Visible to Intel only — GUID: ska1551901788382
Ixiasoft
1. Overview of the Intel Agilex® 7 FPGAs and SoCs
2. Intel Agilex® 7 FPGAs and SoCs Family Plan
3. Second Generation Intel® Hyperflex™ Core Architecture
4. Adaptive Logic Module in Intel Agilex® 7 FPGAs and SoCs
5. Internal Embedded Memory in Intel Agilex® 7 FPGAs and SoCs
6. Variable-Precision DSP in Intel Agilex® 7 FPGAs and SoCs
7. Core Clock Network in Intel Agilex® 7 FPGAs and SoCs
8. General Purpose I/Os in Intel Agilex® 7 FPGAs and SoCs
9. I/O PLLs in Intel Agilex® 7 FPGAs and SoCs
10. External Memory Interface in Intel Agilex® 7 FPGAs and SoCs
11. Hard Processor System in Intel Agilex® 7 SoCs
12. Heterogeneous 3D SiP Transceivers in Intel Agilex® 7 FPGAs and SoCs
13. Heterogeneous 3D Stacked HBM2E DRAM Memory in Intel Agilex® 7 FPGAs and SoCs M-Series
14. High-Performance Crypto Blocks in Intel Agilex® 7 FPGAs and SoCs F-Series and I-Series
15. Configuration via Protocol Using PCIe* for Intel Agilex® 7 FPGAs and SoCs
16. Device Configuration and the SDM in Intel Agilex® 7 FPGAs and SoCs
17. Partial and Dynamic Configuration of Intel Agilex® 7 FPGAs and SoCs
18. Device Security for Intel Agilex® 7 FPGAs and SoCs
19. SEU Error Detection and Correction in Intel Agilex® 7 FPGAs and SoCs
20. Power Management for Intel Agilex® 7 FPGAs and SoCs
21. Intel® Software and Tools for Intel Agilex® 7 FPGAs and SoCs
22. Revision History for the Intel Agilex® 7 FPGAs and SoCs Device Overview
Visible to Intel only — GUID: ska1551901788382
Ixiasoft
1.20. Device Security
Building on top of the robust security features present in the previous generation devices, Intel® Agilex™ FPGAs and SoCs include a number of new and innovative security enhancements. These features are also managed by the SDM, tightly coupling the device configuration and reconfiguration with encryption, authentication, key storage, and anti-tamper services.
The security services that the SDM provides include:
- Bitstream encryption
- Multi-factor authentication
- Hard encryption and authentication acceleration: AES-256, SHA-256/384, and ECDSA-256/384
- Volatile and non-volatile encryption key storage and management
- Physically unclonable function (PUF) service
- Updatable configuration process
- Secure device maintenance and upgrade functions
- Side-channel attack protection
- Scripted response to sensor inputs and security attacks, including selective sector zeroization
- Readback, JTAG and test mode disable
- Enhanced response to SEUs
- Platform attestation
- Cryptography as a Service (CaaS)