Specifications

Steps for Implementing a Secure Configuration Flow Page 15
Using the Design Security Features in Altera FPGAsJune 2012 Altera Corporation
19. Click OK.
20. Repeat Steps 1517 to generate a .svf file of the .ekp file. Use the default setting in
the Create JAM, SVF, or ISC File dialog box when generating a .svf file of the .ekp
file (Figure 15).
How to Generate the Single-Device .ekp File and Encrypt Configuration File
Using Quartus II Software with the Command-Line Interface
There is a command-line interface that allows you to generate a single-device .ekp file
and encrypt Raw Binary File (.rbf). The command-line interface uses the Quartus II
software command-line executable, quartus_cpf, and requires the following syntax
or options:
--key/-k <path to key file>:<key identity>
A .sof file (user design)
An .ekp file (the required encryption key programming file name)
You can create a compressed and uncompressed .rbf for configuration by using the
following command with an option file which contains the string compression=on.
quartus_cpf -c --option=<option file> --key <keyfile>:<keyid1>:<keyid2>
<input_sof_file> <output_rbf_file>
You can learn more on the option file from the Quartus II software command line
help. Run
quartus_cpf --help=option
to learn more on the available options.
Example 1 shows two sets of keys that are stored in two different key files: key1 in
key1.key and key2 in key2.key.
Figure 15. Create .svf From Single-Device .ekp File
Select the
.svf file format
List the
file name
for the .svf file
Example 1.
quartus_cpf --key D:\SIV_DS\key1.key:key1 --key
D:\SIV_DS\key2.key:key2 D:\SIV_DS\test.sof D:\SIV_DS\test.ekp