English
Language : 

EP4SE360F35I4 Datasheet, PDF (403/432 Pages) Altera Corporation – This section provides a complete overview of all features relating to the Stratix IV device family, which is the most architecturlly advanced
Chapter 10: Configuration, Design Security, and Remote System Upgrades in Stratix IV Devices
Design Security
10–67
At system power-up, the external memory device sends the encrypted configuration
file to the Stratix IV device.
Figure 10–29. Design Security (Note 1)
User-Defined
AES Key
Step 1
Stratix IV Device
Key Storage
AES
Decryption
Step 3
Encrypted
Configuration
File
Step 2
Memory or
Configuration
Device
Note to Figure 10–29:
(1) Step 1, Step 2, and Step 3 correspond to the procedure described in “Design Security” on page 10–63.
Security Modes Available
The following security modes are available on the Stratix IV device.
Volatile Key
Secure operation with volatile key programmed and required external battery: this
mode accepts both encrypted and unencrypted configuration bitstreams. Use the
unencrypted configuration bitstream support for board-level testing only.
Non-Volatile Key
Secure operation with one time programmable (OTP) security key programmed: this
mode accepts both encrypted and unencrypted configuration bitstreams. Use the
unencrypted configuration bitstream support for board level testing only.
Non-Volatile Key with Tamper Protection Bit Set
Secure operation in tamper resistant mode with OTP security key programmed: only
encrypted configuration bitstreams are allowed to configure the device. Tamper
protection disables JTAG configuration with unencrypted configuration bitstream.
September 2012 Altera Corporation
Stratix IV Device Handbook
Volume 1