Quartus® Prime Pro Edition User Guide: Programmer

ID 683039
Date 9/30/2024
Public
Document Table of Contents

1.3.2. Specifying Additional Physical Security Settings (Programming File Generator)

Stratix® 10 and Agilex™ 7 devices can store security and other configuration settings in eFuses. You can enable additional physical security settings in eFuses to extend the level of device security protection.

To specify additional physical device security settings, follow these steps:

  1. Click Assignments > Device > Device and Pin Options > Security.
  2. On the Security tab, specify the First Level Signature Chain .qky file that contains the root key and one or more design signing keys for the Quartus key file setting.
  3. Click the More Options button and specify any of the following:
    Figure 17. More Security Options Dialog Box
    Table 8.  More Security Options Dialog Box Settings
    Option Description Values
    Disable JTAG Disables JTAG command and configuration of the device. Setting this eliminates JTAG as mode of attack, but also eliminates boundary scan functionality.
    • Off—inactive
    • On—active until wipe of containing design
    • On sticky—active until next POR
    • On check—checks for corresponding blown fuse
    Force SDM clock to internal oscillator Disables an external clock source for the SDM. The SDM must use the internal oscillator. Using an internal oscillator is more secure than allowing an external clock source for configuration.
    Force encryption key update Specifies that the encryption key must update by the frequency that you specify for the Encryption update ratio option. The default ration value is 31:1. Encryption supports up to 20 intermediate keys.
    Disable virtual eFuses Disables the eFuse virtual programming capability.
    Lock security eFuses Causes eFuse failure if the eFuse CRC does not match the calculated value.
    Disable HPS debug Disables debugging through the JTAG interface to access the HPS.
    Disable encryption key in eFuses Specifies that the device cannot use an AES key stored in eFuses. Rather, you can provide an extra level of security by storing the AES key in BBRAM.
    Disable encryption key in BBRAM Specifies that the device cannot use AES key stored in BBRAM. Rather, you can provide an extra level of security when you store the AES key in eFuses.
  4. Click OK.