6.857: Applied Cryptography and Security (Spring 2022)
References
Related MIT Courses
Number theory reference
This is a great reference for many of the math concepts we will be using throughout the semester. Note that you won't be required to know most of these topics ahead of time, and we will cover them in class as needed.
Security books
There are five recommended
textbooks (not required!) for this course. In
addition, we have a number of other suggestions
collected over previous years. You're welcome to send
us suggestions if you find a security book you think
should be on this list.
-
Mark Stamp
Information Security: Principles and Practice
John Wiley & and Sons
2006
-
Alfred Menezes, Paul van Oorschot, Scott Vanstone
Handbook of Applied Cryptography
CRC Press
1997
-
Bruce Schneier
Applied Cryptography, 2nd Edition
John Wiley & Sons
1996
-
Christof Paar and Jan Pelzl
Understanding Cryptography
Springer
2010
-
Ross Anderson
Security Engineering
John Wiley & Sons
2001
-
Douglas Stinson
Cryptography Theory and Practice
CRC Press
1995
-
Bruce Schneier
Secrets and Lies
John Wiley & Sons
2000
-
Eric Rescorla
SSL and TLS: Designing and Building Secure Systems
Addison-Wesley
2001
-
Peter Neumann
Computer Related Risks
Addison-Wesley
1995
-
Jakob Nielsen
Usability Engineering
Academic Press
1993
-
Charlie Kaufman, Radia Perlman, Mike Speciner
Network Security: Private Communication in a Public World, 2nd
Edition
Prentice Hall
2002
-
Simson Garfinkel, Gene Spafford
Web Security, Privacy & Commerce
O'Reilly
2002
-
David Kahn
The Codebreakers
Scribner
1973
-
Phillip Hallam-Baker
The dotCrime Manifesto: How to Stop Internet Crime
Addison-Wesley
2008
-
Jonathan Katz, Yehuda Lindell
Introduction to Modern Cryptography
Chapman & Hall/CRC Press
2007
-
Nigel Smart
Cryptography: An Introduction, 3rd Edition
2008
-
Song Y. Yan and Martin E. Hellman
Number Theory for computing
Springer
2002
-
Dana Angluin
Lecture Notes on the Complexity of Some Problems in Number Theory
Chapters 3-10 provide relevant number theory for the class
1982
Security Conferences
Papers
Most of the reading material in 6.857 comes from conferences on computer
and network security. Here is a list of the papers we hope to discus; we
won't have time for everything. Send us a note if you see a paper that
greatly interests you.
Miscellaneous
Good Websites