欢迎访问ic37.com |
会员登录 免费注册
发布采购

EP3C16Q144C6ES 参数 Datasheet PDF下载

EP3C16Q144C6ES图片预览
型号: EP3C16Q144C6ES
PDF下载: 下载PDF文件 查看货源
内容描述: 的Cyclone III器件手册 [Cyclone III Device Handbook]
分类和应用:
文件页数/大小: 274 页 / 7308 K
品牌: ALTERA [ ALTERA CORPORATION ]
 浏览型号EP3C16Q144C6ES的Datasheet PDF文件第227页浏览型号EP3C16Q144C6ES的Datasheet PDF文件第228页浏览型号EP3C16Q144C6ES的Datasheet PDF文件第229页浏览型号EP3C16Q144C6ES的Datasheet PDF文件第230页浏览型号EP3C16Q144C6ES的Datasheet PDF文件第232页浏览型号EP3C16Q144C6ES的Datasheet PDF文件第233页浏览型号EP3C16Q144C6ES的Datasheet PDF文件第234页浏览型号EP3C16Q144C6ES的Datasheet PDF文件第235页  
Chapter 9: Configuration, Design Security, and Remote System Upgrades in the Cyclone III Device Family
Design Security
9–73
The Cyclone III LS design security feature provides routing architecture optimization
for design separation flow with the Quartus II software. Design separation flow
achieves both physical and functional isolation between design partitions.
f
For more information about the design separation flow, refer to
You can carry out secure configuration in Steps
1–3,
as shown in
1. Generate the encryption key programming file and encrypt the configuration data.
The Quartus II configuration software uses the user-defined 256-bit volatile keys
to generate a key programming file and an encrypted configuration file. The
encrypted configuration file is stored in an external memory, such as a flash
memory or a configuration device.
2. Program the volatile key into the Cyclone III LS device.
Program the user-defined 256-bit volatile keys into the Cyclone III LS device
through the JTAG interface.
3. Configure the Cyclone III LS device.
At system power-up, the external memory device sends the encrypted
configuration file to the Cyclone III LS device.
Figure 9–31. Cyclone III LS Secure Configuration Flow
Step 1. Generate
the
Encryption Key Programming File
Encrypt Configuration Data and Store in External Memory
Step 3. Configure
the
Cyclone III LS Device
Using Encrypted Configuration Data
Quartus II
Configuration
Data
AES
Encryptor
Encrypted
Configuration
Data
Encryption Key
Programming File
Memory
Storage
Encrypted
Configuration
Data
Encrypted
Configuration
Data
FPGA
AES
Decryptor
Volatile
Key Storage
Volatile
Key
Volatile
Key
Step 2. Program Volatile Key into
Cyclone III LS Device
Note to
(1) Step 1, Step 2, and Step 3 correspond to the procedure detailed in
Available Security Modes
There are several security modes available on Cyclone III LS devices, they are:
Volatile Key
No Key Operation
FACTORY
Mode
Volatile Key
Secure operation with volatile key programmed and required external battery—this
mode accepts both encrypted and unencrypted configuration bitstreams. Use the
unencrypted configuration bitstream support for board-level testing only.
August 2012
Altera Corporation
Cyclone III Device Handbook
Volume 1