Visible to Intel only — GUID: bhc1410500768899
Ixiasoft
Overview of the Design Security Feature
Hardware and Software Requirements
Steps for Implementing a Secure Configuration Flow
Steps to Enable Tamper-Protection Bit Programming
Supported Configuration Schemes
Security Mode Verification
Serial Flash Loader Support with Encryption Enabled
Serial Flash Loader Support with Encryption Enabled for Single FPGA Device Chain
JTAG Secure Mode for 28-nm and 20-nm FPGAs
Document Revision History for AN 556: Using the Design Security Features in Intel® FPGAs
Generating Single-Device .ekp File and Encrypting Configuration File using Intel® Quartus® Prime Software
Generating Single-Device .ekp File and Encrypting Configuration File using Command-Line Interface in Intel® Quartus® Prime Software
Generating Multi-Device .ekp File and Encrypting Configuration File using Intel® Quartus® Prime Software
Programming Volatile or Non-Volatile Key using Intel® FPGA Ethernet Cable and Intel® Quartus® Prime Software
Programming Single-Device Volatile or Non-Volatile Key using Intel® Quartus® Prime Software
Programming Single-Device Volatile or Non-Volatile Key using the Command-Line Interface in Intel® Quartus® Prime Software
Programming Multi-Device Volatile or Non-Volatile Key using Intel® Quartus® Prime Software
Programming Multi-Device Volatile or Non-Volatile Key using the Command-Line Interface in Intel® Quartus® Prime Software
Programming Key using JTAG Technologies
Visible to Intel only — GUID: bhc1410500768899
Ixiasoft
Programming Single-Device Volatile or Non-Volatile Key using the Command-Line Interface in Intel® Quartus® Prime Software
To perform single-device volatile or non-volatile key programming using the Intel® Quartus® Prime software command-line interface through the Intel® FPGA Ethernet Cable, follow these steps:
- Perform step 1 of Programming Single-Device Volatile or Non-Volatile Key using Intel Quartus Prime Software.
- To determine the Intel® FPGA Ethernet Cable cable port number that is connected to the JTAG server, type quartus_jli -n at the command-line prompt.
- With the single_ekp.jam file generated in Step 1: Generating .ekp File and Encrypting Configuration File, execute volatile or non-volatile key programming to a single FPGA with the following command line:
-
Volatile key programming:
quartus_jli -c<n> single_ekp.jam -aKEY_CONFIGURE
-
Non-volatile key programming:
quartus_jli -c<n> single_ekp.jam -aKEY_PROGRAM
<n> is the port number returned with the -n option.
Note: The Intel® Quartus® Prime software command-line provides information about the success or failure of the key programming operation. -
Related Information