Review Article

A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices

Table 8

Protocol execution times.

Protocol instanceDuration (min:sec.ms)

 ReadOut of transponder01:32.000
 Mutual authentication of UD and TRK03:14.000

Direct keyflashing
 Keyflashing to transponder by OEM23:50.000

Keyflashing by servicePoint
 Delegation of trust OEM to SP00:00.350
 Transponderdelegation00:00.250
 Keyflashing to transponder by SP12:43.000