Is this your business? Claim it to manage your IP and profile
Designed as a public key algorithm coprocessor, the FortiPKA-RISC-V stands out for its ability to streamline operations typically bogged down by Montgomery domain transformations. This component is tailored for high performance in embedded systems, ensuring enhanced data security through its advanced modular multiplication and robust protection against SCA and FIA. Particularly suited for secure System on Chip (SoC) integration, FortiPKA-RISC-V offers significant performance improvements without increasing area constraints.
FortiCrypt is an advanced encryption technology developed for protecting data against side-channel and fault injection attacks. This solution implements algorithmic resistance using finite field arithmetic, ensuring secure handling of data without adding extra latency or requiring custom silicon processing. It stands out for its successful passage of rigorous evaluations, including the Test Vector Leakage Assessment conducted on one billion traces. This ensures FortiCrypt can be used flexibly across various technologies and platforms while maintaining high security.
Aimed at mitigating the risk of fault injection attacks, this IP employs sophisticated strategies to maintain security integrity under extreme conditions. It uses error-detection and correction techniques to prevent unauthorized manipulations that could otherwise lead to unauthorized access. The IP is designed to be robust against fault conditions induced by attackers using methods like voltage manipulation and clock glitching. Its deployment is vital in secure environments where data integrity is non-negotiable.
This IP core offers advanced technology to resist side-channel attacks, crucial for maintaining the integrity and confidentiality of sensitive data. It is specifically engineered to withstand efforts to extract cryptographic keys via analysis of physical emanations from hardware devices. The side-channel attack resistance feature of this product ensures that it can be deployed in environments where data protection is paramount, such as in financial systems and secure communications.
FortiMac offers a secure implementation of HMAC SHA2, aimed at providing strong resistance to side-channel and fault injection attacks. Utilizing the Threshold Implementation paradigm ensures its ability to protect critical applications, both in software and hardware deployments. FortiMac's market distinction lies in its unique capability of employing only a minimal number of standard digital gates, while concurrently offering robust security for SCA and FIA threats.
The FortiCrypt Library is an advanced software component designed for defense against both differential power analysis and fault injection attacks, enhancing the security posture of systems utilizing cryptographic operations. Its robust configurations support high-definition video encryption and decryption, even on low-end processors. By fortifying existing hardware solutions in the field, the library offers an efficient upgrade path for devices that need enhanced security without complete hardware overhauls.
AES XP-DPA-FIA represents a high-performance cryptographic solution offering superior defense against both differential power analysis and fault injection attacks. With its multi-pipeline architecture, it delivers exceptional throughput while maintaining a high level of security. Designed to function efficiently under low latency conditions, AES XP-DPA-FIA is an optimal choice for applications demanding both speed and security, ensuring that cryptographic operations proceed smoothly without compromising data protection.
AES ULP-DPA-FIA provides ultra-low power cryptographic processing, integrating resistance to both power and fault injection attacks within battery-sensitive applications. It delivers a balance between maintaining essential security standards and ensuring minimal power consumption, crucial for portable and battery-dependent environments. This core is ideal for smart wearables and IoT devices that require sustained protection against cyber threats without draining energy resources.
This IP ensures strong cryptographic security with its resistance to differential power analysis and fault injection attacks, making it suitable for environments with stringent security needs. The HMAC-SHA2 algorithm implemented here provides a robust mechanism against various security threats, ensuring the safe execution of operations that rely heavily on secure hashing techniques. Its design focuses on maintaining operational efficiency while delivering top-tier security for sensitive applications.
The AES SX-DPA-FIA combines balanced security and performance, providing resistance against both differential power analysis and fault injection attacks while optimizing for low power use. This IP core is crafted for delivering security in balanced scenarios, where an equilibrium of speed, power efficiency, and gate count is desired. It shines in environments that prioritize overall efficiency without compromising security, making it suitable for a wide range of technological applications.
AES UC-DPA-FIA is tailored for ultra-compact security-critical applications where space and efficiency are of the essence. Its design enables the implementation of high-level cryptographic security within a minimal gate footprint, differentiating it as an economically efficient choice for low-cost, high-security devices. Its compact architecture is instrumental in driving wide adoption within hardware-constrained applications requiring robust protection against data breaches and unauthorized access.
Join the world's most advanced semiconductor IP marketplace!
It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!
No credit card or payment details required.
Join the world's most advanced AI-powered semiconductor IP marketplace!
It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!
Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!
To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.