Visible to Intel only — GUID: bhc1410500770713
Ixiasoft
Overview of the Design Security Feature
Hardware and Software Requirements
Steps for Implementing a Secure Configuration Flow
Steps to Enable Tamper-Protection Bit Programming
Supported Configuration Schemes
Security Mode Verification
Serial Flash Loader Support with Encryption Enabled
Serial Flash Loader Support with Encryption Enabled for Single FPGA Device Chain
JTAG Secure Mode for 28-nm and 20-nm FPGAs
Document Revision History for AN 556: Using the Design Security Features in Intel® FPGAs
Generating Single-Device .ekp File and Encrypting Configuration File using Intel® Quartus® Prime Software
Generating Single-Device .ekp File and Encrypting Configuration File using Command-Line Interface in Intel® Quartus® Prime Software
Generating Multi-Device .ekp File and Encrypting Configuration File using Intel® Quartus® Prime Software
Programming Volatile or Non-Volatile Key using Intel® FPGA Ethernet Cable and Intel® Quartus® Prime Software
Programming Single-Device Volatile or Non-Volatile Key using Intel® Quartus® Prime Software
Programming Single-Device Volatile or Non-Volatile Key using the Command-Line Interface in Intel® Quartus® Prime Software
Programming Multi-Device Volatile or Non-Volatile Key using Intel® Quartus® Prime Software
Programming Multi-Device Volatile or Non-Volatile Key using the Command-Line Interface in Intel® Quartus® Prime Software
Programming Key using JTAG Technologies
Visible to Intel only — GUID: bhc1410500770713
Ixiasoft
Programming Multi-Device Volatile or Non-Volatile Key using Intel® Quartus® Prime Software
To perform multi-device volatile or non-volatile key programming using the Intel® Quartus® Prime software through the Intel® FPGA Ethernet Cable, follow these steps:
- Repeat step 1–step 5 in Programming Single-Device Volatile or Non-Volatile Key using Intel Quartus Prime Software.
- Click Add File. The Select Programmer File dialog box appears.
- Programming using single-device .ekp files:
Note: For the correct sequence of the devices in the same JTAG chain, you can use the Auto-Detect option in the Intel® Quartus® Prime programmer.
- Programming using a multi-device .jam file:
- Type <multi_device>.jam in the File name field.
- Click Open.
- Highlight the .jam file you added and click Program/Configure.
- Programming using single-device .ekp files:
- Repeat step 8–step 10 of Programming Single-Device Volatile or Non-Volatile Key using Intel Quartus Prime Software to perform volatile or non-volatile key programming.
- Click Start to program the key.
Note: The Intel® Quartus® Prime software message window provides information about the success or failure of the key programming operation.