6.857: Computer and Network Security (Spring 2018)

Lectures and Handouts

Lecture 1 (Wednesday, February 7): Introduction

Recitation 1 (Friday, February 9): Finite Fields and Groups

Lecture 2 (Monday, February 12): Growth of Cryptography

Problem Set 1

Lecture 3 (Wednesday, February 14): Encryption and the One-Time Pad

Recitation 2 (Friday, February 16): Introduction to Hash Functions

Lecture 5 (Wednesday, February 21): Differential Privacy by Prof. Adam Smith

Recitation 3 (Friday, February 23): Differential Privacy (Review)

Lecture 6 (Monday, February 26): Hash Functions II

Problem Set 2

Lecture 7 (Wednesday, February 28): Block Ciphers I

Recitation 4 (Friday, March 2): Block Ciphers Review

Lecture 8 (Monday, March 5): Symmetric Key Encryption and Authentication

Lecture 9 (Wednesday, March 7): UFE, Finite Fields, Secret Sharing

Recitation 5 (Friday, March 9): Definitions Review

Lecture 10 (Monday, March 12): Number Theory

Problem Set 3

Lecture 11 (Wednesday, March 14): Group Theory, Diffie Hellman, more Number Theory

Recitation 6 (Friday, March 16): Review: Elliptic Curves and Finite Fields

Lecture 12 (Monday, March 19): Commitments, El Gamal

Lecture 13 (Wednesday, March 21): RSA, Digital Signatures

Recitation 7 (Friday, March 23): Review: Public Key Encryption

Lecture 14 (Monday, April 2): Signatures

Problem Set 4

Lecture 15 (Wedneseday, April 4): E-cash and Bitcoin

Lecture 16 (Monday, April 9): Gap Groups and Bilinear Maps

Lecture 17 (Wednesday, April 11): (Guest lecture by Prof. Madry) Machine Learning Security

Recitation 8 (Friday, April 13): Quiz Review

Lecture 18 (Wednesday, April 18): Quiz

Lecture 19 (Monday, April 23): Fully Homomorphic Encryption

Problem Set 5

Lecture 20 (Wednesday, April 25): Voting and Auditing Elections

Lecture 21 (Monday, April 30): Public Key Infrastructure

Lecture 22 (Wednesday, May 2): Zero Knowledge Proofs