EP2AGX95EF29I5N Altera, EP2AGX95EF29I5N Datasheet - Page 277

no-image

EP2AGX95EF29I5N

Manufacturer Part Number
EP2AGX95EF29I5N
Description
IC ARRIA II GX FPGA 95K 780FBGA
Manufacturer
Altera
Series
Arria II GXr

Specifications of EP2AGX95EF29I5N

Number Of Logic Elements/cells
89178
Number Of Labs/clbs
3747
Total Ram Bits
6679
Number Of I /o
372
Voltage - Supply
0.87 V ~ 0.93 V
Mounting Type
Surface Mount
Operating Temperature
-40°C ~ 100°C
Package / Case
780-FBGA
Family Name
Arria® II GX
Number Of Logic Blocks/elements
93674
# I/os (max)
372
Frequency (max)
500MHz
Operating Supply Voltage (typ)
900mV
Logic Cells
93674
Ram Bits
7025459.2
Operating Supply Voltage (min)
0.87V
Operating Supply Voltage (max)
0.93V
Operating Temp Range
-40C to 100C
Operating Temperature Classification
Industrial
Mounting
Surface Mount
Pin Count
780
Package Type
FC-FBGA
Lead Free Status / RoHS Status
Lead free / RoHS Compliant
Number Of Gates
-
Lead Free Status / Rohs Status
Compliant

Available stocks

Company
Part Number
Manufacturer
Quantity
Price
Part Number:
EP2AGX95EF29I5N
Manufacturer:
Altera
Quantity:
10 000
Part Number:
EP2AGX95EF29I5N
Manufacturer:
ALTERA
0
Chapter 9: Configuration, Design Security, and Remote System Upgrades in Arria II GX Devices
Design Security
AES Decryption Block
Flexible Security Key Storage
© July 2010
Altera Corporation
f
1
Security Against Tampering
After the Tamper Protection bit is set in the key programming file generated by the
Quartus II software, the Arria II GX device can only be configured with configuration
files encrypted with the same key. Tampering is prevented using both volatile and
non-volatile keys.
The main purpose of the AES decryption block is to decrypt the configuration
bitstream prior to entering data decompression or configuration.
Prior to receiving encrypted data, you must enter and store the 256-bit security key in
the device. You can choose between a non-volatile security key and a volatile security
key with battery backup.
The security key is scrambled prior to storing it in the key storage to make it more
difficult for anyone to retrieve the stored key using de-capsulation of the device.
Arria II GX devices support two types of security key programming: volatile and
non-volatile.
keys.
Table 9–19. Security Key Options
You can program the non-volatile key to the Arria II GX device without an external
battery. Also, there are no additional requirements of any of the Arria II GX power
supply inputs.
V
on-chip power supplies, such as V
the volatile register regardless of the on-chip supply condition.
After power up, wait 100 ms (standard POR delay) or 4 ms (fast POR delay) before
beginning the key programming to ensure that V
For more information about how to calculate the key retention time of the battery
used for volatile key storage, refer to the
Key programmability
External battery
Key programming method
Design protection
Note to
(1) Key programming is carried out using the JTAG interface.
CCBAT
is a dedicated power supply for volatile key storage and not shared with other
Table
Options
9–19:
Table 9–19
(1)
lists the differences between volatile keys and non-volatile
Reprogrammable and erasable
Required
On-board
Secure against copying and
reverse engineering.
Tamper resistant if volatile
tamper protection bit is set.
CCIO
Volatile Key
or V
Arria II GX PowerPlay Early Power
CC
. V
CCBAT
CCBAT
continuously supplies power to
is at full rail.
Arria II GX Device Handbook, Volume 1
One-time programmable
Not required
On and off board
Secure against copying and
reverse engineering.
Tamper resistant if tamper
protection bit is set.
Non-Volatile Key
Estimator.
9–57

Related parts for EP2AGX95EF29I5N