Custom security levels

For advanced use, you can customize your security levels.

To set custom security levels:

  1. Click the Custom Level button in the Setup Security page. The Custom Security dialog box appears (see figure below).
     

  1. Select the FPGA Array Security and the FlashROM Security levels.

    The FPGA Array and the FlashROM can have different Security Settings. See the tables below for a description of the custom security option levels for FPGA Array and FlashROM.

 

FPGA Array

Security Option

Description

Lock for both writing and verifying

Allows writing/erasing and verification of the FPGA Array via the JTAG interface only with a valid Pass Key.

Lock for writing

Allows the writing/erasing of the FPGA Array only with a valid Pass Key. Verification is allowed without a valid Pass Key.

Use the AES Key for both writing and verifying

Allows the writing/erasing and verification of the FPGA Array only with a valid AES Key via the JTAG interface.

 

This configures the device to accept an encrypted bitstream for reprogramming and verification of the FPGA Array.

 

Use this option if you intend to complete final programming at an unsecured site or if you plan to update the design at a remote site in the future. Accessing the device security settings requires a valid Pass Key.

Allow write and verify

Allows writing/erasing and verification of the FPGA Array with plain text bitstream and without requiring a Pass Key or an AES Key. Use this option when you develop your product in-house.

Note: The ProASIC3/E family FPGA Array is always read protected regardless of the Pass Key or the AES Key protection.

FlashROM

Security Option

Description

Lock for both reading and writing

Allows the writing/erasing and reading of the FlashROM via the JTAG interface only with a valid Pass Key. Verification is allowed without a valid Pass Key.

Lock for writing

Allows the writing/erasing of the FlashROM via the JTAG interface only with a valid Pass Key. Reading and verification is allowed without a valid Pass Key.

Use the AES Key for both writing and verifying

Allows the writing/erasing and verification of the FlashROM via the JTAG interface only with a valid AES Key.

 

This configures the device to accept an encrypted bitstream for reprogramming and verification of the FlashROM.

 

Use this option if you complete final programming at an unsecured site or if

you plan to update the design at a remote site in the future.

 

Note: The bitstream that is read back from the FlashROM is always unencrypted  (plain text).

Allow reading, writing, and verifying

Allows writing/erasing, reading and verification of the FlashROM content with a plain text bitstream and without requiring a valid Pass Key or an AES Key.

Note:  The FPGA Array can always read the FlashROM content regardless of these Security Settings.

  1. To make the Security Settings permanent, select the Permanently lock the security settings check box. This option prevents any future modifications of the Security Setting of the device. A Pass Key is not required if you use this option.

    Note: When you make the Security Settings permanent, you can never reprogram the Silicon Signature. If you Lock the write operation for the FPGA Array or the FlashROM, you can never reprogram the FPGA Array or the FlashROM, respectively. If you use an AES key, this key cannot be changed once you permanently lock the device.


    To use the Permanent FlashLock™ feature, select Lock for both writing and verifying for FPGA Array and Lock for both reading and writing for FlashROM and select the Permanently lock the security settings checkbox as shown in the figure below. This will make your device one-time-programmable.

  2. Click the OK button.

The Security Settings page appears with the Custom security setting information as shown in the figure below.