On Wed, Nov 04, 2009 at 02:26:47PM -0600, Doug Bailey wrote:
> > > Are there any glaring flaws in this approach?
> >
> > Generally it is a bad idea to hard-wire data-encryption keys.
> > Standard
> > practice is burn-in a "key-encryption-key" (KEK), and each encrypted
> > object uses a random uni
- "Victor Duchovni" wrote:
> On Wed, Nov 04, 2009 at 10:33:02AM -0600, Doug Bailey wrote:
>
> > I would like to use this capability so that an authenticated program
> on the
> > microprocessor is used to decrypt an image that is downloaded to my
> system. Due
> > to code space and size limi
On Wed, Nov 04, 2009 at 10:33:02AM -0600, Doug Bailey wrote:
> I would like to use this capability so that an authenticated program on the
> microprocessor is used to decrypt an image that is downloaded to my system.
> Due
> to code space and size limitations, my first thought is to use an AES