Visible to Intel only — GUID: nqz1490614113180
Ixiasoft
1. Logic Array Blocks and Adaptive Logic Modules in Intel® Cyclone® 10 GX Devices
2. Embedded Memory Blocks in Intel® Cyclone® 10 GX Devices
3. Variable Precision DSP Blocks in Intel® Cyclone® 10 GX Devices
4. Clock Networks and PLLs in Intel® Cyclone® 10 GX Devices
5. I/O and High Speed I/O in Intel® Cyclone® 10 GX Devices
6. External Memory Interfaces in Intel® Cyclone® 10 GX Devices
7. Configuration, Design Security, and Remote System Upgrades in Intel® Cyclone® 10 GX Devices
8. SEU Mitigation for Intel® Cyclone® 10 GX Devices
9. JTAG Boundary-Scan Testing in Intel® Cyclone® 10 GX Devices
10. Power Management in Intel® Cyclone® 10 GX Devices
2.1. Types of Embedded Memory
2.2. Embedded Memory Design Guidelines for Intel® Cyclone® 10 GX Devices
2.3. Embedded Memory Features
2.4. Embedded Memory Modes
2.5. Embedded Memory Clocking Modes
2.6. Parity Bit in Embedded Memory Blocks
2.7. Byte Enable in Embedded Memory Blocks
2.8. Memory Blocks Packed Mode Support
2.9. Memory Blocks Address Clock Enable Support
2.10. Memory Blocks Asynchronous Clear
2.11. Memory Blocks Error Correction Code Support
2.12. Embedded Memory Blocks in Intel® Cyclone® 10 GX Devices Revision History
3.4.1. Input Register Bank
3.4.2. Pipeline Register
3.4.3. Pre-Adder for Fixed-Point Arithmetic
3.4.4. Internal Coefficient for Fixed-Point Arithmetic
3.4.5. Multipliers
3.4.6. Adder
3.4.7. Accumulator and Chainout Adder for Fixed-Point Arithmetic
3.4.8. Systolic Registers for Fixed-Point Arithmetic
3.4.9. Double Accumulation Register for Fixed-Point Arithmetic
3.4.10. Output Register Bank
4.2.1. PLL Usage
4.2.2. PLL Architecture
4.2.3. PLL Control Signals
4.2.4. Clock Feedback Modes
4.2.5. Clock Multiplication and Division
4.2.6. Programmable Phase Shift
4.2.7. Programmable Duty Cycle
4.2.8. PLL Cascading
4.2.9. Reference Clock Sources
4.2.10. Clock Switchover
4.2.11. PLL Reconfiguration and Dynamic Phase Shift
5.1. I/O and Differential I/O Buffers in Intel® Cyclone® 10 GX Devices
5.2. I/O Standards and Voltage Levels in Intel® Cyclone® 10 GX Devices
5.3. Intel FPGA I/O IP Cores for Intel® Cyclone® 10 GX Devices
5.4. I/O Resources in Intel® Cyclone® 10 GX Devices
5.5. Architecture and General Features of I/Os in Intel® Cyclone® 10 GX Devices
5.6. High Speed Source-Synchronous SERDES and DPA in Intel® Cyclone® 10 GX Devices
5.7. Using the I/Os and High Speed I/Os in Intel® Cyclone® 10 GX Devices
5.8. I/O and High Speed I/O in Intel® Cyclone® 10 GX Devices Revision History
5.5.1. I/O Element Structure in Intel® Cyclone® 10 GX Devices
5.5.2. Features of I/O Pins in Intel® Cyclone® 10 GX Devices
5.5.3. Programmable IOE Features in Intel® Cyclone® 10 GX Devices
5.5.4. On-Chip I/O Termination in Intel® Cyclone® 10 GX Devices
5.5.5. External I/O Termination for Intel® Cyclone® 10 GX Devices
5.5.4.1. RS OCT without Calibration in Intel® Cyclone® 10 GX Devices
5.5.4.2. RS OCT with Calibration in Intel® Cyclone® 10 GX Devices
5.5.4.3. RT OCT with Calibration in Intel® Cyclone® 10 GX Devices
5.5.4.4. Dynamic OCT
5.5.4.5. Differential Input RD OCT
5.5.4.6. OCT Calibration Block in Intel® Cyclone® 10 GX Devices
5.6.1. Intel® Cyclone® 10 GX LVDS SERDES Usage Modes
5.6.2. SERDES Circuitry
5.6.3. SERDES I/O Standards Support in Intel® Cyclone® 10 GX Devices
5.6.4. Differential Transmitter in Intel® Cyclone® 10 GX Devices
5.6.5. Differential Receiver in Intel® Cyclone® 10 GX Devices
5.6.6. PLLs and Clocking for Intel® Cyclone® 10 GX Devices
5.6.7. Timing and Optimization for Intel® Cyclone® 10 GX Devices
5.6.6.1. Clocking Differential Transmitters
5.6.6.2. Clocking Differential Receivers
5.6.6.3. Guideline: LVDS Reference Clock Source
5.6.6.4. Guideline: Use PLLs in Integer PLL Mode for LVDS
5.6.6.5. Guideline: Use High-Speed Clock from PLL to Clock LVDS SERDES Only
5.6.6.6. Guideline: Pin Placement for Differential Channels
5.6.6.7. LVDS Interface with External PLL Mode
5.7.1. I/O and High-Speed I/O General Guidelines for Intel® Cyclone® 10 GX Devices
5.7.2. Mixing Voltage-Referenced and Non-Voltage-Referenced I/O Standards
5.7.3. Guideline: Maximum Current Driving I/O Pins While Turned Off and During Power Sequencing
5.7.4. Guideline: Maximum DC Current Restrictions
5.7.5. Guideline: LVDS SERDES IP Core Instantiation
5.7.6. Guideline: LVDS SERDES Pin Pairs for Soft-CDR Mode
5.7.7. Guideline: Minimizing High Jitter Impact on Intel® Cyclone® 10 GX GPIO Performance
5.7.8. Guideline: Usage of I/O Bank 2A for External Memory Interfaces
6.1. Key Features of the Intel® Cyclone® 10 GX External Memory Interface Solution
6.2. Memory Standards Supported by Intel® Cyclone® 10 GX Devices
6.3. External Memory Interface Widths in Intel® Cyclone® 10 GX Devices
6.4. External Memory Interface I/O Pins in Intel® Cyclone® 10 GX Devices
6.5. Memory Interfaces Support in Intel® Cyclone® 10 GX Device Packages
6.6. External Memory Interface IP Support in Intel® Cyclone® 10 GX Devices
6.7. External Memory Interface Architecture of Intel® Cyclone® 10 GX Devices
6.8. External Memory Interfaces in Intel® Cyclone® 10 GX Devices Revision History
7.1. Enhanced Configuration and Configuration via Protocol
7.2. Configuration Schemes
7.3. Configuration Details
7.4. Remote System Upgrades Using Active Serial Scheme
7.5. Design Security
7.6. Configuration, Design Security, and Remote System Upgrades in Intel® Cyclone® 10 GX Devices Revision History
9.1. BST Operation Control
9.2. I/O Voltage for JTAG Operation
9.3. Performing BST
9.4. Enabling and Disabling IEEE Std. 1149.1 BST Circuitry
9.5. Guidelines for IEEE Std. 1149.1 Boundary-Scan Testing
9.6. IEEE Std. 1149.1 Boundary-Scan Register
9.7. IEEE Std. 1149.6 Boundary-Scan Register
9.8. JTAG Boundary-Scan Testing in Intel® Cyclone® 10 GX Devices Revision History
10.1. Power Consumption
10.2. Programmable Power Technology
10.3. Power Sense Line
10.4. Voltage Sensor
10.5. Temperature Sensing Diode
10.6. Power-On Reset Circuitry
10.7. Power Sequencing Considerations for Intel® Cyclone® 10 GX Devices
10.8. Power Supply Design
10.9. Power Management in Intel® Cyclone® 10 GX Devices Revision History
Visible to Intel only — GUID: nqz1490614113180
Ixiasoft
7.5. Design Security
The Intel® Cyclone® 10 GX design security feature supports the following capabilities:
- Enhanced built-in advanced encryption standard (AES) decryption block to support 256-bit key industry-standard design security algorithm (FIPS-197 Certified)
- Volatile and non-volatile key programming support
- Secure operation mode for both volatile and non-volatile key through tamper protection mode
- Limited accessible JTAG instruction during power-up in the JTAG Secure mode
- Supports POF authentication and protection against Side-Channel Attack
- Provides JTAG access control and security key control through fuse bit or option bits
- Disables all JTAG instructions from power-up until the device is initialized
- Supports board-level testing
- Supports off-board key programming for non-volatile key
- Stand-alone Qcrypt tool to encrypt and decrypt with other security settings to configuration bit stream.
- Available in all configuration schemes except JTAG
- Supports remote system upgrades feature
Design Security Element | Description |
---|---|
Non-Volatile key | The non-volatile key is securely stored in fuses within the device. Proprietary security features make it difficult to determine this key. |
Volatile Key | The volatile key is securely stored in battery-backed RAM within the device. Proprietary security features make it difficult to determine this key. |
Key Generation | A user provided 256-bit key is processed by a one-way function before being programmed into the device. |
Key Choice | Both volatile and non-volatile key can exist in a device. User can choose which key to use by setting the option bits in encrypted configuration file through the Convert Programming File tool or the Qcrypt tool. |
Tamper Protection Mode | Tamper protection mode prevents the FPGA from being loaded with an unencrypted configuration file. When you enable this mode, the FPGA can only be loaded with a configuration that has been encrypted with your key. Unencrypted configurations and configurations encrypted with the wrong key will result in a configuration failure. You can enable this mode by setting a fuse within the device. |
Configuration Readback | These devices do not support a configuration readback feature. From a security perspective, this makes readback of your unencrypted configuration data infeasible. |
Security Key Control | By using different JTAG instructions and the security option in the Qcrypt tool, you have the flexibility to permanently or temporarily disable the use of the non-volatile or volatile key. You can also choose to lock the volatile key to prevent it from being overwritten or reprogrammed. |
JTAG Access Control | You can enable various levels of JTAG access control by setting the OTP fuses or option bits in the configuration file using the Qcrypt tool:
|
Note:
- You cannot enable encryption and compression at the same time for all configuration scheme.
- When you use design security with Intel® Cyclone® 10 GX devices in an FPP configuration scheme, it requires a different DCLK-to-DATA[] ratio.