# 6.857: Applied Cryptography and Security (Spring 2022)

## Lectures and Handouts

### Lecture 1 (Mon, January 31): Introduction

### Lecture 2 (Wed, February 2): The Growth of Cryptography

### Recitation 1 (Fri, February 4): Finite Fields

### Lecture 3 (Mon, February 7): Encryption Schemes

### Problem Set 1 (Due: Tuesday, February 22)

### Lecture 4 (Wed, February 9): Encryption Schemes Cont. and AES

### Recitation 2 (Fri, February 11): How to do Research

### Lecture 5 (Mon, February 14): AES Cont. and MACs

### Lecture 6 (Wed, February 16): MACs Cont. and AES-GCM

### Recitation 3 (Fri, February 18): Recap

### Lecture 7 (Tues, February 22): Hash Functions

### Problem Set 2 (Due: Tuesday, March 7)

### Lecture 8 (Wed, February 23): Andy Sellars Guest Lecture

### Recitation 4 (Fri, February 25): Hash Functions

### Lecture 9 (Mon, February 28): Key Exchange

### Lecture 10 (Wed, March 2): Group Theory and Secret Sharing

### Lecture 11 (Mon, March 7): Public Key Encryption

### Problem Set 3 (Due: Wednesday, March 30)

### Lecture 12 (Wed, March 9): Finite Fields, Secret-Sharing, and RSA Encryption

### Recitation 6 (Fri, March 11): Multiparty Computation

### Lecture 13 (Mon, March 14): RSA Encryption

### Lecture 14 (Wed, March 16): Digital Signatures

### Lecture 15 (Mon, March 28): Bilinear Maps

### Lecture 16 (Wed, March 30): PKI and TLS

### Problem Set 4 (Due: Tuesday, April 19)

### Lecture 18 (Wed, April 6): Zero-Knowledge Proofs

### Lecture 19 (Mon, April 11): Exposure Notification

### Lecture 20 (Wed, April 13): Fully Homomorphic Encryption and Post Quantum Cryptography

### Lecture 21 (Wed, April 20): Jim Bidzos Guest Lecture

### Lecture 22 (Mon, April 25): Prio (Henry Corrigan-Gibbs Guest Lecture)