6.857 Lecture References - Fall 2002
Below are links to material relevant to our lectures. Students are
responsible for knowing the contents of the handouts, the contents of
the lecture notes, and any other items that are starred. To suggest
the addition of a hyperlink or paper, email 6.857-staff@mit.edu.
Lecture 01 (Th 9/05/2002): Introduction
- Handouts:
- Handout 00: (Student information) [PDF, PS]
- Handout 01: (Course information) [PDF, PS]
- Handout 02: ("Why Johnny Can't Encrypt"/Whitten) [PDF, PS, HTML]
- Handout 03: (Cookies/Fu): [PDF, PS]
- Lecture 01 notes from Fall 2001:
[PDF,
PS]
Lecture 02 (Tu 9/10/2002): Passwords, Hashing, and Cookies
- Handouts: None today
- Lecture 02 notes from Fall 2001:
[PDF,
PS]
- Lecture 02 slides on cookie authentication:
[PDF,
PS]
- Related Reading:
- Alma Whitten's collection of references on Human
factors and computer security
- Menezes et al. Handbook of Applied
Cryptography, pages 321--327. [hash functions and MACs]
- "Risks of Passwords" by Peter Neumann.
Page 126, Communications of the ACM, April 1994, Vol 37, No. 4.
[MIT-only pdf]
- "User Authentication Scheme Not Requiring Secrecy in the Computer"
Arthur Evans, Jr., William Kantrowitz, and Edwin Weiss.
pages 437--442, Communications of the ACM, August 1874, Vol 17, Number 8.
[MIT-only pdf]
- Related links:
Lecture 03 (Th 9/12/2002): Hashing
Lecture 04 (Th 9/17/2002): Hashing and One-time Pad
Lecture 05 (Th 9/19/2002): Block ciphers
Lecture 06 (Tu 9/24/2002): Block ciphers modes of operation, number theory
- Handouts:
- Handout 09: Rijndael/AES, RC5, modes of operation
[See course secretary]
- Handout 10: CLRS Chapter 31 pp. 849-905, Number Theory
[See course secretary]
- Old lecture notes [PS,
PDF]
Lecture 07 (Th 9/26/2002): One-time MACs, Generators, Discrete Logs
- Handouts:
- Old lecture notes [PS,
PDF]
Lecture 08 (Tu 10/1/2002): Discrete-log based PKCS, El Gamal
- Handouts:
- Handout 13: Problem Set 1 Solutions
[PDF,
PS,
TEX,
TEX Macros,
TEX Macros]
- Handout 14: Announcement of Quiz 1 and Term Project Proposal
[PS,
PDF]
- Handout 15: Excerpts on DLP, ElGamal, DSA, and Schnorr
[See course secretary]
- Old lecture notes
[PS,
PDF]
Lecture 09 (Th 10/3/2002): DSA/DSS, RSA, chosen-ciphertext attack
- Handouts:
- Old lecture notes
[PS,
PDF]
Lecture 10 (Tu 10/8/2002): Plaintext-aware, Adaptive Chosen Ciphertext, OAEP, Cramer-Shoup, certificates
- Handouts:
- Handout 18: Problem Set 3 Solutions
[PDF,
PS,
Code]
- Handout 19: Plaintext-awareness, Cramer-Shoup PKCS
[See course secretary]
- Old lecture notes
[PS,
PDF]
- Related links:
Lecture 11 (Th 10/10/2002): Quiz 1
Quiz 1 today during lecture
Lecture 12 (Th 10/17/2002): Palladium and the TCPA
Special lecture and location!
We will have two invited speakers: Joe Pato from HP Labs (speaking on TCPA) and
Brian LaMacchia from Microsoft (speaking on Palladium). Make sure to read
the Palladium FAQ before attending.
This will be a joint
lecture with 6.805
- TCPA
slides by Joe Pato of HP Labs.
- Palladium
slides by Brian LaMacchia of Microsoft.
- New lecture notes by scribes
[PS,
PDF,
TEX]
[Figures]
- Macros files necessary to compile the LaTeX lecture notes
[TEX]
- Palladium documents
- Palladium in the news
Lecture 13 (Tu 10/22/2002): Palladium/TCPA follow-up, zero knowledge
- Handouts:
- Handout 22: Zero knowledge
[See course secretary]
- Handout 23: Problem Set 4 Solutions
[PDF,
PS,
Code]
- New lecture notes
[PS,
PDF]
Lecture 14 (Th 10/24/2002): Certificate chains
- Handouts:
- Handout 24: Midterm
[PDF,
PS
TEX]
- Handout 25: Certificate chain discovery in SPKI/SDSI
[PDF,
PS]
- New lecture notes
[PS,
PDF]
Lecture 15 (Tu 10/29/2002): Voting, homomorphic encryption
- Handouts:
- Handout 26: Practical Multi-Candidate Election System
[PDF]
- New lecture notes
[PS,
PDF,
TEX]
[Figures]
Lecture 16 (Th 10/31/2002): Mixnets for voting, frogs
- Handouts:
- Old lecture notes
[PS,
PDF]
- Related links:
- PPT slides on Voting/Frogs
- Word doc
draft paper related to Prof. Rivest's slides
- FreeHaven
- LCS Anonymous
Remailer
- David Mazières and M. Frans Kaashoek. "The design,
implementation and operation of an email pseudonym server." In the
Proceedings of the 5th ACM Conference on Computer and Communications
Security (CCS-5), San Francisco, California, November 1998, pages
27-36. [PDF]
Lecture 17 (Tu 11/5/2002): Viruses
- Handouts:
- Handout 29: Blended attack exploits, vulnerabilities and buffer-overflow techniques
in computer viruses
[PDF]
- Old lecture notes
[PS,
PDF]
- Related links:
Lecture 18 (Th 11/7/2002): Self-Referential Programs, Viruses
- Handouts:
- Handout 30: Problem Set 6
[PDF,
PS,
TEX,
TEX Macros,
TEX Macros,
Code]
- Handout 31 part 1: An undetectable computer virus
[PDF]
- Handout 31 part 2: Reflections on trusting trust
[See course secretary]
- Old lecture notes [See lecture notes 17]
- Related links:
Lecture 19 (Tu 11/12/2002): SSL/TLS and key agreement
- Handouts:
- Handout 32: Midterm solutions
[PDF,
PS]
- Handout 33: SSL/TLS
[See course secretary]
- New lecture notes
[PS,
PDF,
TEX]
[Figures]
- Related links:
Lecture 20 (Th 11/14/2002): SSL, side channel attacks, power analysis
- Handouts:
- Handout 34: Tamper resistance
[HTML]
- Old lecture notes
[PS,
PDF]
Lecture 21 (Tu 11/19/2002): Tempest, gummy fingers
- Handouts:
- Old lecture notes
[PS,
PDF]
- Related links:
Lecture 22 (Th 11/21/2002): Payment systems
HKN student evaluation today
- Handouts:
- Handout 37: Problem Set 6 Solutions
[PDF,
PS]
- New lecture notes [to appear]
- Old lecture notes
[PS,
PDF]
- Related links:
Lecture 23 (Tu 11/26/2002): Quiz 2, concluding remarks
Quiz 2 during lecture today
Lecture 24 (Tu 12/03/2002): Talks
- Handouts:
- Handout 39: Quiz 2 Solutions
- Handout 40: Survey
[PDF,
PS]
- Handout 41: RC Cola Cipher?
[HTML 1 (turn on audio),
HTML 2]
Lecture 25 (Th 12/05/2002): Talks
Lecture 26 (Tu 12/10/2002): Talks
6.857 home //
Last updated (GMT) $Date: 2002/12/03 16:10:13 $ by $Author: fubob $