Updating encrypted cryptographic key pair

作者: Nachiketh Rao Potlapally , Derek Del Miller

DOI:

关键词: Key WrapCryptographic primitiveComputer networkComputer scienceComputer securityCryptographic protocolKey exchangeHash-based message authentication codeControlled Cryptographic ItemKey encapsulationKey management

摘要: A computing device has a processor and first memory, e.g., fuse-based storing cryptographic key. The is configured to receive information related second key from provisioning system. derives the fewer bits than also encrypt using key, store encrypted in flash memory.

参考文章(45)
Michael Reichle, Dennis Hostetler, Austin Jones, Secure data exchange using messaging service ,(2012)
Alexander Medvinsky, Eric J. Sprunk, Tat Keung Chan, Method and apparatus for embedding secret information in digital certificates ,(2015)
Colin H. Brace, Tariq Sharif, Nakul Garg, Automated certificate management ,(2011)
Jun Sato, Shinichi Matsukawa, Keiko Watanabe, Authentication Method, Host Computer and Recording Medium ,(2012)
Randall Scott Springfield, David Carroll Challener, James Patrick Hoff, James Peter Ward, System and method for providing endorsement certificate ,(2003)