6.857: Applied Cryptography and Security (Spring 2022)
Lectures and Handouts
Lecture 1 (Mon, January 31): Introduction
Lecture 2 (Wed, February 2): The Growth of Cryptography
Recitation 1 (Fri, February 4): Finite Fields
Lecture 3 (Mon, February 7): Encryption Schemes
Problem Set 1 (Due: Tuesday, February 22)
Lecture 4 (Wed, February 9): Encryption Schemes Cont. and AES
Recitation 2 (Fri, February 11): How to do Research
Lecture 5 (Mon, February 14): AES Cont. and MACs
Lecture 6 (Wed, February 16): MACs Cont. and AES-GCM
Recitation 3 (Fri, February 18): Recap
Lecture 7 (Tues, February 22): Hash Functions
Problem Set 2 (Due: Tuesday, March 7)
Lecture 8 (Wed, February 23): Andy Sellars Guest Lecture
Recitation 4 (Fri, February 25): Hash Functions
Lecture 9 (Mon, February 28): Key Exchange
Lecture 10 (Wed, March 2): Group Theory and Secret Sharing
Lecture 11 (Mon, March 7): Public Key Encryption
Problem Set 3 (Due: Wednesday, March 30)
Lecture 12 (Wed, March 9): Finite Fields, Secret-Sharing, and RSA Encryption
Recitation 6 (Fri, March 11): Multiparty Computation
Lecture 13 (Mon, March 14): RSA Encryption
Lecture 14 (Wed, March 16): Digital Signatures
Lecture 15 (Mon, March 28): Bilinear Maps
Lecture 16 (Wed, March 30): PKI and TLS
Problem Set 4 (Due: Tuesday, April 19)
Lecture 18 (Wed, April 6): Zero-Knowledge Proofs
Lecture 19 (Mon, April 11): Exposure Notification
Lecture 20 (Wed, April 13): Fully Homomorphic Encryption and Post Quantum Cryptography
Lecture 21 (Wed, April 20): Jim Bidzos Guest Lecture
Lecture 22 (Mon, April 25): Prio (Henry Corrigan-Gibbs Guest Lecture)