欢迎访问ic37.com |
会员登录 免费注册
发布采购

EP3C16Q164C6ES 参数 Datasheet PDF下载

EP3C16Q164C6ES图片预览
型号: EP3C16Q164C6ES
PDF下载: 下载PDF文件 查看货源
内容描述: 的Cyclone III器件手册 [Cyclone III Device Handbook]
分类和应用:
文件页数/大小: 274 页 / 7308 K
品牌: ALTERA [ ALTERA CORPORATION ]
 浏览型号EP3C16Q164C6ES的Datasheet PDF文件第225页浏览型号EP3C16Q164C6ES的Datasheet PDF文件第226页浏览型号EP3C16Q164C6ES的Datasheet PDF文件第227页浏览型号EP3C16Q164C6ES的Datasheet PDF文件第228页浏览型号EP3C16Q164C6ES的Datasheet PDF文件第230页浏览型号EP3C16Q164C6ES的Datasheet PDF文件第231页浏览型号EP3C16Q164C6ES的Datasheet PDF文件第232页浏览型号EP3C16Q164C6ES的Datasheet PDF文件第233页  
Chapter 9: Configuration, Design Security, and Remote System Upgrades in the Cyclone III Device Family
Design Security
9–71
Security Against Copying
The volatile key is securely stored in the Cyclone III LS device and cannot be read out
through any interfaces. The information of your design cannot be copied because the
configuration file read-back feature is not supported in Cyclone III LS devices.
Security Against Reverse Engineering
Reverse engineering from an encrypted configuration file is very difficult and time
consuming because Cyclone III LS configuration file formats are proprietary and the
file contains million of bits which require specific decryption. Reverse engineering the
Cyclone III LS device is just as difficult because the device is manufactured on the
advanced 60-nm process technology.
Security Against Tampering
Cyclone III LS devices support the following anti-tamper features:
Ability to limit JTAG instruction set and provides protection against configuration
data readback over the JTAG port
Ability to clear contents of FPGA logic, configuration memory, user memory, and
volatile key
Error detection (ED) cycle indicator to core Cyclone III LS devices provide a pass
or fail indicator at every ED cycle and visibility over intentional or unintentional
change of CRAM bits.
f
For more information about anti-tamper protection for Cyclone III LS devices, refer to
f
For more information about the implementation of secure configuration flow in
Quartus II, refer to
AES Decryption Block
The main purpose of the AES decryption block is to decrypt the configuration
bitstream prior to entering configuration. Prior to receiving encrypted data, you must
enter and store the 256-bit volatile key in the device with battery backup. The key is
scrambled prior to storing it in the key storage to make it more difficult for anyone to
retrieve the stored key using de-capsulation of the device.
Key Storage
Cyclone III LS devices support volatile key programming.
lists the volatile
key features.
Table 9–24. Security Key Features
Volatile Key Features
Key programmability
External battery
Key programming method
(Part 1 of 2)
Description
Reprogrammable and erasable
Required
On-board
August 2012
Altera Corporation
Cyclone III Device Handbook
Volume 1