Visible to Intel only — GUID: sss1394438392190
Ixiasoft
1. Intel® MAX® 10 FPGA Configuration Overview
2. Intel® MAX® 10 FPGA Configuration Schemes and Features
3. Intel® MAX® 10 FPGA Configuration Design Guidelines
4. Intel® MAX® 10 FPGA Configuration IP Core Implementation Guides
5. Dual Configuration Intel® FPGA IP Core References
6. Unique Chip ID Intel® FPGA IP Core References
7. Document Revision History for the Intel® MAX® 10 FPGA Configuration User Guide
3.1. Dual-Purpose Configuration Pins
3.2. Configuring Intel® MAX® 10 Devices using JTAG Configuration
3.3. Configuring Intel® MAX® 10 Devices using Internal Configuration
3.4. Implementing ISP Clamp in Intel® Quartus® Prime Software
3.5. Accessing Remote System Upgrade through User Logic
3.6. Error Detection
3.7. Enabling Data Compression
3.8. AES Encryption
3.9. Intel® MAX® 10 JTAG Secure Design Example
Visible to Intel only — GUID: sss1394438392190
Ixiasoft
2.2.2.1. AES Encryption Protection
The Intel® MAX® 10 design security feature provides the following security protection for your designs:
- Helps protect against copying—the non-volatile key is securely stored in the Intel® MAX® 10 devices and cannot be read through any interface. Without this key, attackers are unable to decrypt the encrypted configuration image.
- Helps resist reverse engineering—reverse engineering from an encrypted configuration file is very difficult and time consuming because the file requires decryption.
- Helps defend against tampering—after you enable the JTAG Secure and Encrypted POF (EPOF) only, the Intel® MAX® 10 device can only accept configuration files encrypted with the same key. Additionally, configuration through the JTAG interface is blocked.
Related Information
Did you find the information on this page useful?
Feedback Message
Characters remaining: