Visible to Intel only — GUID: sss1394438392190
Ixiasoft
1. Intel® MAX® 10 FPGA Configuration Overview
2. Intel® MAX® 10 FPGA Configuration Schemes and Features
3. Intel® MAX® 10 FPGA Configuration Design Guidelines
4. Intel® MAX® 10 FPGA Configuration IP Core Implementation Guides
5. Dual Configuration Intel® FPGA IP Core References
6. Unique Chip ID Intel® FPGA IP Core References
7. Document Revision History for the Intel® MAX® 10 FPGA Configuration User Guide
3.1. Dual-Purpose Configuration Pins
3.2. Configuring Intel® MAX® 10 Devices using JTAG Configuration
3.3. Configuring Intel® MAX® 10 Devices using Internal Configuration
3.4. Implementing ISP Clamp in Intel® Quartus® Prime Software
3.5. Accessing Remote System Upgrade through User Logic
3.6. Error Detection
3.7. Enabling Data Compression
3.8. AES Encryption
3.9. Intel® MAX® 10 JTAG Secure Design Example
Visible to Intel only — GUID: sss1394438392190
Ixiasoft
2.2.2.1. AES Encryption Protection
The Intel® MAX® 10 design security feature provides the following security protection for your designs:
- Helps protect against copying—the non-volatile key is securely stored in the Intel® MAX® 10 devices and cannot be read through any interface. Without this key, attackers are unable to decrypt the encrypted configuration image.
- Helps resist reverse engineering—reverse engineering from an encrypted configuration file is very difficult and time consuming because the file requires decryption.
- Helps defend against tampering—after you enable the JTAG Secure and Encrypted POF (EPOF) only, the Intel® MAX® 10 device can only accept configuration files encrypted with the same key. Additionally, configuration through the JTAG interface is blocked.
Related Information