6.857: Computer and Network Security
Lectures and Handouts
Below are links to material relevant to our lectures. To suggest the addition of a hyperlink or paper, email 6857-staff at mit.edu.
Lecture 22 (Wed 05/05/2010): Embedded Security
- Lecture 22 Slides PDF
- Links:
Lecture 21 (Mon 05/03/2010): RSA in practice
- Lecture 21 Notes TXT
- Links:
- On the Importance of Checking Cryptographic Protocols for Faults (Boneh, DeMillo, and Lipton)
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems (Paul Kocher)
- Cache Missing for Fun and Profit (Colin Percival)
- Remote Timing Attacks are Practical (David Brumley and Dan Boneh)
Lecture 20 (Wed 04/28/2010): Anonymous E-cash
- Lecture 20 Notes TXT
- Links:
Lecture 19 (Mon 04/26/2010): Electronic Payments
- Lecture 19 Notes TXT
- Links:
Lecture 18 (Wed 04/21/2010): Security in Web Application
- Lecture 18 Slides PDF
- Links:
Lecture 17 (Wed 04/14/2010): Secure Processors
- Lecture 17 Slides PDF
- Links:
Lecture 16 (Mon 04/12/2010): Physically Uncloneable Functions (PUFs)
Quiz 1 (Wed 04/07/2010)
- Solutions PDF
Lecture 15 (Mon 04/05/2010): Fully Homomorphic Encryption
- Lecture 15 Slides PDF
- Paper:
Quiz 1 Preparation
- Practice Quiz PDF
- Practice Quiz Solutions PDF
- Problem Set 1 Solutions PDF
- Problem Set 2 Solutions PDF
- Problem Set 3 Solutions PDF
Lecture 14 (Wed 03/31/2010): PKI and Certificates
- Lecture 14 Notes TXT
- Links:
Lecture 13 (Mon 03/29/2010): Key Establishment
Lecture 12 (Wed 03/17/2010): Secret Sharing
- Lecture 12 Notes PDF
- Links:
Lecture 11 (Mon 03/15/2010): Side-channel Attacks
- Lecture 11 Notes PDF
- Links
- Section 5 of the AES Specification has the optimized implementation
- AES_encrypt() and AES_decrypt() in crypto/aes/aes_core.c in the OpenSSL 32-bit AES implementation
Lecture 10 (Wed 03/10/2010): Public Key Encryption and Signatures
- Lecture 10 Notes PDF
Project Pitches (Mon 03/08/2010)
Lecture 09 (Wed 03/03/2010): Public Key Encryption II
- Lecture 9 Notes PDF
- Links:
Lecture 08 (Mon 03/01/2010): Public Key Encryption I
Lecture 07 (Wed 02/24/2010): Number Theory
- Lecture 7 Notes TXT
- Links:
Lecture 06 (Mon 02/22/2010): Finite Fields
- Lecture 6 Notes TXT
- Links:
Problem Set 2 (Fri 02/19/2010)
Lecture 05 (Wed 02/17/2010): Block Ciphers
- Lecture 5 Notes TXT
- Links:
Lecture 04 (Tue 02/16/2010): Symmetric Key Crypto
- Lecture 4 Notes TXT
- Links:
Lecture 03 (Wed 02/10/2010): Hash Functions
- Lecture 3 Notes PDF
Lecture 02 (Mon 02/08/2010): Hashing I
- Problem Set 1 PDF
- Problem Set 1 Solutions PDF
- Lecture 2 Notes PDF
- Links:
- Handbook of Applied Cryptography, Chapter 9 (Hash Functions) . Covers the construction and application of hash functions.
- Wikipedia on the "Birthday Problem"
- The ECRYPT hash function conference -- includes a nice survey by Preneel
- The NIST site for the SHA-3 hash function competition
- Wikipedia on the MD5 hash function