FortifyIQ: Secure Semiconductor Solutions FortifyIQ develops
HW security IP cores fortified against Side-Channel (SCA) and Fault Injection attacks (FIA), while preserving the original AES goals of speed, low latency, and low power usage. We also offer high-performance software libraries and EDA tools for pre- and post-silicon security assessment.
Our AES core protection algorithm was tested rigorously, passing the Test Vector Leakage Assessment (TVLA) test at 1 billion traces, and was certified by a third-party Common Criteria lab at AVA_VAN.5. Our cores are fully synthesizable, eliminating the need for custom cells or special place & route handling. Being algorithm-based, they are technology-, implementation-, and foundry-agnostic, ensuring compatibility and security across diverse platforms and devices.
Secure IP Cores and SW libraries FortiCrypt: Our Advanced
AES IP cores provide robust protection against SCA, FIA, (including Differential Power Analysis-DPA, and Statistically Ineffective Fault Attacks-SIFA), alongside high performance, low latency, low gate count, and low power usage. Purely mathematically-driven, these cores achieve a high maximum frequency, and one clock cycle per AES round.
Our FortiCrypt
high-performance software library can be used to protect security vulnerabilities in HW in unprotected field devices even though they are already deployed, by a simple software download. They are based on the same security proven algorithm (STORM) as our ultra-low power IP cores, and are silicon proven. They have extremely high performance, up to 100 Mbps, even on a low-end 1.2 GHz ARM processor, and up to 900 Mbps on a standard 3.4 MHz processor.
FortiMac: These
HMAC SHA2 cores provide robust protection against SCA, DPA, FIA, and SIFA, are suitable for
lightweight applications and are purely algorithmic and thus implementation-agnostic. Our products, including the
software library, offer protection of HMAC SHA2, based on the threshold implementation approach, validated analytically and on physical devices.
FortiPKA-RISC-V: A
Public Key Algorithm coprocessor with modular multiplication and SCA and FIA protection that streamlines operations by eliminating Montgomery domain transformations, enhancing the coprocessor's performance and reducing area.
FortiPKEx: A
low-cost key exchanger for companies currently using preinstalled symmetric keys due to cost constraints, but are considering shifting to key exchange protocols based on asymmetric cryptography with built-in resistance to SCA and FIA.
FortiPQC: Our advanced
post-quantum cryptographic suite provides hardware and software implementations of the NIST PQC standards
ML-KEM and
ML-DSA, protected against side-channel and fault-injection attacks (SCA/FIA). Foundry-, technology-, and implementation-agnostic, and OTA/FOTA-updatable, FortiPQC achieves performance, area, and power comparable to unprotected implementations while remaining fully
high-assurance-certifiable and configurable to device and industry requirements.
FortiCryptoBox: Delivers exceptional power, performance, and area efficiency while supporting both classical public-key cryptography (
RSA, ECC) and post-quantum algorithms (
ML-KEM, ML-DSA).
Their flexible architecture unifies key exchange, digital signatures, authenticated encryption, secure boot, and firmware updates, with advanced protections against side-channel and fault-injection attacks, providing a secure, future-proof foundation for life-cycle applications.
FortiRoT: A family of fully customizable Roots of Trust designed for a wide range of applications. All RoTs are hardened against side-channel and fault injection attacks, ensuring strong security even in highly constrained or hostile environments.
The portfolio includes specialized variants for IoT, cloud, chiplets, general-purpose (balanced), and edge AI, providing flexible integration and performance trade-offs to suit your system requirements. FortifyIQ RoTs are fully compatible with Caliptra, utilize our exceptionally efficient CryptoBoxes, supporting robust cryptographic operations, secure key management, and on-the-fly encryption where applicable.
FortiEDA Pre-/Post-Silicon Validation Tools: Comprehensive pre-silicon and post-silicon security assessment tools, including TVLA charts that pinpoint vulnerabilities down to specific modules and gates, greatly simplifying security debugging against the spectrum of physical attacks, including SCA, DPA, FIA, and SIFA. This effectively moves the security assessment to the same stage as the functional assessment. These tools were instrumental in developing all our secure IP cores and software libraries.
For more information and product details, please visit fortifyiq.com or contact us at info@fortifyiq.com