Is this your business? Claim it to manage your IP and profile
The FortiPKA-RISC-V is a highly specialized Public Key Algorithm coprocessor designed to streamline cryptographic operations by integrating modular multiplication with protections against side-channel and fault injection threats. It operates without the need for Montgomery domain transformations, optimizing the coprocessor’s performance while reducing area requirements. Tailored for applications demanding high efficiency and security, FortiPKA-RISC-V ensures robust performance in public key operations, suitable for secure communications and data protection scenarios. With a focus on reduced latency and power efficiency, this coprocessor can be implemented in various platforms, enhancing protection in devices and systems The coprocessor is part of FortifyIQ's line of advanced IP solutions, providing a technology-agnostic approach that is adaptable to diverse environments. The FortiPKA-RISC-V offers benefits in applications requiring stringent security and efficiency, making it an ideal solution for developers looking to enhance cryptographic functionalities.
FortifyIQ's Side-channel Attack Resistance offers advanced security solutions designed to protect devices against SCA vulnerabilities during the early design stages. By enabling integrated simulations of side-channel scenarios, it supports identifying and mitigating potential weaknesses before hardware manufacturing. This capacity ensures cost-effective and timely preventative measures that preempt costly post-production fixes. Integrating advanced testing methodologies such as the rigorous Test Vector Leakage Assessment (TVLA), FortifyIQ’s SCA solution allows comprehensive assessment and validation of security under extreme scenarios. The technology successfully detects fault injection risks, ensuring the highest standards of security compliance are met. This system is particularly vital for sectors where data integrity and security are paramount, including automotive, defense, and Internet of Things (IoT). Its extensive simulation and analysis capabilities allow users to optimize systems efficiently, ensuring safe deployment and continuous protection of sensitive data against evolving security challenges.
FortifyIQ's Fault Injection Attack Countermeasures address vulnerabilities in pre-silicon stages, allowing design engineers to detect potential weaknesses early in the development cycle. This method replaces traditional post-manufacture testing, thereby reducing costs and development timelines. Using simulation techniques within FaultInjection Studio, these countermeasures ensure robust system integrity against fault injection attacks. The platform supports accurate and detailed analysis, identifying vulnerabilities through simulation engines like FAST IQ, tailored to simulate various fault scenarios. This preemptive approach facilitates immediate corrective measures, ensuring compliance with emerging security standards and significantly mitigating potential risks associated with hardware flaws. Employing this technology enhances reliability in critical infrastructures such as telecommunications, finance, and secure manufacturing. It combines the latest cryptographic protections to offer a balanced, safe operating environment for devices susceptible to fault-induced breaches. These countermeasures are integrated seamlessly, maximizing system uptime and security resilience in sensitive applications.
The AES XP-DPA-FIA core is engineered for demanding high-performance applications, featuring AES GCM for secure network communications and AES XTS for data encryption. Its multi-pipeline architecture offers customization in the number of pipelines, making it highly suitable for applications needing robust performance. Unique in its market space, this core extends its protection to the GHASH authentication mechanism, combining high throughput (up to hundreds of Gbps at 500 MHz on a 45nm process) with advanced attack resistance. Utilizing FortifyIQ's RAMBAM protection scheme, the core effectively mitigates side-channel attacks without affecting latency, verified under rigorous Test Vector Leakage Assessment (TVLA) with over a billion traces. The core's design eliminates the need for custom cells and supports seamless synthesis across different technologies. AES XP-DPA-FIA stands out with its comprehensive SCA and FIA safeguards, integrating features that support secure, authenticated operations in communication and storage systems. Specifications include compliance with NIST FIPS-197, support for AES-128/192/256 encryption modes, and tunable protection levels suiting various use cases. Its compatibility extends to standard interfaces such as AMBA AXI, ABP, and options for embedded random masking, making it a versatile component for modern security architectures.
The HMAC-SHA2-DPA-FIA IP core delivers outstanding security for cryptographic operations against side-channel and fault injection attacks. Engineered as part of the FortiMac product family, it effectively incorporates algorithmic and implementation-agnostic protection grounded in the threshold implementation strategy, rendering it highly resistant to various attack vectors. Proven across analytical and physical assessments, this IP core is vital for applications requiring robust defenses. Designed for versatility, the core supports comprehensive SHA-224, SHA-256, SHA-384, and SHA-512 schemes under the NIST FIPS 180-4 standard. It's engineered for ease of integration with flexible configuration options that include choice of interfaces and support for AMBA AXI or APB. This adaptability, paired with its ultra-strong protection features, ensures effective safeguarding across IoT, automotive, and secure internet protocol applications. The core's functional deliverables are comprehensive, featuring synthesizable RTL source code, a dedicated testbench, and technical documentation to support seamless integration. Its capacity to withstand extensive testing ensures high security, verified through a billion trace Test Vector Leakage Assessment, making it a preferred choice for systems necessitating high reliability in encrypted operations.
Join the world's most advanced semiconductor IP marketplace!
It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!
To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.