6.857: Computer and Network Security (Spring 2018)
Lectures and Handouts
Lecture 1 (Wednesday, February 7): Introduction
Recitation 1 (Friday, February 9): Finite Fields and Groups
Lecture 2 (Monday, February 12): Growth of Cryptography
Problem Set 1
Lecture 3 (Wednesday, February 14): Encryption and the One-Time Pad
Recitation 2 (Friday, February 16): Introduction to Hash Functions
Lecture 5 (Wednesday, February 21): Differential Privacy by Prof. Adam Smith
- The slides are posted in the 'Top Secret Students Only' section.
Recitation 3 (Friday, February 23): Differential Privacy (Review)
Lecture 6 (Monday, February 26): Hash Functions II
Problem Set 2
Lecture 7 (Wednesday, February 28): Block Ciphers I
Recitation 4 (Friday, March 2): Block Ciphers Review
Lecture 8 (Monday, March 5): Symmetric Key Encryption and Authentication
Lecture 9 (Wednesday, March 7): UFE, Finite Fields, Secret Sharing
Recitation 5 (Friday, March 9): Definitions Review
- There were no notes for this recitation. This recitation discussed KPA, CPA, and CCA security,
existential unforgeability, and the definition of collision-resistant hash function, all of which were
covered in previous notes (mostly from this week) and in the KL book.
Lecture 10 (Monday, March 12): Number Theory
Problem Set 3
Lecture 11 (Wednesday, March 14): Group Theory, Diffie Hellman, more Number Theory
Recitation 6 (Friday, March 16): Review: Elliptic Curves and Finite Fields
Lecture 12 (Monday, March 19): Commitments, El Gamal
Lecture 13 (Wednesday, March 21): RSA, Digital Signatures
Recitation 7 (Friday, March 23): Review: Public Key Encryption
Lecture 14 (Monday, April 2): Signatures
Problem Set 4
Lecture 15 (Wedneseday, April 4): E-cash and Bitcoin
Lecture 16 (Monday, April 9): Gap Groups and Bilinear Maps
Lecture 17 (Wednesday, April 11): (Guest lecture by Prof. Madry) Machine Learning Security
Recitation 8 (Friday, April 13): Quiz Review
Lecture 18 (Wednesday, April 18): Quiz
- The quiz solutions are posted in the 'Top Secret Students Only' section.
Lecture 19 (Monday, April 23): Fully Homomorphic Encryption
Problem Set 5
Lecture 20 (Wednesday, April 25): Voting and Auditing Elections
Lecture 21 (Monday, April 30): Public Key Infrastructure
Lecture 22 (Wednesday, May 2): Zero Knowledge Proofs