Arria® V Device Handbook: Volume 1: Device Interfaces and Integration

ID 683213
Date 10/18/2023
Public
Document Table of Contents

8.13.5. Design Security Implementation Steps

Figure 214. Design Security Implementation Steps


To carry out secure configuration, follow these steps:

  1. The Intel® Quartus® Prime software generates the design security key programming file and encrypts the configuration data using the user-defined 256-bit security key.
  2. Store the encrypted configuration file in the external memory.
  3. Program the AES key programming file into the Arria® V device through a JTAG interface.
  4. Configure the Arria® V device. At the system power-up, the external memory device sends the encrypted configuration file to the Arria® V device.