Method for updating security data in a security module and security module for implementing this method

The method involves defining a symmetrical encryption algorithm, and defining a symmetrical decryption algorithm corresponding to the encryption algorithm. An identical key is defined for encryption and decryption using the respective algorithms. The symmetrical decryption algorithm is implemented i...

Full description

Saved in:
Bibliographic Details
Main Authors Junod, Pascal, Brique, Olivier
Format Patent
LanguageEnglish
French
German
Published 01.05.2019
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The method involves defining a symmetrical encryption algorithm, and defining a symmetrical decryption algorithm corresponding to the encryption algorithm. An identical key is defined for encryption and decryption using the respective algorithms. The symmetrical decryption algorithm is implemented in a form of a material decryption module in a security module, where the decryption module contains only logical elements concerning the decryption of security data. An independent claim is also included for a security module for processing updating data transmitted by a management center.
Bibliography:Application Number: EP20080157182