Article ID: 000081087 Content Type: Troubleshooting Last Reviewed: 02/28/2014

Can the unencrypted peipheral image for use with CvP be used when the anti-tamper bit is set?

Environment

BUILT IN - ARTICLE INTRO SECOND COMPONENT
Description

When using Configuration via Protocol (CvP) Initialization mode, the periphery image generated by the Convert Programming Files tool is unencrypted.

When the anti-tamper bit is set on a device which supports design security, only encrypted files may be used to configure the device.

However, the unencrypted periphery image file may be used with a device where the anti-tamper bit has been set but the .rbf (raw binary file) that is used for the core image and is downloaded using the PCI Express® interface must be encrypted using the correct key.

Related Products

This article applies to 12 products

Cyclone® V SX SoC FPGA
Cyclone® V GT FPGA
Stratix® V GX FPGA
Cyclone® V GX FPGA
Stratix® V GT FPGA
Stratix® V GS FPGA
Arria® V GZ FPGA
Arria® V SX SoC FPGA
Cyclone® V ST SoC FPGA
Arria® V ST SoC FPGA
Arria® V GX FPGA
Arria® V GT FPGA

Disclaimer

1

All postings and use of the content on this site are subject to Intel.com Terms of Use.