Is this your business? Claim it to manage your IP and profile
FortiCrypt offers a comprehensive lineup of AES solutions, explicitly engineered for robust defense against side-channel attacks (SCA) and fault injection attacks (FIA), including variants like SIFA. Highlighting exceptional performance, these solutions employ masking techniques based on finite field arithmetic. These mechanisms ensure encryption and decryption processes are secure, while maintaining impressive speeds without additional latency. Balancing high security, low gate count, and power consumption, FortiCrypt products are available in configurations focusing on performance, power efficiency, or compact design options. With TVLA methodology verification and Common Criteria accreditations, FortiCrypt products are designed to thrive in even the most vulnerable situations. The suite supports ultra-high performance, ultra-low power efficiency, significant gate count reduction, and satisfies diverse industrial needs, making it applicable for both high-end and existing field devices vulnerable due to insufficient original protections. Moreover, FortiCrypt can be utilized with AMBA, AXI, or APB buses, offering a hardware-software solution integrated into diverse circuit architectures, thus ensuring comprehensive compatibility and security across systems.
FortiPKA-RISC-V serves as a powerful public key accelerator for handling extensive cryptographic computations, which traditional CPUs struggle with. It is crafted to offload heavy computational tasks from the main processor, thereby optimizing performance and resource efficiency. By avoiding cumbersome data transformation processes, FortiPKA-RISC-V underscores its superior operational speed over other solutions, while being optimal in size and energy consumption. Its cryptographic algorithms are implemented in firmware executed via an embedded RISC-V core, with extended support for custom arithmetic operations, making it versatile across applications that demand high-efficiency cryptographic processing. Moreover, it offers hardware configuration options that balance between performance and resource utilization tailored for specific applications. Supporting an array of cryptography standards, such as RSA and elliptic curve algorithms, and equipped with features for robust defense against side-channel and fault injection attacks, FortiPKA-RISC-V is adaptable to diverse cryptographic environments and requirements. Whether integrated into networks, communications, or IoT devices, it delivers outstanding reliability and security across platforms.
The FortiMac IP core is developed to deliver secure HMAC SHA2 implementations, offering substantial protection against side-channel and fault injection attacks. Utilizing the robust Threshold Implementation (TI) paradigm, FortiMac ensures that even the most sophisticated attacks are unable to compromise its security features. This protection robustness has been validated both through analytical methods and real-world physical device testing. FortiMac's standout feature is its unprecedented security, which answers the requirements of today’s rapidly evolving threat landscapes. This IP can be harnessed in both hardware and software configurations, extending its usability to various critical and non-critical applications, unrestricted by conventional design limitations. It's the only solution of its type in the market, setting a high bar for hardware security implementations. FortiMac is integral in securing applications where safeguarding against SCA and FIA is paramount, especially vital in sectors targeting optimal performance and high-security integrity.
The Side-channel Attack Resistance module provides specialized defense against potential leaks that occur when cryptographic keys are extracted using side-channel methods such as power consumption or electromagnetic emissions analysis. FortifyIQ’s approach integrates resistance directly into the design process, rather than relying on post-manufacturing testing, saving developers both time and financial resources. With tools like SideChannel Studio, developers can simulate side-channel vulnerabilities at the pre-silicon phase, thus identifying and mitigating leaks long before they become ingrained in physical hardware. By pinpointing weaknesses accurately, FortifyIQ's products ensure that robust countermeasures are built into the hardware, significantly enhancing security. This anticipatory strategy not only secures the hardware from anticipated side-channel threats but also aligns with NIST requirements, thereby fostering confidence in compliance and future-proofing the design against evolving security landscapes.
FortifyIQ's Fault Injection Attack Countermeasures are crafted to preemptively address the vulnerabilities that arise from fault injection threats, which exploit design flaws by intentionally introducing malfunctions. Traditionally, the resilience of a design to these threats is evaluated only post-manufacture using expensive equipment. FortifyIQ’s pre-silicon solution allows for early-stage identification through robust simulation tools like FaultInjection Studio. FaultInjection Studio facilitates preemptive assessment of fault injection vulnerabilities, thereby eliminating costly post-production modifications and reducing the risk of operational disruptions. It employs an integrated simulation engine to scrutinize design robustness under simulated fault conditions, offering insights on potential flaws that could be exploited using techniques such as clock glitching or laser attacks. This methodology not only conserves resources but also enhances the accuracy and thoroughness of security assessments by providing a controlled, noise-free testing environment. FortifyIQ's fault injection defenses ensure that designs are fortified against attacks that would otherwise require costly patches or redesigns after production.
Join the world's most advanced semiconductor IP marketplace!
It's free, and you'll get all the tools you need to evaluate IP, download trial versions and datasheets, and manage your evaluation workflow!
To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.