to help your products meet even the highest standards of security and regulatory compliance. Using our advanced EDA tools and closely guided integration support, we ensure that the protections validated in our labs are preserved in your actual devices. This approach gives you a trusted foundation for NIST FIPS 140-3 level 4, Common Criteria up to EAL6+, and industry-specific certifications, while reducing the complexity, time, and cost of achieving compliance. Together, these validations give customers the confidence that FortifyIQ technology provides enduring security for today and tomorrow, including the post-quantum era.
It’s a comprehensive framework for verifying that all FortifyIQ software libraries and hardware IPs meet the highest security and compliance requirements. We combine rigorous practical attacks, statistical leakage testing (TVLA), formal proofs in simulation, on an FPGA board, and in silicon (where applicable), and third-party lab validations to ensure resilience against side-channel (SCA) and fault-injection (FIA) attacks, as well as software-level cache attacks. All solutions are engineered to meet or exceed even NIST FIPS 140-3 level 4, Common Criteria AVA_VAN.5, and other industry standards.
Validation is performed using FortifyIQ’s advanced EDA platform, FortiEDA, which supports massive side-channel trace acquisition. Using these traces, we validate our designs through TVLA statistical assessment and by executing a full range of side-channel and fault-injection (SCA and FIA) attacks against our own implementations. We then validate on FPGA boards and, when appropriate, in silicon. Where applicable, we also employ third-party evaluations. For example, our AES algorithm was validated at the highest security level by the Common Criteria–accredited SGS Brightsight laboratory.
Examples:
In simple terms, if there is no leakage, there is nothing for an attacker to exploit, and side-channel attacks become impossible. More technically, our pre-silicon assessment applies the same statistical tests used by accredited evaluation labs for FIPS 140-3 and Common Criteria certification. Because the results are validated against real device measurements, a non-leaking outcome in our pre-silicon analysis demonstrates that the design should remain secure post-fabrication.
FortifyIQ solutions are designed to simplify certification and meet security standards:
Yes. Official certification requires an accredited third-party evaluation. We provide full documentation to make this easier:
Our documentation package accelerates audits and reduces the risk and cost of certification.
A table is provided at the bottom of this page. These certifications provide a certified, standards-based cryptographic foundation. For example:
FortifyIQ products cover the cryptographic and RoT components, which are usually the most technically challenging parts of compliance.
Governments, financial institutions, and critical infrastructure sectors are moving toward mandatory deployment of post-quantum cryptography (PQC) in the coming decade.
FortifyIQ provides both hardware and software PQC implementations that are fully SCA/FIA resistant, giving customers a secure foundation for future-proof compliance.
Today, there are no regulations that mandate PQC specifically for the semiconductor design/IP sector of the industry. However, several application industries already face binding timelines:
Government & Defense (U.S.) – Federal agencies must follow NIST PQC standards (FIPS 203–205), with migration milestones under NSM-10 and CNSA 2.0, beginning in 2026 and extending through 2035.
Financial Institutions – Regulators and industry bodies (e.g., FFIEC in the U.S., ECB in Europe) are signaling PQC adoption requirements, since banking is part of critical infrastructure.
Critical Infrastructure & Energy (EU) – The EU PQC roadmap requires Member States to begin migration by 2026 and secure critical infrastructure with PQC by 2030.
Telecom & Automotive – Early draft standards already call for PQC-ready security in connected devices and networks.
FortifyIQ offers PQC-protected IP cores and assessment tools, scheduled to be ready by the end of 2025. This ensures our customers can meet upcoming mandates across these regulated sectors well before enforcement deadlines.
Our hardware portfolio includes an SCA/FIA-resistant ECC/RSA + PQC IP core and the FortifyIQ Cryptobox, which unifies SCA/FIA-protected AES, HMAC, ECC/RSA, and PQC within one architecture. These hardware IPs fully support hybrid classical + PQC schemes (ML-KEM, ML-DSA) and include integration support for secure migration and key-parameter choices. Our software libraries provide the same ECC/RSA and PQC algorithms, also with SCA/FIA resistance, for deployment on existing devices.
AES-256 and HMAC-512 are inherently quantum-safe.
Many FortifyIQ products are certification-ready, aligning with FIPS 140-3, Common Criteria, and other relevant standards. While not all products ship with certification, they are validated and documented to enable rapid certification in customer deployments.
Customers receive:
We offer the following services:
Power Analysis
Electromagnetic Analysis
Timing and Information-Theoretic Attacks
Electrical / Optical Faults
Statistical / Safe-Error Faults
Yes. FortifyIQ offers access to its Side-Channel Studio and Fault Injection Studio as a service. Customers can license these EDA tools to perform TVLA testing and run practical SCA/FIA attacks.
FortifyIQ Compliance Matrix
FortifyIQ products are built to meet the most stringent global security standards (while each product is configurable to meet your specific assurance and PPA needs). Internal validation has been performed according to CC AVA_VAN.5 methodology and FIPS 140-3 Level 3/4 requirements. External certifications (Common Criteria EAL, FIPS 140-3 CMVP) are supported on customer request.
Symmetric Cryptography
AES (HW & SW)
AVA_VAN.5
FIPS 197, FIPS 140-3 L4
SO/IEC 18033-3, ISO/IEC 19790
SP 800-38A, 38C, 38D/G
HMAC-SHA2 (HW & SW)
AVA_VAN.5
FIPS 198-1, FIPS 180-4, FIPS 140-3 L4
ISO/IEC 10118-3, 9797-2, 19790
SP 800-107, 56C, 185
Asymmetric Cryptography
PKA (HW & SW, RSA/ECC)
AVA_VAN.5
FIPS 186-5, FIPS 140-3 L4
ISO/IEC 14888, 15946
SP 800-56A/B, 57, 131A
PQC (HW & SW, KEM/DSA)
AVA_VAN.5
FIPS 140-3 (PQC profiles)
ISO/IEC 18033-6 draft, 14888-3/4
SP 800-208, NIST PQC (ML-KEM, ML-DSA)
Platforms & Tools
Roots of Trust (RoT)
AVA_VAN.5
FIPS 140-3 L4, FIPS 186-5, SP 800-90 RNGs
ISO/IEC 19790, 15408, 11770
SP 800-57, 90, 63, 193
Cryptobox IP (AES, HMAC, PKA, PQC)
AVA_VAN.5
FIPS 140-3 L4 composite
ISO/IEC 19790, 11770, 14888, 18033
SP 800-56, 57, 131A, PQC suite
EDA Tools (SCA/FIA Evaluation)
Supports AVA_VAN.5
Pre-certification support for FIPS 140-3 L4
ISO/IEC 15408-3, 17825
SP 800-90B, 140C/D/E
Ask us!