Visible to Intel only — GUID: sam1403479093745
Ixiasoft
Visible to Intel only — GUID: sam1403479093745
Ixiasoft
7.13.3. Security Key Types
Cyclone® V devices offer two types of keys—volatile and non-volatile. The following table lists the differences between the volatile key and non-volatile keys.
Key Types | Key Programmability | Power Supply for Key Storage | Programming Method |
---|---|---|---|
Volatile |
|
Required external battery, VCCBAT 24 | On-board |
Non-volatile | One-time programming | Does not require an external battery | On-board and in-socket programming 25 |
Both non-volatile and volatile key programming offers protection from reverse engineering and copying. If you set the tamper-protection bit, the design is also protected from tampering.
You can perform key programming through the JTAG pins interface. Ensure that the nSTATUS pin is released high before any key-programming attempts.
Did you find the information on this page useful?
Feedback Message
Characters remaining: