I guess the K20 would be secured by the manufacturer, but, even so, a JTAG tool(e.g. J-Link) can aslo detect the K20 core, and recognize the core ID. You can aslo implement a mass erase command by using a JTAG tool if the mass erase is dot disabled through FSEC[MEEN]; ortherwise, you would give up your idea to do so, because the chip may be permanently secured, and can never be accessed from any external sources. If the mass erase command can be accepted, it means you will damage the flash-resident USB mass-storage device (MSD) bootloader, and the OpenSDA and MSD Flash programmer application can never be booted, Furthermore, it can not be recovered by yourself.
Maybe, you'd better first refer to the user manual of FRDM-KL25Z borad, and know the security feature of K20's flash.
If you still decide to make a try, you pretty much do so at your own risk.