6079 - MachXO3D: Why does the device could boot whether public key is programed or erased given that ECDSA authentication function is used?
MachXO3D's configuration image authentication during programming or boot does have flexible authentication support as stated below:
1. Authenticate during programming = secure + fast boot
2. Pre-authenticaion = secure + slower boot time3. No authentication = fast boot and fast programming.
Erasing the public key is as good as no authentication and can be use with unsigned bitstream. Thus, XO3D can still boot up if we erase the public key.
Related Articles
1421 - How do I trigger the Dual Boot function for MACHXO2 device?<br>
The Dual Boot feature is supported through the Master SPI Mode(MSPI) for MACHXO2 device. During the device configuration at power up or toggling of PROGRAMN pin, any of following situations will trigger a dual boot event. A bitstream Cyclic ...
2043 - LatticeXP2: Can the CSSPIN pin be used as a GPIO in dual-boot mode on the LatticeXP2 device?
Description: When using the LatticeXP2 device in dual boot mode, the FPGA continuously drives the CSSPIN high. The CSSPIN is considered a dual-purpose pin. However while the CFG0 pin = 0, controlling the dual-boot function, it will cause CSSPIN to be ...
1663 - MachXO2: How can I force to boot from the “golden boot” image in the external SPI Flash when using the dual boot feature?
The MachXO2 has a dual boot feature that works in an automatic mode. If the image loaded from the internal flash is found to have an issue (CRC error), or if the internal flash is erased, then the part will automatically try to load the golden image ...
7086 - MachXO3D: How to convert PEM file format to Public Key format and vice-versa.
Lattice "Pubkey Program" command is expecting to receive 64 bytes of raw Public Key. To get the raw Public Key from PEM file or vice versa, user can go to programmer tool -> advanced security key programming, load the desired Key format file, and the ...
529 - LatticeECP3: Can the LatticeECP3 still be programmed after setting the encryption key?
No. Before the introduction of encryption, all bit streams are not protected in terms of security. Anyone can copy the design simply by reading the bit stream out of the boot PROM. With LatticeECP3 bit stream encryption, there is another level of ...