6.857: Computer and Network Security
Below are links to material relevant to our lectures.
To suggest the addition of a hyperlink or paper, email
6.857-staff at theory.csail.mit.edu.
Lecture 01 (Wed 9/6/2006): Introduction
- Handouts:
- Course Information [PS|PDF]
Lecture 02 (Mon 9/11/2006): Electronic Voting
Lecture 03 (Wed 9/13/2006): Hash Functions
Lecture 04 (Mon 9/18/2006): Hash Functions (cont.)
Lecture 05 (Wed 9/20/2006): Hash Functions (cont.)
Lecture 06 (Wed 9/27/2006): Hash Functions (cont.) and One-Time Pads
- Handouts:
- Problem Set 1 Solutions [PS|PDF]
Lecture 07 (Mon 10/2/2006): One-Time MAC; Finite Fields
Lecture 08 (Wed 10/4/2006): Block Ciphers
Lecture 09 (Wed 10/11/2006):
- Handouts:
- Problem Set 2 Solutions [PS|PDF]
Lecture 10 (Mon 10/16/2006)
- Links:
- The following book is recommended for a
coverage of elliptic curves:
Lawrence C. Washington,
Elliptic Curves (Discrete Mathematics and its applications),
CRC Press (2003)
- For applications of pairing functions to cryptography,
a good place to start is
The Pairing-Based Crypto Lounge
Lecture 11 (Wed 10/18/2006)
Lecture 12 (Mon 10/23/2006)
Lecture 13 (Wed 10/25/2006)
- Handouts:
- Problem Set 3 Solutions [PS|PDF]
Lecture 14 (Mon 10/30/2006)
Lecture 15 (Wed 11/01/2006)
Lecture 16 (Wed 11/06/2006): Zero-Knowledge
Lecture 17 (Wed 11/08/2006):
Buffer Overflow and Cross Site Scripting Attacks
Lecture 18 (Mon 11/13/2006):
Quiz
Lecture 19 (Wed 11/15/2006): Self-Referential
Programs, Trusting Trust, and Virus Theory
- Handouts:
- Problem Set 5 Solutions [PS|PDF]
Lecture 20 (Mon 11/20/2006): Computer Viruses (cont.)
Lecture 21 (Wed 11/22/2006): Pay TV
Lecture 22 (Mon 11/27/2006): Data Recovery from Used Hard Drives
Lecture 23 (Wed 11/29/2006): PKI (Public Key Infrastructures)
Lecture 24 (Mon 12/4/2006): Biometrics