Visible to Intel only — GUID: arj1599605340213
Ixiasoft
3.3.1. Configuration Bitstream Encryption Using the Programming File Generator Graphical Interface
3.3.2. Configuration Bitstream Encryption Using the Programming File Generator Command Line Interface
3.3.3. Partially Encrypted Configuration Bitstream Generation Using the Command Line Interface
3.3.4. Partial Reconfiguration Bitstream Encryption
4.1. Using SDM Provision Firmware
4.2. Authentication Root Key Provisioning
4.3. Programming Key Cancellation ID Fuses
4.4. Canceling Root Keys
4.5. Programming Counter Fuses
4.6. Secure Data Object Service Root Key Provisioning
4.7. Security Setting Fuse Provisioning
4.8. AES Root Key Provisioning
4.9. Converting Owner Root Key, AES Root Key Certificates, and Fuse files to Jam STAPL File Formats
Visible to Intel only — GUID: arj1599605340213
Ixiasoft
1.2.1. Physical Anti-Tamper
Physical anti-tamper features help detect and respond to certain physical attacks on silicon.
The SDM monitors operating conditions such as input clocks, voltage, and temperature to detect device tampering. Changes in these conditions may indicate a tampering event. You can choose an appropriate response to a detected event. Possible responses include but are not limited to the following actions:
- Device lock
- Device lock with configuration data zeroization
- Device lock with configuration data zeroization and BBRAM key erasure
You enable the physical anti-tamper features during the design process. The Intel® Agilex™ device activates the anti-tamper features as a configuration bitstream is loaded.