English
Language : 

EP4SE360F35I4 Datasheet, PDF (405/432 Pages) Altera Corporation – This section provides a complete overview of all features relating to the Stratix IV device family, which is the most architecturlly advanced
Chapter 10: Configuration, Design Security, and Remote System Upgrades in Stratix IV Devices
Design Security
10–69
Table 10–21 lists the configuration modes allowed in each of the security modes.
Table 10–21. Allowed Configuration Modes for Various Security Modes (Note 1)
Security Mode
Configuration
File
Allowed Configuration Modes
No key
Unencrypted All configuration modes that do not engage the design security feature.
■ Passive serial with AES (and/or with decompression)
Secure with volatile key
Encrypted
■ Fast passive parallel with AES (and/or with decompression)
■ Remote update fast AS with AES (and/or with decompression)
■ Fast AS (and/or with decompression)
Board-level testing with
volatile key
Unencrypted All configuration modes that do not engage the design security feature.
■ Passive serial with AES (and/or with decompression)
Secure with non-volatile key
Encrypted
■ Fast passive parallel with AES (and/or with decompression)
■ Remote update fast AS with AES (and/or with decompression)
■ Fast AS (and/or with decompression)
Board-level testing with
non-volatile key
Unencrypted All configuration modes that do not engage the design security feature.
Secure in tamper resistant
mode using non-volatile key
with tamper protection set
Encrypted
■ Passive serial with AES (and/or with decompression)
■ Fast passive parallel with AES (and/or with decompression)
■ Remote update fast AS with AES (and/or with decompression)
■ Fast AS (and/or with decompression)
Note to Table 10–21:
(1) There is no impact to the configuration time required when compared with unencrypted configuration modes except FPP with AES (and/or
decompression), which requires a DCLK that is ×4 the data rate.
You can use the design security feature with other configuration features, such as
compression and remote system upgrade features. When you use compression with
the design security feature, the configuration file is first compressed and then
encrypted using the Quartus II software. During configuration, the Stratix IV device
first decrypts and then decompresses the configuration file.
Document Revision History
Table 10–22 lists the revision history for this chapter.
Table 10–22. Document Revision History (Part 1 of 2)
Date
September 2012
December 2011
Version
Changes
■ Updated the “FPP Configuration Using a MAX II Device as an External Host” section to
close FB #36583 and #63157.
■ Updated the “Estimating Active Serial Configuration Time” section to close FB #64163.
3.5 ■ Updated the “PS Configuration Using a MAX II Device as an External Host” section to
close FB #63157.
■ Updated Figure 10–1, Figure 10–2, Figure 10–3, Figure 10–10,Figure 10–11 and
Figure 10–12 to close FB #63155.
3.4 Updated Table 10–2 and Table 10–7.
September 2012 Altera Corporation
Stratix IV Device Handbook
Volume 1