Visible to Intel only — GUID: sva1616589462071
Ixiasoft
3.3.1. Configuration Bitstream Encryption Using the Programming File Generator Graphical Interface
3.3.2. Configuration Bitstream Encryption Using the Programming File Generator Command Line Interface
3.3.3. Partially Encrypted Configuration Bitstream Generation Using the Command Line Interface
3.3.4. Partial Reconfiguration Bitstream Encryption
Visible to Intel only — GUID: sva1616589462071
Ixiasoft
4.5.2. Intrinsic ID® PUF AES Root Key Provisioning
Implementing the Intrinsic* ID PUF wrapped AES Key includes the following steps:
- Enrolling the Intrinsic ID PUF via JTAG.
- Wrapping the AES root key.
- Programming the helper data and wrapped key into quad SPI flash memory.
- Querying the Intrinsic ID PUF activation status.
The use of Intrinsic ID technology requires a separate license agreement with Intrinsic ID. Intel® Quartus® Prime Pro Edition software restricts PUF operations, including enrollment and key wrapping, without the appropriate license.