Browse Definitions :
Definition

open security

Contributor(s): Matthew Haughn

Open security is an approach to safeguarding software, hardware and other information system components with methods whose design and details are publicly available.

Open security is based on the idea that systems should be inherently secure by design. That concept derives from Kerckhoff’s principle, which maintains that a cryptographic system should be secure enough that, even if all its details but the key are available to the general public, the system will still be safe. The mathematician Claude Shannon further refined Kerckhoff’s principle. According to Shannon’s maxim, "one ought to design systems under the assumption that the enemy will immediately gain full familiarity with them."

An open cryptographic system includes algorithmic transparency. In such a system, the strength of a cryptographic implementation must be based on secrecy of the key. Keys are a fundamental element of cryptography, generated to encrypt and decrypt sensitive information.

One of the major challenges of cryptography is ensuring the secrecy of the keys, while ensuring that the authorized parties can access them at the appropriate time. Different levels of security may be sought, depending on the sensitivity of the message. A system is said to be computationally secure if it is theoretically breakable through a brute force attack but the time and expense required makes it not worth the effort. A system is said to be unconditionally or perfectly security exists when an attacker with unlimited resources still could not break it.

This was last updated in August 2015

Continue Reading About open security

Join the conversation

2 comments

Send me notifications when other members comment.

Please create a username to comment.

public/private key combos, SSL, and the like, are pretty well known and seem to have some success. Personally I'm a big fan of systems like oAuth to manage my logins. Overall, I'm so for it that I wonder if that creates new kinds of risks! :-)
Cancel
what text? OH that one. that's almost as dumb as using all the pictures when the alarm is not set to armed. Why do you need to take pictures when you are home? Or when you set the alarm for at home? REALLY? the only time the pictures should be taken is when you set the alarm for gone! that way you are not using all your pictures for stupid stuff like taking out the trash or checking on your dogs. It should only take pictures when you are away from home and have set the alarm. Example: I had to take a U-Haul truck back the other day, and while I was gone someone broke into my house and set off the alarms. Well I couldn't check to see who it was because the pictures had all been used up from us running in and out all morning. So whats the point of a security system that wont work while you are away from home?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close