|
EP4SE360F35I4 Datasheet, PDF (405/432 Pages) Altera Corporation – This section provides a complete overview of all features relating to the Stratix IV device family, which is the most architecturlly advanced | |||
|
◁ |
Chapter 10: Configuration, Design Security, and Remote System Upgrades in Stratix IV Devices
Design Security
10â69
Table 10â21 lists the configuration modes allowed in each of the security modes.
Table 10â21. Allowed Configuration Modes for Various Security Modes (Note 1)
Security Mode
Configuration
File
Allowed Configuration Modes
No key
Unencrypted All configuration modes that do not engage the design security feature.
â Passive serial with AES (and/or with decompression)
Secure with volatile key
Encrypted
â Fast passive parallel with AES (and/or with decompression)
â Remote update fast AS with AES (and/or with decompression)
â Fast AS (and/or with decompression)
Board-level testing with
volatile key
Unencrypted All configuration modes that do not engage the design security feature.
â Passive serial with AES (and/or with decompression)
Secure with non-volatile key
Encrypted
â Fast passive parallel with AES (and/or with decompression)
â Remote update fast AS with AES (and/or with decompression)
â Fast AS (and/or with decompression)
Board-level testing with
non-volatile key
Unencrypted All configuration modes that do not engage the design security feature.
Secure in tamper resistant
mode using non-volatile key
with tamper protection set
Encrypted
â Passive serial with AES (and/or with decompression)
â Fast passive parallel with AES (and/or with decompression)
â Remote update fast AS with AES (and/or with decompression)
â Fast AS (and/or with decompression)
Note to Table 10â21:
(1) There is no impact to the configuration time required when compared with unencrypted configuration modes except FPP with AES (and/or
decompression), which requires a DCLK that is Ã4 the data rate.
You can use the design security feature with other configuration features, such as
compression and remote system upgrade features. When you use compression with
the design security feature, the configuration file is first compressed and then
encrypted using the Quartus II software. During configuration, the Stratix IV device
first decrypts and then decompresses the configuration file.
Document Revision History
Table 10â22 lists the revision history for this chapter.
Table 10â22. Document Revision History (Part 1 of 2)
Date
September 2012
December 2011
Version
Changes
â Updated the âFPP Configuration Using a MAX II Device as an External Hostâ section to
close FB #36583 and #63157.
â Updated the âEstimating Active Serial Configuration Timeâ section to close FB #64163.
3.5 â Updated the âPS Configuration Using a MAX II Device as an External Hostâ section to
close FB #63157.
â Updated Figure 10â1, Figure 10â2, Figure 10â3, Figure 10â10,Figure 10â11 and
Figure 10â12 to close FB #63155.
3.4 Updated Table 10â2 and Table 10â7.
September 2012 Altera Corporation
Stratix IV Device Handbook
Volume 1
|
▷ |