10–66
Table 10–19. Security Key Options (Part 2 of 2)
Design protection
Note to
(1) Key programming is carried out using the JTAG interface.
You can program the non-volatile key to the Stratix IV device without an external
battery. Also, there are no additional requirements to any of the Stratix IV power
supply inputs.
V
CCBAT
on-chip power supplies, such as V
the volatile register regardless of the on-chip supply condition.
1
After power-up, you must wait 300 ms (PORSEL = 0) or 12 ms (PORSEL = 1) before
beginning key programming to ensure that V
1
For more information about how to calculate the key retention time of the battery
used for volatile key storage, refer to the
and HardCopy IV PowerPlay Early Power
f
For more information about battery specifications, refer to the
Characteristics for Stratix IV Devices
f
For more information about the V
Stratix IV GX and Stratix IV E Device Family Pin Connection
Stratix IV Design Security Solution
Stratix IV devices are SRAM-based devices. To provide design security, Stratix IV
devices require a 256-bit security key for configuration bitstream encryption.
You can carry out secure configuration in the following steps, as shown in
Figure
1. Program the security key into the Stratix IV device.
2. Program the user-defined 256-bit AES keys to the Stratix IV device through the
JTAG interface.
3. Encrypt the configuration file and store it in the external memory.
4. Encrypt the configuration file with the same 256-bit keys used to program the
Stratix IV device. Encryption of the configuration file is done using the Quartus II
software. The encrypted configuration file is then loaded into the external
memory, such as a configuration or flash device.
5. Configure the Stratix IV device.
Stratix IV Device Handbook
Volume 1
Chapter 10: Configuration, Design Security, and Remote System Upgrades in Stratix IV Devices
Options
Secure against copying and
reverse engineering
Table
10–19:
is a dedicated power supply for volatile key storage and not shared with other
10–29:
Volatile Key
or V
. V
continuously supplies power to
CCIO
CC
CCBAT
is at full rail.
CCBAT
Stratix III, Stratix IV, Stratix V, HardCopy III
Estimator.
chapter.
pin connection recommendations, refer to the
CCBAT
Design Security
Non-Volatile Key
Secure against copying and
reverse engineering. Tamper
resistant if tamper protection
bit is set.
DC and Switching
Guidelines.
September 2012 Altera Corporation
Need help?
Do you have a question about the Stratix IV and is the answer not in the manual?