6.857: Computer and Network Security
Below are links to material relevant to our lectures.
To suggest the addition of a hyperlink or paper, email
6857-staff at mit.edu.
Lecture 01 (Wed 02/06/2008): Introduction
- Handouts:
- Course Information [PS|PDF]
- Lecture 1 Notes [PDF]
Lecture 02 (Mon 02/11/2008): Block Ciphers
- Links:
- Handouts:
- Problem Set 1 [PS|PDF]
- Lecture 2 Notes [PDF]
Lecture 03 (Wed 02/13/2008): Hash Functions
Lecture 04 (Tues 02/19/2008): MAC
Lecture 05 (Wed 02/20/2008): MAC, Number theory
- Links
- Handouts:
- Problem Set 2 [PS|PDF]
- Lecture 5 Notes [PDF]
Lecture 06 (Mon 02/25/2008): Number theory, Public key encryption
Lecture 07 (Wed 02/27/2008): Public key encryption, Digital signatures
Lecture 08 (Mon 03/03/2008): El Gamal signatures, DSS, Elliptic curves, Pairing functions
- Links:
- Handouts:
- Problem Set 3 [PS|PDF]
- Problem Set 1 Solutions [PS|PDF]
- Lecture 8 Notes [PDF]
Lecture 09 (Wed 03/05/2008): Public Key Infrastructure, Hardware security
Lecture 10 (Mon 03/10/2008): Hardware attacks (cont'd), Secret sharing
- Links:
- Handouts:
- Lecture 10 Notes [PDF] (Note: The pages are numbered, but Page 4 is skipped. The notes go directly from Page 3 to Page 5.)
Lecture 11 (Wed 03/12/2008): Secret sharing, Access control
Lecture 12 (Mon 03/17/2008): Secure Hardware (Srini Devadas)
- Handouts:
- Lecture 12 Slides [PPT] — (Prof. Devadas didn't use these slides in class, but here they are anyway)
Lecture 13 (Wed 03/19/2008): DRM, Program Leashing (Nir Shavit)
Lecture 14 (Mon 03/31/2008): Virus detection
Lecture 15 (Wed 04/02/2008): Code injection and buffer overflow
Handouts:
- Lecture 15 Outline [PDF]
- Lecture 15 Slides [PPT] (thanks to Calvin Newport)
Lecture 16 (Mon 04/07/2008): Quiz
- Handouts:
- Problem Set 3 Solutions [PS|PDF]
- Problem Set 4 [PS|PDF]
Lecture 17 (Wed 04/09/2008): Network security
Handouts:
Lecture 18 (Mon 04/14/2008): Zero-Knowledge
- Links:
- The Knowledge Complexity of Interactive Proof Systems, by S. Goldwasser, S. Micali, and C. Rackoff
- Proofs that Yield Nothing But their Validity or All Languages in NP have Zero-Knowledge Proofs, by O. Goldreich, S. Micali, and A. Widgerson
- Zero knowledge proofs of identity, by U. Feige, A. Fiat, and A. Shamir
- GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks, by M. Bellare and A. Palacio
Handouts:
Lecture 19 (Wed 04/16/2008): Information Flow Control (Max Krohn)
Handouts:
- Lecture 19 Outline [TXT]
- Lecture 19 Blackboard Plan [PDF]
Lecture 20 (Wed 04/23/2008): Program Obfuscation
- Handouts:
- Lecture 20 Lecture Slides [PDF]
Lecture 21 (Mon 04/28/2008): Java security (Vinod Vaikuntanathan) and E-cash (Prof. Rivest)
Handouts:
- Lecture 21 Lecture Notes [PDF]
Lecture 22 (Wed 04/30/2008): Voting
Lecture 23 (Mon 05/05/2008): Voting
Handouts: