...

Secure, High-Performance Solutions
For Chips, AI, and Compliance

Home
FortiPQC™ Post-Quantum Cryptography Implementations

NIST-standardized post-quantum cryptography, implemented in software and hardware and hardened against side-channel and fault-injection attacks. A unified API ensures seamless HW/SW integration, while crypto-agile, high-assurance designs deliver exceptional performance, power, and area efficiency.

EDA Tools for Security Assessment and Verification
EDA Tools for Security Assessment and Verification
Detect and analyze side-channel and fault injection vulnerabilities, pinpointing their sources to the leaking module and even gate. They are continuously updated to include new attacks. For validating the efficiency of in-house developed cryptographic modules both pre- and post-silicon, and to verify the correctness of third-party IP integration — where integration bugs sometimes introduce new vulnerabilities.
Security Cryptographic HW IP Cores
FortiAES™, FortiMac™, FortiPKA™, FortiPQC™ and CryptoBox™ Hardware Security IP Cores
Compact, configurable IPs for ASIC/FPGA delivering classical and post-quantum cryptography with the highest security assurance. CryptoBox subsystems integrate easily into any design, while patented protections maintain outstanding performance, power, and area efficiency.
Root of Trust (RoT)
Root of Trust (RoT)
FortiTrust™ Quantum-Safe Roots of Trust are compact, highly configurable hardware RoTs from cost-effective, low-power designs for IoT devices to high-performance cloud AI servers with extensive on-the-fly encryption capabilities. SCA/FIA-hardened quantum-safe cryptography with crypto-agile updates, Caliptra-compatible and designed for strong security assurance, they support compliance-driven deployments.
Cryptographic Software
Cryptographic Software Libraries

High-performance and adaptable, these libraries are optimized for deployed systems as well as budget-conscious or resource-constrained devices. They include post-quantum-safe cryptography, are configurable for various use cases, and perform exceptionally well on edge devices, enabling secure operations even on limited hardware.

post-quantum cryptography
Post-Quantum Cryptography Implementations
hardware security
software security solutions
Secure Cryptography for the Quantum Era
Hardware Security Solutions

Leading Security Compliance for Demanding Applications

At FortifyIQ, we deliver powerful, efficient security solutions for extreme
use cases where others fall short. Our technology safeguards against
side-channel (SCA) and fault-injection (FIA) attacks without
compromising on performance, power, or space.

Why Choose FortifyIQ?

Why Choose
FortifyIQ?

software security solutions
Secure Cryptography for the Quantum Era

Maximum security
with minimum power,
latency, and area.

software security solutions
Hardware Security Solutions company

Maximum security with minimum power, latency, and area.

Maximum security
with minimum power,
latency, and area.

Adi Shamir

Professor

Adi Shamir, PhD.

The ‘S’ in RSA
and Turing Prize Winner

FortifyIQ’s solution has the potential of dramatically reducing the cost and delay associated with the manufacturing of DPA-protected devices…

This is an innovative solution to a really important problem, produced by a first-rate team of developers.

software security solutions
Professor Adi Shamir

Professor
Adi Shamir, PhD.

The ‘S’ in RSA and
Turing Prize Winner

Home Copy
Home Copy
Hardware Security Solutions company
Hardware Security Solutions
Adi Shamir about FortifyIQ’s solution

Professor

Adi Shamir, PhD.

The ‘S’ in RSA and
Turing Prize Winner

FortifyIQ’s solution has the potential of dramatically reducing the cost and delay associated with the manufacturing of DPA-protected devices…

This is an innovative solution to a really important problem, produced by a first-rate team of developers.

Academic Papers

Academic Papers

White Papers

Videos

software security solutions
SGS certification logo
FortifyIQ AES Algorithm
AVA_VAN.5 Evaluation & Validation Summary
SGS Brightsight Common Criteria Laboratory
Summary. The leakage analysis (Welch t-test) on over 30 million traces did not show statistically significant first- and second-order differences between trace sets with fixed and random inputs. The template-based DPA analysis, on the pseudo-random trace set for the profiling phase (15 million traces) and on a sub-set of 300k fix input traces for matching phase targeting the first-round S-box output, and template attack on ciphertext, did not indicate any potential information leakage.”
“The results for the soft IP presented in the report were obtained on the TOE which is the basic hardware implementation of the soft IP without additional levels of security (e.g. that are present in a secure silicon layout). Therefore the internal strength of the soft IP itself was evaluated. This indicates that the investigated features and parameters of the soft IP implementation should be robust against SCA and fault injection attacks in different implementations including ASIC. Nevertheless, according to the Common Criteria rules, the strength of the final composite product must be evaluated on its own
Request Technical Details