6.857: Computer and Network Security

Lectures and Handouts

Below are links to material relevant to our lectures. To suggest the addition of a hyperlink or paper, email 6857-staff at mit.edu.

Lecture 01 (Wed 02/06/2008): Introduction Lecture 02 (Mon 02/11/2008): Block Ciphers Lecture 03 (Wed 02/13/2008): Hash Functions Lecture 04 (Tues 02/19/2008): MAC Lecture 05 (Wed 02/20/2008): MAC, Number theory Lecture 06 (Mon 02/25/2008): Number theory, Public key encryption Lecture 07 (Wed 02/27/2008): Public key encryption, Digital signatures Lecture 08 (Mon 03/03/2008): El Gamal signatures, DSS, Elliptic curves, Pairing functions Lecture 09 (Wed 03/05/2008): Public Key Infrastructure, Hardware security Lecture 10 (Mon 03/10/2008): Hardware attacks (cont'd), Secret sharing Lecture 11 (Wed 03/12/2008): Secret sharing, Access control Lecture 12 (Mon 03/17/2008): Secure Hardware (Srini Devadas) Lecture 13 (Wed 03/19/2008): DRM, Program Leashing (Nir Shavit) Lecture 14 (Mon 03/31/2008): Virus detection Lecture 15 (Wed 04/02/2008): Code injection and buffer overflow Lecture 16 (Mon 04/07/2008): Quiz Lecture 17 (Wed 04/09/2008): Network security Lecture 18 (Mon 04/14/2008): Zero-Knowledge Lecture 19 (Wed 04/16/2008): Information Flow Control (Max Krohn) Lecture 20 (Wed 04/23/2008): Program Obfuscation Lecture 21 (Mon 04/28/2008): Java security (Vinod Vaikuntanathan) and E-cash (Prof. Rivest) Lecture 22 (Wed 04/30/2008): Voting Lecture 23 (Mon 05/05/2008): Voting