Specifications
Page 16 Steps for Implementing a Secure Configuration Flow
Using the Design Security Features in Altera FPGAs June 2012 Altera Corporation
Example 2 shows two sets of keys that are stored in the same key file: key1 and key2
in key12.key.
How to Generate the Multi-Device .ekp File and Encrypt the Configuration
File using Quartus II Software
Perform the following steps to generate a multi-device .ekp file and encrypt your
configuration file:
1. Start the Quartus II software.
2. Repeat Steps 9–11 in “How to Generate the Single-Device .ekp File and Encrypt the
Configuration File using Quartus II Software” on page 7.
3. Click Add File. The Select Programmer File dialog box appears.
a. Select the single-device .ekp file, and type <single_ekp>.ekp in the File name
field.
b. Click Open.
1 For the correct sequence of devices in the same JTAG chain, you can use the
Auto-Detect option in the Quartus II programmer. If one of the FPGAs is
not required to be key-programmed, you are not required to replace the
device with the <single_ekp>.ekp file in the Quartus II programmer.
4. Repeat Step 3 for the each device in the same chain. Ensure that the right device
sequence is used when adding the .ekp files to the programmer window.
5. Highlight all the .ekp files you added and click Program/Configure.
Example 2.
quartus_cpf --key
D:\SIV_DS\key12.key:key1:key2 D:\SIV_DS\test.sof D:\SIV_DS\test.ekp