AR# 65792

|

Design Advisory for UltraScale RSA Authentication - UltraScale devices that use RSA authentication will fail bitstream authentication when smaller configuration interface widths are used.

描述

This Design Advisory covers the following:

UltraScale architecture-based devices that use RSA authentication will fail bitstream authentication when using certain configuration modes, primarily when smaller configuration interface widths are used. 

Affected configuration widths are dependent on the exact device being used (see the table below).

This issue affects production Kintex UltraScale and Virtex UltraScale FPGAs.

Please see XCN15038 - http://www.xilinx.com/support/documentation/customer_notices/xcn15038.pdf

解决方案


When RSA authentication fails due to this issue, the result is the same as for a valid authentication failure. If fallback is enabled, the fallback bitstream is loaded. If fallback is not enabled, the configuration logic disables the configuration interface, blocking any access to the FPGA. Pulsing the PROGRAM_B signal or power-on-reset is required to reset the configuration interface.

For an alternative configuration bitstream authentication method, the UltraScale FPGAs also support Advanced Encryption Standard (AES) decryption and authentication using the Galois/Counter Mode (GCM) algorithm. The AES GCM feature is supported in all configuration modes in all Virtex UltraScale and Kintex UltraScale FPGAs including the KU025 FPGA. Based on your security requirements, evaluate if AES-GCM is a suitable alternative. The AES-GCM is a symmetric key encryption algorithm that includes authentication, whereas RSA is an asymmetric authentication algorithm.

See (UG570) for implications to the FPGA configuration functions when using AES GCM encryption.

http://www.xilinx.com/support/documentation/user_guides/ug570-ultrascale-configuration.pdf

AR# 65792
日期 12/18/2015
状态 Active
Type 设计咨询
器件
People Also Viewed