A method of establishing security in an electronic device. The method
includes generating a statistically unique root key value and storing the
root key value in a one-time programmable memory of the device. The
method also includes isolating firmware in the device from access to the
root key value. The root key value is used as a root of trust that
ensures that each electronic device has its own key. In general, the root
key is used to encrypt other keys in the device. In different aspects, a
root key test value, which is utilized to test the root key, and other
security features such as a re-purpose number and a cipher block chaining
re-purpose value are included to protect the electronic device from
unauthorized access. An electronic device that includes these security
features is also provided.