摘要 |
The invention relates to a process for storing and using sensitive information in a security module and to a security module arranged to implement the process, and protect the sensitive information against fraudulent utilization. The sensitive information ISj is stored in a form {overscore (ISj encrypted using a temporary encrypting protection key CPi, whose content varies over time. The sensitive information {overscore (ISj is decrypted before being used in a given operation, using a temporary decrypting protection key CPid. Before the contents of the encrypting and decrypting keys are varied, the sensitive information {overscore (ISj is decrypted with the current decrypting key, and then it is re-encrypted with the new encryption key to obtain a new encrypted form, different from the previous one. |