I have a system where I have a microprocessor that has the ability to hold data
in PROM memory that is only accessible when the program running it has been
authenticated.  (This is done using ECDSA.)

I would like to use this capability so that an authenticated program on the
microprocessor is used to decrypt an image that is downloaded to my system.  Due
to code space and size limitations, my first thought is to use an AES symmetric
cipher where the key for the cipher is held in the space where only the
authenticated program has access.

The scenario would be as follows:
The AES key is programmed into the secure PROM during factory configuration
When operating in the field, an authenticated program would download an
        encrypted module to the unit
The authenticated program would then decrypt the download using the key stored
        in the secure PROM.

Are there any glaring flaws in this approach?

What is the best way to generate an AES key to use for this scenario? 

Thanks for any help,
Doug Bailey
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to