English
Language : 

EP2AGX95EF29C6N Datasheet, PDF (350/380 Pages) Altera Corporation – Device Interfaces and Integration
9–64
Chapter 9: Configuration, Design Security, and Remote System Upgrades in Arria II Devices
Design Security
Arria II Design Security Solution
Arria II devices are SRAM-based devices. To provide design security, Arria II devices
require a 256-bit security key for configuration bitstream encryption.
To carry out secure configuration, follow these steps (refer to Figure 9–29):
1. Program the security key into the Arria II device.
Program the user-defined 256-bit AES keys to the Arria II device through the JTAG
interface.
2. Encrypt the configuration file and store it in the external memory.
Encrypt the configuration file with the same 256-bit keys used to program the
Arria II device. Encryption of the configuration file is done using the Quartus II
software. The encrypted configuration file is then loaded into the external
memory, such as a configuration or flash device.
3. Configure the Arria II device.
At system power-up, the external memory device sends the encrypted configuration
file to the Arria II device.
Figure 9–29. Design Security (Note 1)
User-Defined
AES Key
Step 1
Arria II FPGA
Key Storage
AES
Decryption
Step 3
Encrypted
Configuration
File
Step 2
Memory or
Configuration
Device
Note to Figure 9–29:
(1) Step 1, Step 2, and Step 3 correspond to the procedure described in “Design Security” on page 9–61.
Arria II Device Handbook Volume 1: Device Interfaces and Integration
July 2012 Altera Corporation