Visible to Intel only — GUID: ftd1616599775468
Ixiasoft
1. Intel Stratix 10 Device Security Overview
2. Authentication and Authorization
3. AES Bitstream Encryption
4. Device Provisioning
5. Advanced Features
6. Troubleshooting
7. Intel® Stratix® 10 Device Security User Guide Archives
8. Document Revision History for Intel® Stratix® 10 Device Security User Guide
3.3.1. Configuration Bitstream Encryption Using the Programming File Generator Graphical Interface
3.3.2. Configuration Bitstream Encryption Using the Programming File Generator Command Line Interface
3.3.3. Partially Encrypted Configuration Bitstream Generation Using the Command Line Interface
3.3.4. Partial Reconfiguration Bitstream Encryption
4.1. Using SDM Provision Firmware
4.2. Authentication Root Key Provisioning
4.3. Using QSPI Factory Default Helper Image on Owned Devices
4.4. Programming Key Cancellation ID Fuses
4.5. Security Setting Fuse Provisioning
4.6. AES Root Key Provisioning
4.7. Converting Owner Root Key, AES Root Key Certificates, and Fuse files to Jam STAPL File Formats
6.1. Using Quartus Commands in a Windows Environment Error
6.2. Generating a Private Key Warning
6.3. Adding a Signing Key to the Quartus Project Error
6.4. Generating Quartus Prime Programming File was Unsuccessful
6.5. Unknown Argument Errors
6.6. Bitstream Encryption Option Disabled Error
6.7. Specifying Correct Path to the Key
6.8. Using Unsupported Output File Type
Visible to Intel only — GUID: ftd1616599775468
Ixiasoft
5.3. Platform Attestation
You enable platform attestation for a given Intel® Stratix® 10 design by either navigating to the Device > Device and Pin Options > Security > Attestation tab and selecting the Enable Stratix 10 attestation commands checkbox, or adding the ENABLE_S10_ATTESTATION_COMMANDS=ON parameter to the Intel® Quartus® Prime settings (.qsf) file.
Figure 14. Selecting Platform Attestation in the Intel® Quartus® Prime Software
For access to the attestation verifier service and associated documentation, please contact Intel Support with reference number 14014604265.
Platform attestation is not supported on -V devices. Certain features are not available when the platform attestation feature is enabled. Refer to the Available Security Features for a Non-V Device table in Physical Anti-Tamper table in the Physical Anti-Tamper section for more details.
Related Information