Specifications

June 2012 Altera Corporation
AN-556-2.1 Application Notes
© 2012 Altera Corporation. All rights reserved. ALTERA, ARRIA, CYCLONE, HARDCOPY, MAX, MEGACORE, NIOS,
QUARTUS and STRATIX words and logos are trademarks of Altera Corporation and registered in the U.S. Patent and Trademark
Office and in other countries. All other words and logos identified as trademarks or service marks are the property of their
respective holders as described at www.altera.com/common/legal.html. Altera warrants performance of its semiconductor
products to current specifications in accordance with Altera's standard warranty, but reserves the right to make changes to any
products and services at any time without notice. Altera assumes no responsibility or liability arising out of the application or use
of any information, product, or service described herein except as expressly agreed to in writing by Altera. Altera customers are
advised to obtain the latest version of device specifications before relying on any published information and before placing orders
for products or services.
101 Innovation Drive
San Jose, CA 95134
www.altera.com
Subscribe
ISO
9001:2008
Registered
Using the Design Security Features in
Altera FPGAs
This application note describes how you can use the design security features in
Altera
®
40- and 28-nm FPGAs to protect your designs against unauthorized copying,
reverse engineering, and tampering of your configuration files. This application note
provides the hardware and software requirements for the 40- and 28-nm FPGAs
design security features. This application note also provides steps for implementing a
secure configuration flow.
1 This application note uses the term “40-nm” or “28-nm” FPGAs. Table 1 lists the
supported FPGAs and its applicable devices.
This application note covers the following topics:
“Overview of the Design Security Feature” on page 2
“Hardware and Software Requirements” on page 5
“Steps for Implementing a Secure Configuration Flow” on page 6
“Supported Configuration Schemes” on page 25
“Security Mode Verification” on page 27
“Serial FlashLoader Support with Encryption Enabled” on page 29
“JTAG Secure Mode for 28-nm FPGAs” on page 32
“US Export Controls” on page 32
In the highly competitive commercial and military environments, design security is
an important consideration for digital designers. As FPGAs start to play a role in
larger and more critical system components, it is ever more important to protect the
designs from unauthorized copying, reverse engineering, and tampering. FPGAs
address these concerns with the ability to decrypt a configuration bitstream using the
256-bit Advanced Encryption Standard (AES) algorithm, an industry standard
encryption algorithm.
Table 1. Supported FPGAs
FPGA Devices
40 nm Arria
®
II and Stratix
®
IV
28 nm Stratix V, Arria V, and Cyclone
®
V

Summary of content (34 pages)