How is it done today ?
1. PC generates KI and writes it into card’s EEPROM
2. PC encrypts (IMSI, KI) using customer’s secret key
3. Send to customer who decrypts and recovers (IMSI, KI) pairs in clear.
This protocol can be defeated by malicious insiders !
(IMSI, KI) pairs may be stolen or compromised !