Skip to main content
Engineering LibreTexts

5: Information Security

  • Page ID
    58523
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    • 5.1: Overview
    • 5.2: Introduction to Secure Systems
      Threat classification; the concept of security as a negative goal; the safety net approach to security system design. Principles to follow for the design of a security system, and a basic security model that follows these principles.
    • 5.3: Authenticating Principals
      Broad categories of methods for authenticating (verifying the identity of) a principal making a request. Cryptographic hash functions and their use in protecting passwords, as one of the most common methods of authenticating principals.
    • 5.4: Authenticating Messages
      Authenticating messages in terms of both data integrity and origin authenticity; the difference between message authenticity and confidentiality. Closed vs open designs for authentication; shared-secret vs public-key cryptography; distribution of authentication keys.
    • 5.5: Message Confidentiality
      Using encryption to ensure message confidentiality; how to achieve both authentication and confidentiality.
    • 5.6: Security Protocols
      Considerations for designing security protocols for the distribution of keys. Comparison of the (incorrect) Denning-Sacco key exchange protocol with the Diffie-Hellman key exchange protocol, with and without a public-key system.
    • 5.7: Authorization-Controlled Sharing
      Methods of authorization-controlled sharing: the simple guard model (ticket, list, and agency systems, protection groups); the caretaker model; non-discretionary access and information flow control. An example of the simple guard model system used by UNIX.
    • 5.8: Reasoning About Authentication (Advanced Topic)
      More in-depth reasoning about authentication: authentication logic in hard-wired vs Internet approaches; authentication in distributed systems and across administrative realms; authentication of public keys and certificates, including certificate chains.
    • 5.9: Cryptography as a Building Block (Advanced Topic)
      Some principles behind the cryptography transformations used for one-time pads, pseudorandom number generators, message authentication codes, hash algorithms, and public-key ciphers.
    • 5.10: Summary
      Summary of the reasons why real-world computer systems are vulnerable, despite the past 7 sections detailing how to follow the design principles of building secure systems.
    • 5.11: Case Study - Transport Layer Security (TLS) for the Web
      The basics behind Transport Layer Security (TLS), a common security protocol used to establish a secure channel over the Internet: the TLS handshake protocol, evolution of TLS over time, authenticating services and users with TLS.
    • 5.12: War Stories - Security System Breaches
      Case studies: 15 examples of how the principles for designing a secure system can be violated, each error resulting in one or more real-world cases of a security breach. Includes examples of both digital and analog systems.
    • 5.13: Exercises


    This page titled 5: Information Security is shared under a CC BY-NC-SA license and was authored, remixed, and/or curated by Jerome H. Saltzer & M. Frans Kaashoek (MIT OpenCourseWare) .

    • Was this article helpful?