资料
  • 资料
  • 专题
【应用手册】AN 589: Using the Design Security Feature in Cyclone III LS Devices
推荐星级:
时间:2019-12-24
大小:1.2MB
阅读数:231
上传用户:rdg1993
查看他发布的资源
下载次数
0
所需E币
3
ebi
新用户注册即送 300 E币
更多E币赚取方法,请查看
close
资料介绍
【应用手册】AN 589: Using the Design Security Feature in Cyclone III LS Devices This application note describes the design security feature in Cyclone® III LS devices. The design security feature is able to decrypt a configuration bitstream using an industry standard 256-bit advanced encryption standard (AES) key and AES encryption algorithm to protect your designs from the following unauthorized activities: ■ Copying ■ Reverse engineering ■ Tampering The following design features make the solution secure: ■ Cyclone III LS devices do not support configuration file read back. This prevents attempts to read back the configuration file after it is decrypted. ■ Two user-defined 256-bit sequences are required to generate the 256-bit AES key. ■ The volatile 256-bit AES key is stored in the Cyclone III LS device and cleared when the external battery is removed. ■ Depending on the security mode, you can configure the Cyclone III LS device using a configuration file that is encrypted with the same key, or configure with a normal configuration file for board level testing. AN 589: Using the Design Security Feature in Cyclone III LS Devices September 2009 AN-589-1.0 This application note describes the design security feature in Cyclone III LS devices. The design security feature is able to decrypt a configuration bitstream using an industry standard 256-bit advanced encryption standard (AES) key and AES encryption algorithm to protect your designs from the following unauthorized activities: ■ C……
版权说明:本资料由用户提供并上传,仅用于学习交流;若内容存在侵权,请进行举报,或 联系我们 删除。
相关评论 (下载后评价送E币 我要评论)
没有更多评论了
  • 可能感兴趣
  • 关注本资料的网友还下载了
  • 技术白皮书