English
Language : 

EP4SE360F35I4 Datasheet, PDF (402/432 Pages) Altera Corporation – This section provides a complete overview of all features relating to the Stratix IV device family, which is the most architecturlly advanced
10–66
Chapter 10: Configuration, Design Security, and Remote System Upgrades in Stratix IV Devices
Design Security
Table 10–19. Security Key Options (Part 2 of 2)
Options
Volatile Key
Design protection
Secure against copying and
reverse engineering
Note to Table 10–19:
(1) Key programming is carried out using the JTAG interface.
Non-Volatile Key
Secure against copying and
reverse engineering. Tamper
resistant if tamper protection
bit is set.
You can program the non-volatile key to the Stratix IV device without an external
battery. Also, there are no additional requirements to any of the Stratix IV power
supply inputs.
VCCBAT is a dedicated power supply for volatile key storage and not shared with other
on-chip power supplies, such as VCCIO or VCC. VCCBAT continuously supplies power to
the volatile register regardless of the on-chip supply condition.
1 After power-up, you must wait 300 ms (PORSEL = 0) or 12 ms (PORSEL = 1) before
beginning key programming to ensure that VCCBAT is at full rail.
1 For more information about how to calculate the key retention time of the battery
used for volatile key storage, refer to the Stratix III, Stratix IV, Stratix V, HardCopy III
and HardCopy IV PowerPlay Early Power Estimator.
f For more information about battery specifications, refer to the DC and Switching
Characteristics for Stratix IV Devices chapter.
f For more information about the VCCBAT pin connection recommendations, refer to the
Stratix IV GX and Stratix IV E Device Family Pin Connection Guidelines.
Stratix IV Design Security Solution
Stratix IV devices are SRAM-based devices. To provide design security, Stratix IV
devices require a 256-bit security key for configuration bitstream encryption.
You can carry out secure configuration in the following steps, as shown in
Figure 10–29:
1. Program the security key into the Stratix IV device.
2. Program the user-defined 256-bit AES keys to the Stratix IV device through the
JTAG interface.
3. Encrypt the configuration file and store it in the external memory.
4. Encrypt the configuration file with the same 256-bit keys used to program the
Stratix IV device. Encryption of the configuration file is done using the Quartus II
software. The encrypted configuration file is then loaded into the external
memory, such as a configuration or flash device.
5. Configure the Stratix IV device.
Stratix IV Device Handbook
Volume 1
September 2012 Altera Corporation