Visible to Intel only — GUID: bhc1410500739624
Ixiasoft
Overview of the Design Security Feature
Hardware and Software Requirements
Steps for Implementing a Secure Configuration Flow
Steps to Enable Tamper-Protection Bit Programming
Supported Configuration Schemes
Security Mode Verification
Serial Flash Loader Support with Encryption Enabled
Serial Flash Loader Support with Encryption Enabled for Single FPGA Device Chain
JTAG Secure Mode for 28-nm and 20-nm FPGAs
Document Revision History for AN 556: Using the Design Security Features in Intel® FPGAs
Generating Single-Device .ekp File and Encrypting Configuration File using Intel® Quartus® Prime Software
Generating Single-Device .ekp File and Encrypting Configuration File using Command-Line Interface in Intel® Quartus® Prime Software
Generating Multi-Device .ekp File and Encrypting Configuration File using Intel® Quartus® Prime Software
Programming Volatile or Non-Volatile Key using Intel® FPGA Ethernet Cable and Intel® Quartus® Prime Software
Programming Single-Device Volatile or Non-Volatile Key using Intel® Quartus® Prime Software
Programming Single-Device Volatile or Non-Volatile Key using the Command-Line Interface in Intel® Quartus® Prime Software
Programming Multi-Device Volatile or Non-Volatile Key using Intel® Quartus® Prime Software
Programming Multi-Device Volatile or Non-Volatile Key using the Command-Line Interface in Intel® Quartus® Prime Software
Programming Key using JTAG Technologies
Visible to Intel only — GUID: bhc1410500739624
Ixiasoft
Key Programming
Programming Procedure | Method | Programming Tool/Support |
---|---|---|
On-Board Programming | Prototyping | Intel® FPGA Ethernet Cable 6, JTAG Technologies 7, Intel® FPGA Parallel Port Cable 8, Intel® FPGA Download Cable 9, and Intel® FPGA Download Cable II 10. |
Production | JTAG Technologies* | |
Off-Board Programming | Prototyping | System General* |
Production | System General* |
Key programming uses the following definitions:
- On-board: procedure in which the device is programmed on your board
- Off-board: procedure in which the device is programmed on a separate programming system
- Prototyping: method initially used to verify proper operation of a particular method
- Production: method used for large-volume production
Note: For other third-party non-volatile key programming, you must regulate the JTAG TCK pulse width (period) for proper polyfuse programming, as listed in Table 10.
Related Information
6 Intel® FPGA Ethernet Cable supports both volatile and non-volatile key programming.
7 JTAG Technologies* supports both volatile and non-volatile key programming.
8 Intel® FPGA Parallel Port Cable supports only volatile key programming.
9 Intel® FPGA Download Cable support only volatile key programming except in 20-nm FPGAs, where it supports both volatile and non-volatile key programming.
10 Intel® FPGA Download Cable II supports both volatile and non-volatile key programming.