Intel® Cyclone® 10 GX Core Fabric and General Purpose I/Os Handbook

ID 683775
Date 10/31/2022
Document Table of Contents

7.5.4. Design Security Implementation Steps

Figure 151. Design Security Implementation Steps

To carry out secure configuration, follow these steps:

  1. The Quartus® Prime Pro Edition software generates the design security key programming file and encrypts the configuration data using the user-defined 256-bit security key.
  2. Store the encrypted configuration file in the external memory.
  3. Program the AES key programming file into the Intel® Cyclone® 10 GX device through a JTAG interface.
  4. Configure the Intel® Cyclone® 10 GX device. At the system power-up, the external memory device sends the encrypted configuration file to the Intel® Cyclone® 10 GX device.

Did you find the information on this page useful?

Characters remaining:

Feedback Message