6.857: Computer and Network Security

Lectures and Handouts

Below are links to material relevant to our lectures. To suggest the addition of a hyperlink or paper, email 6.857-staff at theory.csail.mit.edu.

Lecture 01 (Wed 9/6/2006): Introduction Lecture 02 (Mon 9/11/2006): Electronic Voting Lecture 03 (Wed 9/13/2006): Hash Functions Lecture 04 (Mon 9/18/2006): Hash Functions (cont.) Lecture 05 (Wed 9/20/2006): Hash Functions (cont.) Lecture 06 (Wed 9/27/2006): Hash Functions (cont.) and One-Time Pads Lecture 07 (Mon 10/2/2006): One-Time MAC; Finite Fields Lecture 08 (Wed 10/4/2006): Block Ciphers Lecture 09 (Wed 10/11/2006): Lecture 10 (Mon 10/16/2006) Lecture 11 (Wed 10/18/2006)

Lecture 12 (Mon 10/23/2006) Lecture 13 (Wed 10/25/2006) Lecture 14 (Mon 10/30/2006) Lecture 15 (Wed 11/01/2006) Lecture 16 (Wed 11/06/2006): Zero-Knowledge

Lecture 17 (Wed 11/08/2006): Buffer Overflow and Cross Site Scripting Attacks Lecture 18 (Mon 11/13/2006): Quiz Lecture 19 (Wed 11/15/2006): Self-Referential Programs, Trusting Trust, and Virus Theory Lecture 20 (Mon 11/20/2006): Computer Viruses (cont.) Lecture 21 (Wed 11/22/2006): Pay TV Lecture 22 (Mon 11/27/2006): Data Recovery from Used Hard Drives

Lecture 23 (Wed 11/29/2006): PKI (Public Key Infrastructures) Lecture 24 (Mon 12/4/2006): Biometrics