Review Article
A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
Algorithm 5
Indirect flashing protocol over a trusted mediator (no online connection to OEM).
Requirements | (i) The initialization protocol has been completed successfully. | (ii) UD has knowledge of VKOEM. | (iii) SP has a valid trust key pair and has not reached the maximum quota of | allowed flashing procedures. | Protocol | Step 1: SP contacts UD and sends to UD. | Step 2: UD verifies | and sends back as an acknowledge. | Step 3: OWN authorizes the start of a key flashing procedure by presenting | a valid TRKorig. UD authenticates TRKorig using the internally | stored and a PKC authentication protocol. | Step 4: SP sends the certified new key package to UD. | Step 5: UD verifies that and | . Then the new transponder TRKnew can be | activated: . The protocol is completed by sending a DONE-message to SP. |
|