InfoCoBuild

Information Security II

Information Security II. Instructor: Prof. V. Kamakoti, Department of Computer Science and Engineering, IIT Madras. Building Secure Systems involve secure hardware, secure micro architecture, secure operating systems, secure compilers and secure application development. Out of these, ensuring security at the hardware is most crucial as it is THE ROOT OF TRUST. In other words, however secure the Operating System, Compilers and Applications be, if the hardware on which these thrive is not secure, then the entire system can be compromised. The security of the system is a collective responsibility of Hardware and Software. In this second course in the Information Security series we shall deal with the hardware infrastructure available in contemporary architectures that are vital for building secure systems. We shall take the x86, ARM and PowerPC based architectures as case studies to explain the concepts. (from nptel.ac.in)

Lecture 24 - Public Key Cryptography


Go to the Course Home or watch other lectures:

Need for Secure Systems
Lecture 01 - Need for Secure Systems
Lecture 02 - Ignorance of A is Sin of B
Lecture 03 - Function Calls and Stacks
Lecture 04 - Stack Smashing
Lecture 05 - Virtual Machine based Rootkits
Security and Architecture
Lecture 06 - Security and Architecture: Introduction
Lecture 07 - Structured Computer Organization Completed
Lecture 08 - X86 ISA (Instruction Set Architecture)
Lecture 09 - X86 ISA (cont.)
Lecture 10 - X86 Protected Mode
Features of X86
Lecture 11 - X86 Memory Segmentation
Lecture 12 - Process Isolation using Segmentation
Lecture 13 - Paging and Virtual Memory
Lecture 14 - Task Switching and Interrupt Service
Memory Segmentation Deep Dive
Lecture 15 - Memory Segmentation Deep Dive: Segment Descriptors
Lecture 16 - Memory Segmentation Deep Dive: Descriptor Tables
Lecture 17 - Memory Segmentation Deep Dive: Privilege Checking
Lecture 18 - Memory Segmentation Deep Dive: Changing Privilege Levels
Lab Sessions
Lecture 19 - Segmentation Recap
Lecture 20 - Interrupt Service Routine Recap
Lecture 21 - Memory Management Recap
Lecture 22 - Task Switch Recap
ARM based Processor: Security Features and Implementation
Lecture 23 - Introduction to Basic Cryptography
Lecture 24 - Public Key Cryptography
Lecture 25 - Freescale ARM iMX6 Processor
Lecture 26 - High Assurance Boot in iMX6
Lecture 27 - Case Study
Network Processors, Security and Performance
Lecture 28 - Basics of Networking
Lecture 29 - Network Processor vs General Purpose Processor
Lecture 30 - Network Processor Architecture