- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
WP_01033 provides an effective deterrent against counterfeiting and IP theft. In the solution, a crucial problem is to protect key (i.e. DS28E01's secrets) in altera device design's storage region from unauthorized detection. How dose altera support it?
In my opinion, there may be several ways to get the key. 1. Reverse Engineering interesting memory blocks or flip-flops initial contents from an configuration file, which is easily captured externally. As is well known, xilinx have tools to do such work. I don't like it. 2. Through read-back or jtag boundary scan mechanism or something else to directly access device's memory blocks or filp-flops. thanks for your help.:-PLink Copied
1 Reply
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It's not actually clear which "serious" security probelem you're addressing in your post. WP-1033 isn't particularly related to Cyclone III. It's just suggesting a method to achieve a certain degree of copy protection for designs with unencrypted configuration bitstreams. It has been shown, that unencrypted bitstreams can be decoded in principle, so it's clear, that the solution doesn't provide "strong" cryptography.
Encrypted configuration bitstreams are in constrast offering state-of-the-art cryptographic design security. Because they have a key storage inside the FPGA, they don't need devices like the said Maxim-Dallas chip.
Reply
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page