Fuse Programming Input Files - Intel Stratix 10 User Manual

Device security
Hide thumbs Also See for Stratix 10:
Table of Contents

Advertisement

7. Using eFuses
UG-S10SECURITY | 2019.05.10
Complete the following steps to validate eFuses:
1. Turn on Enable device security using a volatile security key in the Intel
Quartus Prime Programmer. When you select this option the Intel Quartus Prime
Pro Edition stores the eFuse values in firmware registers.
2. In the Intel Quartus Prime Programmer click Add File and browse to your signed
bitstream.
3. In the Intel Quartus Prime Programmer turn on the Program/Configure and
Examine options.
4. Click Start.
5. After programming completes, the Programmer displays the hash value of the
signature key stored in firmware. You can now compare that value to the value
you generate by creating a
command with the operation set to
Related Information
Step 5b: Calculating the Owner Public Root Key Hash

7.1. Fuse Programming Input Files

The Intel Quartus Prime Programmer supports the following three input file types for
fuse programming. Intel Quartus Prime key file
encryption key
The files provide the following information to the Intel Quartus Prime Programmer:
.qky
key for firmware authentication. Use this file for the following functions:
— To program and verify the public root key fuses
— To sign the owner configuration bitstream
— To sign the device firmware
.qek
functions:
— To program and verify the AES key fuses
— To encrypt the owner configuration bitstream
.fuse
key which are read-only. Use this file for the following functions:
— To program and verify security fuses
— To program owner-defined fuses
Send Feedback
hash_fuse.txt
, and the
(.qek)
: Provides the owner public root key for authentication and the second-level
: Provides the AES key for encryption. Use this file for the following
: Specifies all owner fuses. Also includes the public root key and the AES
file using the
.
fuse_info
on page 22
, the Intel Quartus Prime
(.qky)
file.
.fuse
®
Intel
quartus_sign
®
Stratix
10 Device Security User Guide
43

Advertisement

Table of Contents
loading

Table of Contents