A method for secure loading of a key dedicated to securing a predetermined operation into memory of a microchip of an embedded system includes, as a first step, authenticating a security device by generating a first random number using the microchip, transmitting the first random number to the security device, generating a second random number in the security device, generating a first cryptogram from the first and second random numbers by applying an asymmetric signature algorithm using an asymmetric secret key, transmitting at least the first cryptogram to the microchip, and authenticating the security device by verifying the first cryptogram using the public key. A second step includes authenticating the microchip by generating, in the microchip, a secret session key from the first random number by applying a symmetric encryption algorithm using the secret key, generating a second cryptogram by applying a symmetric encryption algorithm using the secret session key, transmitting the second cryptogram to the security device, and authenticating the microchip by verifying the second cryptogram using the session key. A third step includes transferring a dedicated key, encrypted by the session key, into the storage means of the microchip.

 
Web www.patentalert.com

< Method of integrating QKD with IPSec

> Steganographic data hiding using a device clock

> Server, computer memory, and method to support security policy maintenance and distribution

~ 00549