2.2.2 Design Security

Design security helps protecting the intent of the owner of the design, such as keeping the design and associated bitstream keys confidential, preventing design changes (for example, insertion of Trojan Horses), and controlling the number of copies made throughout the device life cycle. Design security may also be known as IP protection. It is one aspect of anti-tamper (AT) protection. Design security applies to the device from initial production, includes any updates such as in-the-field upgrades, and can include decommissioning of the device at the end of its life, if desired. Good design security is a prerequisite for good data security.

The following table lists the main design security features supported in IGLOO 2.

Table 2-1. Design Security Features
Features (all devices)M2GL005, M2GL010, M2GL025, and M2GL050M2GL060, M2GL090, and M2GL150
FlashLock® passcode security (256-bit)AvailableAvailable
Flexible security settings using Flash lock-bitsAvailableAvailable
Encrypted/authenticated design key loadingAvailableAvailable
Symmetric key design security (256-bit)AvailableAvailable
Design key verification protocolAvailableAvailable
Encrypted/authenticated configuration loadingAvailableAvailable
Certificate-of-Conformance (C-of-C)AvailableAvailable
Back-tracking prevention (also known as Versioning)AvailableAvailable
Device certificate(s) (anti-counterfeiting)AvailableAvailable
Support for configuration variationsAvailableAvailable
Fabric NVM and eNVM integrity testsAvailableAvailable
Information services (S/N, Cert., USERCODE, and others)AvailableAvailable
Tamper detectionAvailableAvailable
Tamper response (includes Zeroization)AvailableAvailable
ECC public key design security (384-bit)Available
Hardware intrinsic design key (SRAM-PUF)Available