6.857: Computer and Network Security (Spring 2013)

Announcements

4/23/2013

Problem Set 5 out

Problem Set 5 is now out and is due Monday, May 6. The accompanying USTclient.py.

4/1/2013

Problem Set 4 out

Problem Set 4 is now out and is due Friday, April 12. Sample solutions to Problem Set 3 are available on the protected page.

3/11/2013

Problem Set 3 out

Problem Set 3 is now out, and groups have been posted. Note that the due date is Friday, March 22. Also due Friday the 22nd: a writeup with your project group members, a description of your project idea, and a list of possible references.

3/4/2013

Problem Set 1 Returned; Add Date

Problem Set 1 was returned today in class. Sample solutions are available from the "Students Only" page.
Additionally, Add Date is this Friday. Please double-check your registration status on WebSIS! If you have been assigned to homework groups and no longer wish to take the class for credit, we'd appreciate it if you let 6857-tas know.

2/26/2013

Problem Set 2 Posted

Problem Set 2 has been posted; see the "Lectures and Handouts" page.

2/11/2013

Password hashing competition

There is a new competition for designing a password-hashing scheme; see here.

2/11/2013

Problem Set 1 posted

Problem Set 1 has been posted, along with associated files, on the Lectures and Handouts page. The groups for Problem Set 1 are also available. Please contact 6857-tas with any questions!

2/9/2013

New course catalog description

6.857 Network and Computer Security
Prereq: 6.033, 6.042J
G (Spring)
3-0-9 H-LEVEL Grad Credit
Topics vary somewhat from year to year, but the emphasis is on applied cryptography and may include: basic notions of systems security, cryptographic hash functions, symmetric cryptography (one-time pad, stream ciphers, block ciphers), cryptanalysis, secret-sharing, authentication codes, public-key cryptography (encryption, digital signatures), public-key infrastructure, elliptic curves and bilinear maps, buffer overflow attacks, web browser security, biometrics, electronic cash, viruses, electronic voting. Assignments include a group final project.
R. L. Rivest

2/8/2013

Relevant talk

On extractable functions and other beasts, Theory Colloquium 2012/2013,
Note that it is for non-cryptographers.
Speaker: Ran Canetti
Speaker Affiliation: Boston University and Tel Aviv University
More info here.
Date: 2-12-2013
Time: 4:15 PM - 5:15 PM
Refreshments: 3:45 PM
Location: 32-141; refreshments in Stata's G5 lounge

2/8/2013

If you have not taken 6.033...

You may find useful the 6.033 textbook, particularly the chapter on Information security.

2/7/2013

Recitation

There will be no recitation tomorrow (February 8). Starting next week, we plan to have the (optional) recitation sections on Fridays at 2pm in 37-212.

2/6/2013

Course signup

If you're interested in taking 6.857 (either for credit or as a listener), please fill out the signup sheet here.

1/17/2013

Welcome to 6.857!

Welcome to 6.857, Spring 2013.

Please signup on Piazza here.