6.857: Applied Cryptography and Security (Spring 2022)

Lectures and Handouts

Lecture 1 (Mon, January 31): Introduction

Lecture 2 (Wed, February 2): The Growth of Cryptography

Recitation 1 (Fri, February 4): Finite Fields

Lecture 3 (Mon, February 7): Encryption Schemes

Problem Set 1 (Due: Tuesday, February 22)

Lecture 4 (Wed, February 9): Encryption Schemes Cont. and AES

Recitation 2 (Fri, February 11): How to do Research

Lecture 5 (Mon, February 14): AES Cont. and MACs

Lecture 6 (Wed, February 16): MACs Cont. and AES-GCM

Recitation 3 (Fri, February 18): Recap

Lecture 7 (Tues, February 22): Hash Functions

Problem Set 2 (Due: Tuesday, March 7)

Lecture 8 (Wed, February 23): Andy Sellars Guest Lecture

Recitation 4 (Fri, February 25): Hash Functions

Lecture 9 (Mon, February 28): Key Exchange

Lecture 10 (Wed, March 2): Group Theory and Secret Sharing

Lecture 11 (Mon, March 7): Public Key Encryption

Problem Set 3 (Due: Wednesday, March 30)

Lecture 12 (Wed, March 9): Finite Fields, Secret-Sharing, and RSA Encryption

Recitation 6 (Fri, March 11): Multiparty Computation

Lecture 13 (Mon, March 14): RSA Encryption

Lecture 14 (Wed, March 16): Digital Signatures

Lecture 15 (Mon, March 28): Bilinear Maps

Lecture 16 (Wed, March 30): PKI and TLS

Problem Set 4 (Due: Tuesday, April 19)

Lecture 18 (Wed, April 6): Zero-Knowledge Proofs

Lecture 19 (Mon, April 11): Exposure Notification

Lecture 20 (Wed, April 13): Fully Homomorphic Encryption and Post Quantum Cryptography

Lecture 21 (Wed, April 20): Jim Bidzos Guest Lecture

Lecture 22 (Mon, April 25): Prio (Henry Corrigan-Gibbs Guest Lecture)