Method of using a mask programmed key to securely configure a field programmable gate array
First Claim
1. A method comprising:
- fabricating a first plurality of FPGA integrated circuits with a first secret key embedded by way of a first mask set; and
fabricating a second plurality of FPGA integrated circuits with a second secret key embedded by way of a second mask set.
1 Assignment
0 Petitions
Accused Products
Abstract
A field programmable gate array has security configuration features to prevent monitoring of the configuration data for the field programmable gate array. The configuration data is encrypted by a security circuit of the field programmable gate array using a security key. This encrypted configuration data is stored in an external nonvolatile memory. To configure the field programmable gate array, the encrypted configuration data is decrypted by the security circuit of the field programmable gate array using the security key stored in the artwork of the field programmable gate array. The secret key consists of a number of bits of key information that are embedded within the photomasks used in manufacture the FPGA chip.
168 Citations
24 Claims
-
1. A method comprising:
-
fabricating a first plurality of FPGA integrated circuits with a first secret key embedded by way of a first mask set; and
fabricating a second plurality of FPGA integrated circuits with a second secret key embedded by way of a second mask set. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method comprising:
-
embedding a first secret key within the artwork of an FPGA integrated circuit;
storing a user-defined second secret key within an encrypted FPGA bitstream stored in an external nonvolatile memory accessible by the FPGA;
decrypting the user-defined second secret key using the first secret key; and
setting up a secure network link between the FPGA and a server using the user-defined second secret key. - View Dependent Claims (19, 20, 21)
-
-
22. A method comprising:
-
storing a first secret key on an FPGA chip;
causing the FPGA to calculate a message authentication code (MAC) corresponding to a user design; and
storing the message authentication code with bitstream information in a nonvolatile memory. - View Dependent Claims (23, 24)
-
Specification