
This could be a final part of the production process, let the device initialize (get the key) and check that it has received a key (without the device letting know that the key is of course). The device should only be able to work if it has received a symmetric key from this server.
WUALA STORAGE HACK SERIAL
Thus, in other words, you are asking how can I send some "private data" (= keys) to a group of "users" (= devices) over an "insecure channel" (= the factory and it's employees), with the users having an uniquely identifying feature (= serial number) which is easily known and/or imitated by a malicious user.

And make an assumption that looks like reasonable.įor all intent and purposes the symmetric keys are not keys but just data, since we get them "prefabricated" out of some system.

Since you seem unable (likely understandably so) to give any more information, I am going to rephrase your situation so you can determine if we are on the same level.
