作者: Nachiketh Rao Potlapally , Derek Del Miller
DOI:
关键词: Key Wrap 、 Cryptographic primitive 、 Computer network 、 Computer science 、 Computer security 、 Cryptographic protocol 、 Key exchange 、 Hash-based message authentication code 、 Controlled Cryptographic Item 、 Key encapsulation 、 Key management
摘要: A computing device has a processor and first memory, e.g., fuse-based storing cryptographic key. The is configured to receive information related second key from provisioning system. derives the fewer bits than also encrypt using key, store encrypted in flash memory.