Find IP Sell IP Chip Talk About Us Contact Us
Log In

FortifyIQ

FortifyIQ is at the forefront of hardware security, delivering innovative solutions to counteract side-channel attacks (SCA) and fault injection attacks (FIA) in electronic systems. Their approach stands out by utilizing groundbreaking technology that offers both unparalleled security and exceptional performance, without the typical trade-offs involved. Their flagship products include a suite of advanced cryptographic modules and supporting software tools, designed to guard critical systems against the plethora of threats associated with SC and FI attacks. These products are engineered using purely algorithmic, implementation-agnostic methodologies, ensuring both their application and integration across varied systems are seamless and efficient. In addition to advanced security measures, FortifyIQ's solutions promise enhancements in efficiency, enabling the handling of high-bandwidth tasks such as Ultra HD video encryption even on low-end CPUs. This capability ensures that devices are not only secure but remain highly functional, meeting the demanding performance standards of today's technology landscape. Read more

Is this your business? Claim it to manage your IP and profile

5
IPs available

FortiCrypt

FortiCrypt offers a comprehensive lineup of AES solutions, explicitly engineered for robust defense against side-channel attacks (SCA) and fault injection attacks (FIA), including variants like SIFA. Highlighting exceptional performance, these solutions employ masking techniques based on finite field arithmetic. These mechanisms ensure encryption and decryption processes are secure, while maintaining impressive speeds without additional latency. Balancing high security, low gate count, and power consumption, FortiCrypt products are available in configurations focusing on performance, power efficiency, or compact design options. With TVLA methodology verification and Common Criteria accreditations, FortiCrypt products are designed to thrive in even the most vulnerable situations. The suite supports ultra-high performance, ultra-low power efficiency, significant gate count reduction, and satisfies diverse industrial needs, making it applicable for both high-end and existing field devices vulnerable due to insufficient original protections. Moreover, FortiCrypt can be utilized with AMBA, AXI, or APB buses, offering a hardware-software solution integrated into diverse circuit architectures, thus ensuring comprehensive compatibility and security across systems.

FortifyIQ
35 Views
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

FortiPKA-RISC-V

FortiPKA-RISC-V serves as a powerful public key accelerator for handling extensive cryptographic computations, which traditional CPUs struggle with. It is crafted to offload heavy computational tasks from the main processor, thereby optimizing performance and resource efficiency. By avoiding cumbersome data transformation processes, FortiPKA-RISC-V underscores its superior operational speed over other solutions, while being optimal in size and energy consumption. Its cryptographic algorithms are implemented in firmware executed via an embedded RISC-V core, with extended support for custom arithmetic operations, making it versatile across applications that demand high-efficiency cryptographic processing. Moreover, it offers hardware configuration options that balance between performance and resource utilization tailored for specific applications. Supporting an array of cryptography standards, such as RSA and elliptic curve algorithms, and equipped with features for robust defense against side-channel and fault injection attacks, FortiPKA-RISC-V is adaptable to diverse cryptographic environments and requirements. Whether integrated into networks, communications, or IoT devices, it delivers outstanding reliability and security across platforms.

FortifyIQ
32 Views
AMBA AHB / APB/ AXI, Coprocessor, Cryptography Cores, Security Protocol Accelerators
View Details Datasheet

FortiMac

The FortiMac IP core is developed to deliver secure HMAC SHA2 implementations, offering substantial protection against side-channel and fault injection attacks. Utilizing the robust Threshold Implementation (TI) paradigm, FortiMac ensures that even the most sophisticated attacks are unable to compromise its security features. This protection robustness has been validated both through analytical methods and real-world physical device testing. FortiMac's standout feature is its unprecedented security, which answers the requirements of today’s rapidly evolving threat landscapes. This IP can be harnessed in both hardware and software configurations, extending its usability to various critical and non-critical applications, unrestricted by conventional design limitations. It's the only solution of its type in the market, setting a high bar for hardware security implementations. FortiMac is integral in securing applications where safeguarding against SCA and FIA is paramount, especially vital in sectors targeting optimal performance and high-security integrity.

FortifyIQ
31 Views
Cryptography Cores, Security Protocol Accelerators
View Details Datasheet

Side-channel Attack Resistance

The Side-channel Attack Resistance module provides specialized defense against potential leaks that occur when cryptographic keys are extracted using side-channel methods such as power consumption or electromagnetic emissions analysis. FortifyIQ’s approach integrates resistance directly into the design process, rather than relying on post-manufacturing testing, saving developers both time and financial resources. With tools like SideChannel Studio, developers can simulate side-channel vulnerabilities at the pre-silicon phase, thus identifying and mitigating leaks long before they become ingrained in physical hardware. By pinpointing weaknesses accurately, FortifyIQ's products ensure that robust countermeasures are built into the hardware, significantly enhancing security. This anticipatory strategy not only secures the hardware from anticipated side-channel threats but also aligns with NIST requirements, thereby fostering confidence in compliance and future-proofing the design against evolving security landscapes.

FortifyIQ
18 Views
Cryptography Cores, Embedded Security Modules
View Details Datasheet

Fault Injection Attack Countermeasures

FortifyIQ's Fault Injection Attack Countermeasures are crafted to preemptively address the vulnerabilities that arise from fault injection threats, which exploit design flaws by intentionally introducing malfunctions. Traditionally, the resilience of a design to these threats is evaluated only post-manufacture using expensive equipment. FortifyIQ’s pre-silicon solution allows for early-stage identification through robust simulation tools like FaultInjection Studio. FaultInjection Studio facilitates preemptive assessment of fault injection vulnerabilities, thereby eliminating costly post-production modifications and reducing the risk of operational disruptions. It employs an integrated simulation engine to scrutinize design robustness under simulated fault conditions, offering insights on potential flaws that could be exploited using techniques such as clock glitching or laser attacks. This methodology not only conserves resources but also enhances the accuracy and thoroughness of security assessments by providing a controlled, noise-free testing environment. FortifyIQ's fault injection defenses ensure that designs are fortified against attacks that would otherwise require costly patches or redesigns after production.

FortifyIQ
16 Views
Embedded Security Modules
View Details Datasheet
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to evaluate IP, download trial versions and datasheets, and manage your evaluation workflow!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Review added

Claim Your Business

Please enter your work email and we'll send you a link to claim your business.

Review added

Claim Email Sent

Please check your email for a link you can use to claim this business profile.

Chat to Volt about this page

Chatting with Volt