6.857: Computer and Network Security (Spring 2016)

Lectures and Handouts

Lecture 1 (Wednesday, February 3): Introduction

Recitation 1 (Friday, February 5): Finite Fields

Lecture 2 (Monday, February 8): Security principles, growth of cryptography

Problem Set 1

Lecture 3 (Wednesday, February 10): Encryption and the One-Time Pad

Recitation 2 (Friday, February 12): Hashing - OW, CR, Inverting and Colliding

Lecture 4 (Tuesday, February 16): Hash Functions

Lecture 5 (Wednesday, February 17): Hash Functions II

Recitation 3 (Friday, February 19): Bitcoin

Lecture 6 (Monday, February 22): Electronic Cash and Bitcoin

Problem Set 2

Lecture 7 (Wednesday, February 24): Secret Sharing and Block Ciphers

Recitation 4 (Friday, February 26): Finding 3-Collisions

Lecture 8 (Monday, Feburary 29): Secure Messaging

Lecture 9 (Wednesday, March 2): Going Dark Debate

Read these materials before class and be prepared for an in-class discussion.

Lecture 10 (Monday, March 7): AES, Block Cipher Modes

Problem Set 3

Lecture 11 (Wednesday, March 9): MACs, AEAD, Finite Fields

Recitation 6 (Friday, March 11): Authentication & Authenticated Encryption

Lecture 12 (Monday, March 14): Number Theory

Lecture 13 (Wednesday, March 16): Groups, Diffie-Hellman Key Exchange, Elliptic Curves

Recitation 7 (Friday, March 18): Elliptic Curves

Lecture 14 (Monday, March 28): Pedersen Commitments, El Gamal, DDH Assumption

Problem Set 4

Lecture 15 (Wednesday, March 30): El Gamal, IND-CCA2, Cramer-Shoup, RSA-OAEP

Recitation 8 (Friday, April 1): Public Key Cryptography

Lecture 16 (Monday, April 4): Digital Signatures

Lecture 17 (Wednesday, April 6): Gap Groups and Bilinear Maps

Recitation 9 (Friday, April 8): Signatures and Bilinear Maps

Lecture 18 (Monday, April 11): Zero Knowledge Proofs

Problem Set 5

Lecture 20 (Wednesday, April 20): Auditability and Verifiability of Elections

Lecture 21 (Monday, April 25): Quines, Anti-Virus Undecidability, Trusting Trust, SPKI & SDSI