6.857: Computer and Network Security (Spring 2016)
Lectures and Handouts
Lecture 1 (Wednesday, February 3): Introduction
Recitation 1 (Friday, February 5): Finite Fields
Lecture 2 (Monday, February 8): Security principles, growth of cryptography
Problem Set 1
Lecture 3 (Wednesday, February 10): Encryption and the One-Time Pad
Recitation 2 (Friday, February 12): Hashing - OW, CR, Inverting and Colliding
Lecture 4 (Tuesday, February 16): Hash Functions
Lecture 5 (Wednesday, February 17): Hash Functions II
Recitation 3 (Friday, February 19): Bitcoin
Lecture 6 (Monday, February 22): Electronic Cash and Bitcoin
Problem Set 2
Lecture 7 (Wednesday, February 24): Secret Sharing and Block Ciphers
Recitation 4 (Friday, February 26): Finding 3-Collisions
Lecture 8 (Monday, Feburary 29): Secure Messaging
Lecture 9 (Wednesday, March 2): Going Dark Debate
Read these materials before class and be prepared for an in-class discussion.
Lecture 10 (Monday, March 7): AES, Block Cipher Modes
Problem Set 3
Lecture 11 (Wednesday, March 9): MACs, AEAD, Finite Fields
Recitation 6 (Friday, March 11): Authentication & Authenticated Encryption
Lecture 12 (Monday, March 14): Number Theory
Lecture 13 (Wednesday, March 16): Groups, Diffie-Hellman Key Exchange, Elliptic Curves
Recitation 7 (Friday, March 18): Elliptic Curves
Lecture 14 (Monday, March 28): Pedersen Commitments, El Gamal, DDH Assumption
Problem Set 4
Lecture 15 (Wednesday, March 30): El Gamal, IND-CCA2, Cramer-Shoup, RSA-OAEP
Recitation 8 (Friday, April 1): Public Key Cryptography
Lecture 16 (Monday, April 4): Digital Signatures
Lecture 17 (Wednesday, April 6): Gap Groups and Bilinear Maps
Recitation 9 (Friday, April 8): Signatures and Bilinear Maps
Lecture 18 (Monday, April 11): Zero Knowledge Proofs
Problem Set 5
Lecture 20 (Wednesday, April 20): Auditability and Verifiability of Elections
Lecture 21 (Monday, April 25): Quines, Anti-Virus Undecidability, Trusting Trust, SPKI & SDSI