Programmable Devices
CPLDs, FPGAs, SoC FPGAs, Configuration, and Transceivers
20687 Discussions

serious security problem about cyclone III device

Altera_Forum
Honored Contributor II
1,192 Views

WP_01033 provides an effective deterrent against counterfeiting and IP theft. In the solution, a crucial problem is to protect key (i.e. DS28E01's secrets) in altera device design's storage region from unauthorized detection. How dose altera support it? 

In my opinion, there may be several ways to get the key. 

1. Reverse Engineering interesting memory blocks or flip-flops initial contents from an configuration file, which is easily captured externally. 

As is well known, xilinx have tools to do such work. I don't like it. 

2. Through read-back or jtag boundary scan mechanism or something else to directly access device's memory blocks or filp-flops. 

 

thanks for your help.:-P
0 Kudos
1 Reply
Altera_Forum
Honored Contributor II
256 Views

It's not actually clear which "serious" security probelem you're addressing in your post. WP-1033 isn't particularly related to Cyclone III. It's just suggesting a method to achieve a certain degree of copy protection for designs with unencrypted configuration bitstreams. It has been shown, that unencrypted bitstreams can be decoded in principle, so it's clear, that the solution doesn't provide "strong" cryptography. 

 

Encrypted configuration bitstreams are in constrast offering state-of-the-art cryptographic design security. Because they have a key storage inside the FPGA, they don't need devices like the said Maxim-Dallas chip.
0 Kudos
Reply