Bitstream Authentication - Bitstream Authentication - UG570

UltraScale Architecture Configuration User Guide (UG570)

Document ID
UG570
Release Date
2025-03-04
Revision
1.20.1 English

The AES-GCM encryption standard also supports built-in authentication, enhancing security and eliminating the need to specify a separate HMAC key as in the 7 series FPGAs. Without knowledge of the AES-GCM key, the bitstream cannot be loaded, modified, intercepted, or cloned. Encryption provides the basic design security to protect the design from copying or reverse engineering, while authentication provides assurance that the bitstream provided for the configuration of the FPGA was the unmodified bitstream allowed to load. Authentication verifies both data integrity and authenticity of the bitstream. Authentication covers the entire bitstream for all types of control and data. Any bitstream tampering including single bit flips are detected.

If authentication passes, the configuration goes to completion through the startup cycle. If authentication fails and fallback is enabled, the fallback bitstream is loaded after the entire device configuration has been cleared. If fallback is not enabled, the configuration logic disables the configuration interface, blocking any access to the FPGA. Pulsing the PROGRAM_B signal or power-on reset is required to reset the configuration interface.