# 6.857: Computer and Network Security (Spring 2019)

## Lectures and Handouts

### Lecture 1 (Wednesday, February 6): Introduction

### Recitation 1 (Friday, February 8): Modular Arithmetic

### Lecture 2 (Monday, February 11): Growth of Cryptography

### Problem Set 1 (Due: Monday, February 25th)

### Lecture 3 (Wednesday, February 13): Hash Functions

### Recitation 2 (Friday, February 15): Hash Functions

### Lecture 4 (Tuesday, February 19): Security of Machine Learning

### Lecture 5 (Wednesday, February 20): Hash Functions II

### Recitation 3 (Friday, February 22): Merkle-Damgard

### Problem Set 2 (Due: Monday, March 11th)

### Lecture 6 (Monday, February 25): Block Ciphers

### Lecture 7 (Wednesday, February 27): Symmetric Encryption and Authentication

### Recitation 4 (Friday, March 1): Block ciphers, AES, and HMAC

### Lecture 8 (Monday, March 4): Finite Fields, Groups, and Number Theory

### Lecture 9 (Wednesday, March 6): Shamir Secret Sharing and Diffie-Helman Key Exchange

### Recitation 5 (Friday, March 8): Groups

### Problem Set 3 (Due: Monday, March 25th)

### Lecture 10 (Monday, March 11): Pedersen Commitments and El-Gamal Encryption

### Lecture 11 (Wednesday, March 13): RSA and Digital Signatures

### Recitation 6 (Friday, March 15): Quadratic Residues, Pedersen Commitments, El Gamal

### Lecture 12 (Monday, March 18): Digital Signatures

### Lecture 13 (Wednesday, March 20): Attacks Against Real-World Cryptography

### Recitation 7 (Friday, March 22): MITM Attacks, Digital Signatures Review

### Problem Set 4 (Due: Monday, April 22nd)

### Lecture 14 (Monday, April 1): Bitcoin

- Notes
- Nakamoto Paper
- Princeton bitcoin overview
- If we lived in a bitcoin future...
- A Hitchhiker's Guide to the Blockchain Universe
- Blockchain Explorer

### Lecture 15 (Wednesday, April 3rd): PKI and TLS

- Notes (part I, PKI)
- Let's Encrypt
- Certificate Transparency
- BIP-32 protocol (NOT covered on the quiz)
- Notes (part II, TLS)
- David Benjamin RWC 2018 Talk (NOT covered on the quiz)

### Recitation 8 (Friday, April 5th): Bitcoin and TLS

### Lecture 16 (Monday, April 8): Differential Privacy

### Lecture 17 (Wednesday, April 10): Election Integrity

### Recitation 9 (Friday, April 12): Quiz Review

### Lecture 18 (Wednesday, April 17): Quiz

- The quiz solutions are posted in the 'Top Secret Students Only' section.

### Problem Set 5 (Due: Monday, May 6th)

### Lecture 19 (Monday, April 22): Elliptic Curves, Bilinear Maps, BLS Signatures

### Lecture 20 (Wednesday, April 24): Fully Homomorphic Encryption, Post-quantum Cryptography

- Notes
- A chapter on "Quantum Algorithms" is posted in the 'Top Secret Students Only' section.
- NAE Report on Quantum Computation

### Lecture 21 (Monday, April 29): Crypto Policy

- Notes: In Top Secret section.
- Further Readings:
- Privacy on the Line: The Politics of Wiretapping and Encryption
- Keys under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Commmunications
- Analysis of the CLEAR Proposal per the National Academies' Framework
- Low Hanging Fruit: Evidence Based Solution to the Digital Evidence Challenge
- Decrypting the Encryption Debate: A Framework for Decisionmakers
- Listening In: Cybersecurity in an Insecure Age