Description
Yes, if the encryption key programming (.ekp) file and the encrypted configuration file are generated in different versions of the Quartus® II software, the design security feature will still function correctly as long as the encrypted configuration files are generated with the same key. A device programmed with that key will configure successfully with the encrypted configuration file, regardless of the Quartus II software used to generate these files.
Environment
BUILT IN - ARTICLE INTRO SECOND COMPONENT
Related Products
This article applies to 36 products
Cyclone® V GT FPGA
Cyclone® III FPGAs
Stratix® V GX FPGA
Cyclone® IV GX FPGA
Cyclone® II FPGA
Cyclone® V GX FPGA
Arria® V GZ FPGA
Stratix® V GS FPGA
Stratix® II GX FPGA
Stratix® II FPGAs
Arria® V GX FPGA
Stratix® V GT FPGA
Intel® Arria® 10 GT FPGA
Arria® V GT FPGA
Stratix® III FPGAs
Stratix® IV GX FPGA
Arria® II GX FPGA
Intel® Arria® 10 GX FPGA
Arria® II GZ FPGA
Stratix® IV GT FPGA
Cyclone® V E FPGA
Intel® Arria® 10 SX SoC FPGA
Stratix® V E FPGA
Stratix® FPGAs
Stratix® GX FPGA
Cyclone® V SX SoC FPGA
Cyclone® V ST SoC FPGA
Cyclone® V SE SoC FPGA
Intel® Stratix® 10 GX FPGA
Intel® Stratix® 10 SX SoC FPGA
Cyclone® IV E FPGA
Arria® V SX SoC FPGA
Arria® V ST SoC FPGA
Cyclone® FPGAs
Cyclone® III LS FPGA
Stratix® IV E FPGA