6.857 Lecture References - Fall 2001
Below are links to material relevant to our lectures. Students are
responsible for knowing the contents of the handouts, the contents of
the lecture notes, and any other items that are starred. To suggest
the addition of a hyperlink or paper, email 6.857-staff@mit.edu.
Lecture 01 (Th 9/06/2001): Introduction
- Handouts:
- Handout 00: (Student information) [PDF, PS]
- Handout 01: (Course information) [PDF, PS]
- Lecture 01 notes (scribed by Fu/Shelat):
[PDF,
PS,
TEX]
- Macros files necessary to compile the LaTeX lecture notes
[TEX]
- Announcements:
- Related links:
Lecture 02 (Tu 9/11/2001): Passwords and Cookies
(Including guest lecture by Kevin Fu on cookies)
- Handouts:
- Handout 02: (Passwords/Summers): [See course secretary]
- Handout 03: (Cookies/Fu): [PDF, PS]
- Lecture 02 notes (scribed by Cadar/Francu/Gheorghioiu):
[PDF,
PS,
TEX]
[Figures]
- Related Reading:
- Menezes et al. Handbook of Applied
Cryptography, pages 321--327. [hash functions and MACs]
- "Risks of Passwords" by Peter Neumann.
Page 126, Communications of the ACM, April 1994, Vol 37, No. 4.
[MIT-only pdf]
- "User Authentication Scheme Not Requiring Secrecy in the Computer"
Arthur Evans, Jr., William Kantrowitz, and Edwin Weiss.
pages 437--442, Communications of the ACM, August 1874, Vol 17, Number 8.
[MIT-only pdf]
- Related links:
Lecture 03 (Th 9/13/2001): Electronic Voting
- Handouts:
- Lecture 03 Notes (scribed by E. Huang/J. Huang/K. Huang/Shi):
[PDF,
PS,
TEX]
- Related links:
- PPT slides
of requirements for Electronic and Internet Voting Systems
- PPT slides from
Prof. Rivest's presentation to the Harvard Club
Lecture 04 (Tu 9/18/2001): Voting/Frogs, collision-resistant hash functions
- Handouts:
- Lecture 04 Notes (scribed by Gilliland/Li/Lustbader/Wagner)
[PDF,
PS,
TEX,
Figs]
- Related links:
Lecture 05 (Th 9/20/2001): Number theory, digital signatures
- Handouts:
- Handout 05: (Problem Set 2):
[PDF,
PS,
TEX,
Java]
- Handout 06: (CLRS Chapter 31 pp. 849-905, Number Theory):
[See course secretary]
- Lecture 05 Notes (scribed by Burkard/Gu/Yu)
[PDF,
PS,
TEX]
- Related links:
- Illegal
prime numbers
- Prof. Dana Angluin's "Lecture Notes on the Complexity of Some
Problems in Number Theory" gives a concise and hands-on
introduction to number theory. Prof. Angluin would appreciate an email
to angluin@cs.yale.edu if you find any errors in this revision.
[PDF,
PS]
- GNU Multi-Precision
number package for C
- Java
BigInteger package
- Relevant scribe notes from 1997
[PDF]
Lecture 06 (Tu 9/25/2001): GCD, modular inverses, generators
mod p, safe primes, the El Gamal signature scheme, and the discrete
logarithm problem.
- Handouts:
- Lecture 06 Notes (scribed by Bailey/Cholankeril/Kwon/Zitser)
[PDF,
PS,
TEX]
Lecture 07 (Th 9/27/2001): Mental Poker, RSA, Blind signatures
- Handouts:
- Handout 09: (Problem Set 3):
[PDF,
PS,
TEX,
Figs]
- Handout 10: (Mental Poker) [See course secretary]
- Lecture 07 Notes (scribed by Baekkelund/Magdsick/Mazza/Schmidt)
[corrected 10/10/2001]
[PDF,
PS,
TEX,
Figs]
- Related links:
- Menezes et al. Handbook of Applied Cryptography. Section 11.8.1 (Blind
signature schemes)
- Poker protocols
Lecture 08 (Tu 10/02/2001): Commitments and blind signatures
- Handouts:
- Handout 11: (Problem Set 2 Solutions):
[PDF,
PS,
TEX,
Java]
- Handout 12: (FOO Voting Scheme) [See course secretary]
- Lecture 08 Notes (scribed by Blackwell/Andrews/Lai/Sieunarine)
[PDF,
PS,
TEX,
Fig,
Fig,
EPS,
EPS,
PSTEX,
PSTEX_T]
- Related links:
Lecture 09 (Th 10/04/2001): Homomorphic encryption
- Handouts:
- Handout 13: (Problem Set 4)
[corrected 10/9/2001]:
[PDF,
PS,
TEX]
- Handout 14: (Practical Multi-Candidate Election System)
[See course secretary or PDF]
- Lecture 09 Notes (scribed by Chan/Kottahachchi/Samaranayake/Wee)
[PDF,
PS,
TEX]
Lecture 10 (Th 10/11/2001): MixNets
- Handouts:
- Handout 15: (Problem Set 3 Solutions) [corrected
10/15/2001]
[PDF,
PS,
TEX,
EPS,
Code]
- Handout 16: (Problem Set 5)
[PDF,
PS,
TEX]
- Handout 17: (Secret Sharing)
[See course secretary]
- Handout 18: (Zero Knowledge)
[See course secretary or sections 10.4, 10.4.1, and 10.4.3 of the HAC]
- Handout 19: (Untraceable electronic mail)
[See course secretary]
- Lecture 10 Notes (scribed by Brunsman/Leon/Lin/Cheung)
[PDF,
PS,
TEX,
Figs]
- Related links:
- FreeHaven
- LCS Anonymous
Remailer
- David Mazières and M. Frans Kaashoek. "The design,
implementation and operation of an email pseudonym server." In the
Proceedings of the 5th ACM Conference on Computer and Communications
Security (CCS-5), San Francisco, California, November 1998, pages
27-36. [PDF]
Lecture 11 (Tu 10/16/2001): Block ciphers
- Handouts:
- Handout 20: (Problem Set 4-2 Solutions)
[PDF,
PS,
TEX]
- Handout 21: (Practical Threshold Signatures) [See course
secretary or PDF]
- Lecture 11 Notes (scribed by Boufounos/Castagnola/Michalakis)
[PDF,
PS,
TEX,
Figs]
- Related links:
Lecture 12 (Th 10/18/2001): OCB mode and SSL
- Handouts:
- Lecture 12 Notes (scribed by Agarwal/Bull/Karlovich/Muller)
[PDF,
PS,
TEX and Figs]
- Related links:
Lecture 13 (Tu 10/23/2001): Electronic Payments
- Handouts:
- Handout 23: (Problem Set 4-1 Solutions)
[PDF,
PS,
TEX]
- Handout 24: (Problem Set 5 Solutions)
[PDF,
PS,
TEX]
- Lecture 13 Notes (scribed by Nelson/Newsom/Okunseinde/Walker)
[PDF,
PS,
TEX]
- Related Links:
Lecture 14 (Th 10/25/2001): Public-Key Infrastructure (PKI)
- Handouts
- Lecture 14 notes (scribed by Armour/Johann-Berkel/Owsley/Quealy)
[PDF,
PS,
TEX,
fig]
- References:
-
Secure Electronic Commerce: Building the Infrastructure for
Digital Signatures and Encryption
by Warwick Ford and Michael S. Baum
Prentice, Hall, 2001.
-
SPKI/SDSI Certificates (Web page maintained by Carl Ellison)
- Certificate
Chain Discovery in SPKI/SDSI by Dwaine Clarke, Jean-Emile Elien,
Carl Ellison, Matt Fredette, Alexander Morcos, and Ronald L. Rivest.
Lecture 15 (Tu 10/30/2001): Smartcards
- Handouts
- Lecture 15 notes (scribed by Giffin/Greenstadt/Litwack/Tibbetts)
[Updated 11/9/2001]
[PDF,
PS,
TEX]
- Related links
Lecture 16 (Th 11/01/2001): Digital Rights Management, DMCA
Lecture 17 (Tu 11/06/2001): Viruses
- Lecture 17 Notes (scribed by Hydari/Krishnamurthy/Yip/Yuditskaya)
[PDF,
PS,
TEX,
EPS]
Lecture 18 (Th 11/08/2001): Viruses and Worms
- Handouts:
- Lecture 18 Notes (scribed by Chiou/Chou/Ma/Vo)
[PDF,
PS,
TEX,
EPS]
- Related links:
Lecture 19 (Tu 11/13/2001): Practical Insecurity
- Guest lecturer: Roger Dingledine
- Lecture 19 Notes (scribed by Cody/Cotler/Hastings/Langer)
[PDF,
PS,
TEX]
- Handouts:
- Handout 29: (Problem Set 7) [updated 11/13/2001]
[PDF,
PS,
TEX,
Java]
- Handout 30: (Concepts in Computer and Network Insecurity)
[PDF,
PS,
TEX,
EPS,
EPS]
- Handout 31: (Midterm Solutions)
[PDF,
PS,
TEX]
- Related links
Lecture 20 (Th 11/15/2001): Java Security
- Lecture 20 Notes (scribed by Krishnamurthy)
[PDF,
PS,
TEX,
EPS]
Lecture 21 (Tu 11/20/2001): Java Security and Biometrics
- Lecture 21 Notes (scribed by Bevilacqua/Itsara/Kochman/Reinstein)
[PDF,
PS,
TEX,
EPS]
Lecture 22 (Tu 11/27/2001): Quantum Cryptography
- Handouts:
- Handout 33: (Problem Set 7 Solutions)
[PDF,
PS,
TEX,
Java]
- Handout 34: (Quantum Cryptography)
[PDF]
- Lecture 22 Notes (scribed by Cruz/Davtchev/Kim/Rahnev)
[PDF,
PS,
TEX,
EPS]
Lecture 23 (Th 11/29/2001): Wrap-up
- Handouts:
- Lecture 23 Notes (scribed by Chen/Kim/Kwon/Medak)
[PDF,
PS,
TEX,
EPS]
- Related links:
Lecture 24 (Tu 12/04/2001): Talks
- Schmidt, Magdsick:
SEC: SSH like client
- Muller, Karlovich, Bull, Agarwal:
A Secure Media Distribution Framework
- Burkard, Gu, Yu, Mazza:
How to Make the User Authentication Process in MS Passport More Secure
- Cadar, Francu, Gheorghioiu:
Blinded Distributed Computing
- Walker, Okunseinde, Newsom, Nelson:
Security of Wireless Networks and Mobile Devices
- Johann-Berkel, Quealy, Armour, Owsley:
Cracking Digital Satellite TV
- Yip, Hydari, Krishnamurthy, Yuditskaya:
User Authentication in Cryptographic File Systems
- Baekkelund:
Steganography in Spam
Lecture 25 (Th 12/06/2001): Talks
- Li, Wagner, Gilliland, Lustbader:
Proactive Cryptography Applications in Smart Cards
- Chiou, Chou, Ma, Vo:
Execution-Based Software Protection
- Giffin, Plitwack, Greenstadt, Tibbetts:
Steganography in TCP timestamps
- Kottahachchi, Chan, Samaranayake:
Rethinking Software Piracy: Active Software Rights Verification for
Effective Control of Piracy
- Nikos, Luciano, Petros:
Reputation-Based Certificate Authorities
- Bailey, Cholankeril, Zitser:
Cookie authentication
- Cruz, Davtchev, Kim, Rahnev:
Analyzing the Security of 802.11 Wireless Networks
Lecture 26 (Tu 12/11/2001): Talks
- Cody, Cotler, Hastings, Langer:
Threshold Signatures and Open Source
- Bevilacqua, Itsara, Kochman, Reinstein:
Honeypots
- Brunsman, Leon, Lin, Cheung:
Honeypots
- 3 Huangs and a Shi:
Security and Privacy Issues of Microsoft Passport
- Blackwell, Andrews, Lai, Sieunarine:
Security Aspects of Unicode
- Chen, Kim, Kwon, Medak:
Digital Signatures for Physical Mail
- Pick, Mine, Traub, Stein:
Peer-to-Peer Security: Limits of Trust, DDOS, and Covert Channels
6.857 home //
Last updated (GMT) $Date: 2001/12/12 18:16:43 $ by $Author: fubob $