Expert insights, academic papers, and videos to fuel your chip-to-cloud security compliance.
Learn MoreHigh-assurance cryptographic implementations of AES, HMAC, PKA, PQC, CryptoBox, and Root-of-Trust families, and software libraries, all exceptionally efficient (PPA-optimized).
See MoreProvide high-assurance cryptographic protection, engineered for AVA_VAN.5 compliance and designed for high-security certification.
Secures both new and already-deployed devices, including those without hardware countermeasures, and is proven in millions of systems.
Provides ultra-strong protection against SCA, FIA, and cache attacks.
What are side-channel and fault-injection attacks, and why would your device need protection against them? Etc.
Provides a comprehensive suite of post-quantum cryptography hardware, including CryptoBoxes, IP cores, and Root-of-Trust modules.
Provide high-assurance cryptographic protection, engineered for AVA_VAN.5 compliance and designed for high-security certification.
CryptoBoxes and Roots of Trust (RoTs) integrate post-quantum and classical cryptography in a unified, high-assurance architecture.
Why post-quantum cryptography matters? Etc.
The most popular myths and facts about post-quantum cryptography.
Enables engineers to evaluate and strengthen hardware designs against fault injection attacks, e.g., DFA, SIFA, and AFA.
Pre-silicon EDA tool suite designed to identify, analyze, and mitigate side-channel vulnerabilities in hardware designs from RTL.
Mathematically sound and practically validated patented/patent-pending countermeasures, ensuring resistance to the most advanced physical attacks.
Mathematically sound and practically validated patented/patent-pending countermeasures, ensuring resistance to the most advanced physical attacks.
How does FortifyIQ validate resistance to side-channel and fault-injection attacks? Etc.
Resilient cryptographic protection for payment systems, digital banking, and secure financial infrastructure.
Secure cryptographic foundations for identity systems, defense infrastructure, and digital government platforms.
From payment cards to e-passports, SIMs, and digital ID tokens, smart cards and digital identity solutions power critical transactions.
Securing network infrastructure, subscriber identity, and cloud-native telecommunication systems.
Automotive Cybersecurity IPs and Tools for ECUs, ADAS, AV and In-Vehicle-Infotainment (IVI) Systems.
Robust, certifiable security solutions for next-generation industrial automation and control systems.
Cryptographic security tailored to the needs of energy systems: robust protection against side-channel and fault injection attacks.
Safeguarding energy, water, and transportation systems with certifiable hardware and software security.
Cryptographic protection engineered for the longevity, safety, and regulatory demands of rail and transportation systems.
Ultra-high-throughput, physically secure cryptographic IP for cloud and data center silicon.
Cryptographic protection for IoT systems, with unmatched resistance to side-channel analysis and fault injection attacks.
Secure cryptography and OTA updates for ultra-constrained, mission-critical medical electronics.
Robust, efficient cryptographic protections for media platforms that resist real-world physical attacks with minimal performance tradeoffs.
Cryptographic solutions purpose-built for silicon IP protection, licensing enforcement, and clone detection.
In healthcare, we provide comprehensive cryptographic solutions — from traditional to post-quantum cryptography.
Expert insights, academic papers, and videos to fuel your chip-to-cloud security compliance.
Learn MoreThis section features FortifyIQ's academic publications, presenting AES protection techniques against side-channel and fault injection attacks and side-channel attacks on SHA-2-based HMAC.
Learn MoreThis section demonstrates how FortifyIQ validates cryptographic solutions, compares ours against other secure cores, and showcases FortiEDA for evaluating and developing secure designs.
Learn MoreOur explanatory videos break down complex hardware security concepts into clear, visual stories, showcasing how FortifyIQ's technologies detect and prevent side-channel and fault-injection attacks.
Learn MoreStay informed with our latest updates, announcements, and insights, including industry developments, company milestones, and important highlights shaping our work and community.
Learn MoreRead our official statements and announcements for media and stakeholders, featuring key company updates, partnerships, product launches, and other important organizational news.
Learn MoreJoin our online sessions to explore expert insights, practical knowledge, and discussions on relevant topics. Watch live or access recordings to learn from industry professionals.
Learn MoreDiscover upcoming conferences, meetings, and special gatherings where you can connect with our team, partners, and community members, and stay engaged with our latest initiatives.
Learn MorePioneers in hardware-based security innovation, combining cutting-edge cryptography with advanced defense mechanisms, dedicated to safeguarding the digital world’s most critical assets.
Learn MoreOur services ensure that security, performance, power, and area are balanced optimally, without compromising certifiable high-assurance protection against side-channel and fault-injection attacks.
Learn MoreAt FortifyIQ, our R&D team is a unique blend of industry veterans with deep expertise in mathematics and cybersecurity, alongside talented young engineers who bring fresh perspectives and innovative thinking.
Learn MoreWe seek exceptional individuals who are passionate about tackling the toughest challenges facing hardware manufacturers today and ready to take on whatever comes next.
Join Us
Even if an encryption algorithm like AES or HMAC-SHA2 is mathematically secure, real devices can leak information through the way they operate. For example, attackers might measure power use, electromagnetic signals, or timing to guess secret keys (side-channel attacks), or deliberately cause errors in the device to bypass security (fault-injection attacks).
Devices that are physically exposed, like embedded chips in consumer electronics, IoT devices, or smart cards, can be vulnerable. Protection against these attacks ensures that sensitive data, keys, and integrity checks remain secure, even if attackers can observe or tamper with the device.
Note: If the device is fully secured in a controlled environment where attackers cannot get close, standard encryption is usually sufficient.
HMAC-SHA2 ensures message integrity and is mathematically strong. On unprotected chips, secret keys or internal computations can leak or be corrupted, allowing attackers to forge messages or bypass integrity checks. Protected HMAC-SHA2 prevents these real-world attacks.
Not necessarily. If your embedded device is in a fully controlled environment where attackers (including insiders) cannot get physically close or interfere with it, standard AES and HMAC-SHA2 are usually sufficient. Protection becomes critical only when the device is exposed to side-channel or fault-injection attacks.
That said, if your device needs high-assurance certification, you will need protected cryptography.
FortifyIQ’s cryptographic libraries use the same proprietary protection algorithms we apply in our hardware IP cores. These techniques, proven in lab validation both in hardware and in software, mask sensitive intermediate values, randomize execution behavior, and detect and prevent fault injection attempts, ensuring strong resistance to side-channel attacks without requiring hardware countermeasures.
Yes. FortifyIQ’s patented STORM (for AES) and Threshold Implementation (for HMAC-SHA2) countermeasures share the same security-proven mathematical basis as our hardware protections. These algorithms, implemented in our software, have been validated to meet the highest standards for physical security, FIPS 140-3 (levels 1-4) and Common Criteria AVA_VAN.5, demonstrating resilience against both Side-Channel Attacks (SCA) and Fault Injection Attacks (FIA).
All known cache attack techniques are rendered ineffective by our implementations. This includes both time-based and power-based variants.
Yes. Our libraries are designed to bypass unprotected hardware crypto and add hardened protection via software, even on deployed devices.
Absolutely. Our cryptographic libraries can serve as a drop-in secure replacement, making it possible to retrofit protection where hardware can’t be changed.
Our protected AES and HMAC-SHA2 libraries meet the security requirements for FIPS 140-3 (Levels 1–4), SESIP Levels 1-5 and Common Criteria up to AVA_VAN.5, enabling compliance in regulated industries.
At the algorithmic and implementation levels, we harden cryptographic operations so that injected faults (such as changing gate states) do not reveal secrets.
No. Some classes of FI, such as Statistical Ineffective Fault Attacks (SIFA), rely on faults that cause no change whatsoever and are therefore inherently undetectable. FortifyIQ uses mathematical countermeasures that prevent sensitive information from being leaked, rather than relying on detection.
Only FortifyIQ offers high-performance software cryptographic libraries that enable regulatory compliance at all levels.
FortifyIQ’s high-performance software cryptographic libraries are compliant with FIPS 140-4 levels 1-4, SESIP Levels 1-5, and Common Criteria up to AVA_VAN.5
Ascon and PRESENT are strong choices for minimizing size and power, but they are not optimized for high-assurance environments or regulatory compliance. FortifyIQ’s AES libraries offer proven, validated resistance to side-channel and fault-injection attacks, and are certified-ready for FIPS 140-3 and Common Criteria requirements that lightweight ciphers typically cannot meet in software today. PRESENT, in particular, is vulnerable to certain attacks if not implemented with extra protections, and its smaller block size (64 bits) can be a limitation for modern security requirements.
Yes. Our AES implementation is configurable for code size, RAM, and throughput trade-offs. In its smallest form, it is on par with Ascon’s memory footprint while maintaining full protection against side-channel and fault-injection attacks. PRESENT is not available in software.
Migration is straightforward, whether from hardware or software implementations. Both algorithms can be supported in parallel during transition, and FortifyIQ provides an API-compatible abstraction layer to ease integration.
The reference software for Ascon and PRESENT is free and open source. However, the hardware IP involves licensing, integration, and validation costs, similar to AES hardware cores.
FortifyIQ’s STORM AES is viable for demanding applications, delivering::
This makes it faster than unprotected TinyAES, and slower (by about 10x) than the highly optimized unprotected OpenSSL that uses CPU AES acceleration instructions.
No. Asymmetric cryptography (such as ECC or RSA) is typically used only during infrequent operations, such as secure boot, key exchange, or firmware verification. These actions occur at startup or update time, not during regular device operation. Once the device is running, it uses faster symmetric algorithms (like AES and HMAC) for all ongoing cryptographic tasks. So your device operates at full speed during normal use, and the impact of using a hardened asymmetric cryptographic library is therefore minimized to its use during startup and update, and to applications where asymmetric crypto is actively used during runtime.
Yes. FortifyIQ’s cryptographic libraries are modular and can be used independently. If your application requires only encryption or decryption, you can use the hardened AES library on its own. Similarly, HMAC-SHA2 can be used independently for message authentication or integrity checks. Each library is fully protected against side-channel and fault injection attacks and does not depend on the others.
No. The ECC/RSA library is also modular and typically used only for specific tasks like secure boot, digital signatures, or key exchange. If your application does not require asymmetric cryptography, you can use just AES, HMAC, or both.
Yes. Our licensing model is designed to support post-production and fielded devices, making it ideal for long product lifecycles.
Yes. Both the cryptographic libraries and hardware IP cores are delivered with a documented abstraction layer that exposes a unified API. This means your application code interacts with the same interface, regardless of whether the underlying implementation is software or hardware.
This flexibility is especially useful when:
FortifyIQ’s unified API reduces integration effort, simplifies testing, and supports long-term maintainability across diverse hardware configurations.
Our cryptographic libraries meet the requirements of FIPS 140-3 Levels 3,4, Common Criteria AVA_VAN.5, and SESIP Levels 1-5, forming a strong foundation for compliance across regulated domains. This includes medical (IEC 62304, FDA guidance), automotive (ISO/SAE 21434), (IEC 62443), and IoT (EN 303 645, NISTIR 8259) frameworks, where it is ready for cryptographic module certification.
Yes. FortifyIQ’s cryptographic libraries are designed to meet the security requirements of SESIP at all levels, including resistance to side-channel and fault injection attacks, secure cryptographic implementation practices, and documented design.
FortifyIQ’s high-assurance libraries run on a wide range of processors, from microcontrollers (MCUs) to high-performance CPUs (MPUs), including:
The libraries are tailored to the device’s processor, memory, and performance characteristics, ensuring optimal use of available resources. They are optimized for smart cards, constrained MCUs, and general-purpose CPUs using lookup tables (LUTs) on ROM and minimal RAM, making them suitable even for highly resource-limited platforms.
Yes. FortifyIQ provides both software libraries and hardware IP cores with a unified, documented abstraction layer, so you can switch between software and hardware implementations without changing your code. This makes it easy to:
This flexibility allows you to meet evolving performance and security needs across a range of devices, from legacy systems to next-generation SoCs.
Our secure AES and HMAC libraries are successfully deployed on a legacy 1 GHz ARM processor, encrypting/decrypting video streams at large scale. Their security has been validated and meets the highest assurance requirements.
Yes, both AES-256 and HMAC-512 are inherently secure with quantum computers.
PQC itself is the SW public key for the Quantum Era.
Yes. During this transition period, many systems require both classical and post-quantum public key algorithms for compatibility and future-proofing.
We provide a hybrid software solution that includes both classical public key cryptography (such as RSA and ECC) and post-quantum cryptography (like Kyber and Dilithium), allowing you to support both in your product today, using only software.
Our PQC meets the highest cryptographic security standards. It is algorithmically protected from side-channel and fault injection attacks, similarly to our other products.
The differences between hardware and software implementations regarding performance are significant. If your performance and power requirements are lenient, we suggest a software implementation, since it is flexible and cheap.
Our high-assurance PQC libraries deliver comparable performance and RAM/ROM footprint to standard optimized unhardened implementations.
Ask us!