6.857: Computer and Network Security (Spring 2019)

Lectures and Handouts

Lecture 1 (Wednesday, February 6): Introduction

Recitation 1 (Friday, February 8): Modular Arithmetic

Lecture 2 (Monday, February 11): Growth of Cryptography

Problem Set 1 (Due: Monday, February 25th)

Lecture 3 (Wednesday, February 13): Hash Functions

Recitation 2 (Friday, February 15): Hash Functions

Lecture 4 (Tuesday, February 19): Security of Machine Learning

Lecture 5 (Wednesday, February 20): Hash Functions II

Recitation 3 (Friday, February 22): Merkle-Damgard

Problem Set 2 (Due: Monday, March 11th)

Lecture 6 (Monday, February 25): Block Ciphers

Lecture 7 (Wednesday, February 27): Symmetric Encryption and Authentication

Recitation 4 (Friday, March 1): Block ciphers, AES, and HMAC

Lecture 8 (Monday, March 4): Finite Fields, Groups, and Number Theory

Lecture 9 (Wednesday, March 6): Shamir Secret Sharing and Diffie-Helman Key Exchange

Recitation 5 (Friday, March 8): Groups

Problem Set 3 (Due: Monday, March 25th)

Lecture 10 (Monday, March 11): Pedersen Commitments and El-Gamal Encryption

Lecture 11 (Wednesday, March 13): RSA and Digital Signatures

Recitation 6 (Friday, March 15): Quadratic Residues, Pedersen Commitments, El Gamal

Lecture 12 (Monday, March 18): Digital Signatures

Lecture 13 (Wednesday, March 20): Attacks Against Real-World Cryptography

Recitation 7 (Friday, March 22): MITM Attacks, Digital Signatures Review

Problem Set 4 (Due: Monday, April 22nd)

Lecture 14 (Monday, April 1): Bitcoin

Lecture 15 (Wednesday, April 3rd): PKI and TLS

Recitation 8 (Friday, April 5th): Bitcoin and TLS

Lecture 16 (Monday, April 8): Differential Privacy

Lecture 17 (Wednesday, April 10): Election Integrity

Recitation 9 (Friday, April 12): Quiz Review

Lecture 18 (Wednesday, April 17): Quiz

Problem Set 5 (Due: Monday, May 6th)

Lecture 19 (Monday, April 22): Elliptic Curves, Bilinear Maps, BLS Signatures

Lecture 20 (Wednesday, April 24): Fully Homomorphic Encryption, Post-quantum Cryptography

Lecture 21 (Monday, April 29): Crypto Policy

Lecture 22 (Wednesday, May 1): Zero Knowledge Proofs