----- "Victor Duchovni" <victor.ducho...@morganstanley.com> wrote:

> On Wed, Nov 04, 2009 at 10:33:02AM -0600, Doug Bailey wrote:
> 
> > I would like to use this capability so that an authenticated program
> on the
> > microprocessor is used to decrypt an image that is downloaded to my
> system.  Due
> > to code space and size limitations, my first thought is to use an
> AES symmetric
> > cipher where the key for the cipher is held in the space where only
> the
> > authenticated program has access.
> > 
> > The scenario would be as follows:
> >
> > The AES key is programmed into the secure PROM during factory
> configuration
> > When operating in the field, an authenticated program would download
> an
> >         encrypted module to the unit
> > The authenticated program would then decrypt the download using the
> key stored
> >         in the secure PROM.
> > 
> > Are there any glaring flaws in this approach?
> 
> Generally it is a bad idea to hard-wire data-encryption keys.
> Standard
> practice is burn-in a "key-encryption-key" (KEK), and each encrypted
> object uses a random unique key, with that key encrypted under one or
> more KEKs. Each party that needs to access the data, decrypts the
> random key via its KEK, and then decrypts the data object.
> 
> The KEK need not be symmetric, with smime(1) for example, the KEK is
> typically an RSA key-pair, which makes it much easier to publish the
> keys necessary to generate content for a particular recipient.
> 

So this means that I need to decrypt a key using a public key encryption 
mechanism.  
I still only want to run in my microprocessor's authenticated mode which means 
I 
need to decrypt the key in a code space of around 32 KB.  

Does anyone have suggestions for a small footprint, public-key decryption 
source 
code library? 


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to