Myth 3: “PQC is too heavy for software.” Fact: Optimized software implementations make high-assurance PQC feasible, including in large-scale systems like data centers, until hardware designs are deployed. Transition to hardware can then be performed without application changes. For legacy devices and platforms lacking protected cryptographic hardware, software PQC libraries provide an effective and practical approach. FortifyIQ’s software implementations are highly optimized. Software and hardware share a unified API with identical interfaces, simplifying migration.
FortifyIQ
Semiconductors
Salem, Massachusetts 3,223 followers
Chip-to-Cloud Security Compliance Cybersecure, Compact, Fast, and Low-Power
About us
FortifyIQ engineers certifiable cryptographic IP cores, software libraries, and roots of trust combining traditional algorithms (AES, RSA, ECC, HMAC-SHA2) with post-quantum cryptography (PQC). All hardware IP cores implement RTL-level algorithmic SCA/FIA countermeasures, while software libraries use the same algorithmic protections, delivering high-assurance security with minimal impact on performance, power, or area. Our solutions are foundry- and platform-agnostic, integrating securely across a wide range of devices, from smart cards and IoT nodes to AI accelerators and cloud systems. FortifyIQ validates all designs using proprietary pre- and post-silicon EDA tools, supported by formal proofs, extensive research, and a growing portfolio of patents. FortifyIQ cryptography provides secure boot and post-quantum readiness, with software OTA-updates and asymmetric hardware IP (ECC, RSA, PQC) FOTA-updates, supporting high-assurance embedded, industrial, and cloud systems. By combining rigorous physical attack resilience with near-native efficiency in both hardware and software, FortifyIQ delivers advanced cryptography that is certifiable, reliable, and built to meet the challenges of high-assurance, real-world applications.
- Website
-
https://fortifyiq.com/
External link for FortifyIQ
- Industry
- Semiconductors
- Company size
- 11-50 employees
- Headquarters
- Salem, Massachusetts
- Type
- Privately Held
- Founded
- 2019
- Specialties
- IoT Security, AI-model Security, Post-Quantum Cryptography, Cryptographic Soft IP cores for any ASIC/FPGA/SoC, Hardware Root of Trust, Common Criteria VAN.5, Side-Channel Attack (SCA) countermeasures, Fault-Injection Attack Protection, Energy-efficient cryptography, Certification-ready security (SESIP, FIPS 140-3, Common Criteria), Legacy system protection via optimized high performance software libraries, High-efficiency security designs, Security EDA tools for pre- & post-silicon vulnerability testing, Secure hardware design, Embedded security, Secure boot and key protection, Security compliance enablement, Security consuting, Professional security services, Secure PQC, and High-assurance compliance
Locations
-
Primary
Get directions
81 Washington St
Suite #307
Salem, Massachusetts 01970, US
Employees at FortifyIQ
Updates
-
Myth 2: “Standard masking is enough to protect PQC.” Fact: Standard share-based masking does not cover all PQC stages. Compression, decompression, encoding, and decoding are often left unprotected, and are actively targeted in academic attacks. Protecting only polynomial arithmetic is not sufficient. FortifyIQ protects all PQC stages, with side-channel and fault injection protections, in hardware and in cryptographic software libraries.
-
Myth 1: “If PQC is NIST- standardized, it’s secure.” Fact: NIST standardizes algorithms, not implementations. Several ML-KEM and ML-DSA implementations have been broken via side-channel attacks, sometimes with a single trace, despite using NIST-approved algorithms. Implementation security, not the algorithm alone, determines real-world PQC security. FortifyIQ secures implementations, not just algorithms, with certifiable side-channel and fault-injection resistance. See our FAQ on PQC here: https://lnkd.in/dSJVzEZv
-
High-performance cryptography for legacy devices, without hardware changes Side-channel resistance is often assumed to come with a prohibitive performance or memory cost. In practice, system-level design choices matter more than the algorithms themselves. Our cryptographic software libraries are quantum-era secure + classical (for interoperability with legacy devices), in shared minimal RAM and validated secure against side-channel attacks across: AES (up to ~900 Mbps on a 3.4 GHz laptop CPU; ~100 Mbps on a 1.2 GHz legacy mobile CPU) HMAC-SHA2 / AES-CCM Classical crypto - ECC and RSA ML-KEM (and ML-DSA in validation process) Side-channel resistance is our domain. All our cryptographic implementations are inherently hardened against side-channel attacks, with a patented algorithmic method we've developed over years of research, without standard added-on countermeasures, thus maintaining high throughput and operating within a small, shared RAM footprint and a practical ROM size for flash constraints.
-
-
Side‑channel security for PQC is not theoretical. ML‑KEM and ML‑DSA implementations are known to be highly sensitive to side‑channel leakage, especially during polynomial arithmetic and the compression and decompression stages. Using TVLA tools, we validated our PQC ML‑KEM 𝙨𝙤𝙛𝙩𝙬𝙖𝙧𝙚 𝙡𝙞𝙗𝙧𝙖𝙧𝙮: --> 100,000 traces analyzed --> Zero side‑channel leakage --> Both first- and second-order leakage free PQC will have to be secure against side-channel attacks to be certifiable. For PQC to be certifiable, resistance to physical attacks is a baseline requirement. We focus on power-, performance-, and area-efficient protection against side-channel and fault attacks, with OTA-deployable, compact, high-performance cryptographic software libraries (AES, HMAC, ECC/RSA, ML-KEM, ML-DSA). #PostQuantumCryptography #PQC #SideChannelSecurity #MLKEM #MLDSA #EmbeddedSecurity #SecureByDesign https://lnkd.in/dfn3A8ga
-
-
For most embedded and edge systems, post-quantum public-key needs are relatively narrow: key establishment and authentication/signatures. In practice, ML-KEM and ML-DSA together cover the majority of PQC requirements in real devices, including secure boot, firmware updates, device authentication, and protected communications. Where things become challenging is not algorithm selection, but implementation: --> resilience to side-channel and fault-injection attacks --> certifiability --> tight RAM, performance, and power constraints --> deployability in systems already in the field These aspects tend to dominate real SoC design tradeoffs once PQC moves beyond theory. #PostQuantumCryptography #PQC #EmbeddedSystems #EdgeComputing #MLKEM #MLDSA #HardwareSecurity #SideChannelAttacks #FaultInjection #SoCDesign #IoTSecurity #LowPowerDesign #SecurityValidation
-
-
FortifyIQ reposted this
We had a great show in Grenoble where we demonstrated our unique algorithmic/mathematic based classical & PQC cryptography (HW & SW, physical-attack resistant, NIST compliant). We met there with a significant number of prospects and customers interested in taking advantage of this unique expertise. Watch here: https://lnkd.in/gwMGji2b -- from the D&R IP-SOC Days December, 2025
-
-
We had a great show in Grenoble where we demonstrated our unique algorithmic/mathematic based classical & PQC cryptography (HW & SW, physical-attack resistant, NIST compliant). We met there with a significant number of prospects and customers interested in taking advantage of this unique expertise. Watch here: https://lnkd.in/gwMGji2b -- from the D&R IP-SOC Days December, 2025
-
-
FortifyIQ Expands Its Local Presence in Israel The Startup Nation increasingly demands highly efficient, customized classical and post-quantum cryptography. From fintech and communications to automotive, IoT, and critical infrastructure, security must now meet extreme assurance requirements without sacrificing performance or cost. We are pleased to announce our partnership with Nexus-GT, in Israel. FortifyIQ delivers certifiable, RTL-level SCA/FIA-hardened cryptography with efficiency on par with optimized unprotected implementations, through the same algorithmic protection approach used for our AES (which is 3rd party validated at the highest Common Criteria security level - AVA_VAN.5). Our hardware IP and software libraries cover AES, HMAC-SHA-2, RSA, ECC, and post-quantum cryptography, enabling immediate PQC deployment today and seamless migration to hardware as platforms evolve. This partnership brings FortifyIQ’s high-assurance cryptography, finely optimized to each system’s power, performance, area, and certification constraints, closer to Israeli engineers and system architects. Chip-to-Cloud Security Compliance: cybersecure, compact, fast, and low-power #PostQuantum #PQC #HardwareSecurity #Cryptography #SoCDesign #SideChannelResistance #FaultInjection #HighAssurance #CyberSecurity #IsraelTech #SemiconductorSecurity #Nexus-GT
-
-
FortifyIQ reposted this
FortifyIQ Partners with Nexus-GT to Expand its Security Market Reach in #Israel https://lnkd.in/edfc-N6a