6.857 Lectures and Handouts - Fall 2003
Below are links to material relevant to our lectures. Students are
responsible for knowing the contents of the assigned reading, the
handouts, the lecture notes, and any other items that are starred. In
contrast, related readings are provided for your own interest, and are
optional.
To suggest the addition of a hyperlink or paper, email
6.857-staff@mit.edu.
Lecture 01 (Th 9/04/2003): Introduction
- Handouts:
- Handout 01: (Course information) [PDF, PS]
- Handout 02: ("Why Johnny Can't Encrypt"/Whitten) [PDF, PS, HTML]
- Handout 03: (Cookies/Fu): [PDF, PS]
- Handout 04: ("Analysis of an Electronic Voting System"):
[PDF]
Lecture 02 (Tu 9/9/2003): User Authentication Overview, Passwords, Hashing
- Handouts: None today
- Reading: Section 10.3 of the textbook
- Lecture Notes:
- Lecture 02 notes from Fall 2002: [PDF,
PS]
- Lecture 04 notes from Fall 2001: [PDF,
PS]
- Related (Optional) Reading:
- Menezes et al. Handbook of Applied
Cryptography, pages 321--327. [hash functions and MACs]
- "Risks of Passwords" by Peter Neumann.
Page 126, Communications of the ACM, April 1994, Vol 37, No. 4.
[MIT-only pdf]
- "User Authentication Scheme Not Requiring Secrecy in the Computer"
Arthur Evans, Jr., William Kantrowitz, and Edwin Weiss.
pages 437--442, Communications of the ACM, August 1974, Vol 17, Number 8.
[MIT-only
pdf]
- FIPS
Standard for Password Usage
- Related (Optional) Links:
Lecture 03 (Th 9/11/2003): Hash Functions
- Handouts:
- Handout 05: Problem Set 1 [PDF, PS]
- Related (Optional) Reading:
Lecture 04 (Tu 9/16/2003): More Hashing Applications,
Unconditional Security
- Handouts:
- Reading: Chapter 4 of the textbook
- Lecture Notes: Unconditional Security [PDF, PS]
- Related (Optional) Reading:
Lecture 05 (Th 9/18/2003): Unconditional Security
- Handouts:
- Handout 07: Problem Set 2
[PDF,
PS]
- Related (Optional) Links:
Lecture 06 (Tu 9/23/2003): Block ciphers, modes of operation
- Handouts:
- Handout 08: Problem Set 1 Solutions [PDF, PS]
- Reading: Chapter 5 of the textbook
- Lecture Notes:
- Lecture 11 notes from Fall 2001: [PDF,
PS]
- Lecture 12 notes from Fall 2001: [PDF,
PS]
- Related (Optional) Reading:
Lecture 07 (Th 9/25/2003): Intro to Number-Theoretic Crypto
- Handouts:
- Handout 09: Problem Set 3 [PDF, PS]
- Reading:
- Chapters 1 and 8 of the textbook
- Notes on number theory (very rough draft) [PDF]
Lecture 08 (Tu 9/30/2003): GCD and Modular Inverses, Generators,
Discrete Logs, Diffie-Hellman Key Exchange, El Gamal Encryption and
Signatures
- Handouts:
- Handout 10: Problem Set 2 Solutions
[PDF,
PS]
- Reading: Chapter 7 of the textbook
- Related (Optional) Reading:
Lecture 09 (Th 10/2/2003): RSA, Chosen-Ciphertext Attacks, RSA-OAEP
- Handouts:
- Handout 11: Problem Set 4 [PDF, PS]
- Reading:
- Related (Optional) Reading:
Lecture 10 (Tu 10/7/2003): Cramer-Shoup, Commitment Schemes
- Handouts:
- Reading: Section 13.2 of the textbook
Lecture 11 (Th 10/9/2003): Quiz 1
Quiz 1 today during lecture
- Prep Materials:
- Quiz #1 from 2002 [PDF]
- Quiz #1 Solutions [PDF, PS]
Lecture 12 (Tu 10/14/2003): Key Agreement
- Handouts:
- Handout 13: Quiz 1 Solutions [PDF, PS]
- Reading:
- Related (Optional) Reading:
Lecture 13 (Th 10/16/2003): SSL, IBS, IBE and Secret Sharing
- Reading: Section 12.6 of the textbook
- Related (Optional) Reading:
- Remote Timing Attacks Are Practical, D. Boneh and D. Brumley
(Usenix security 2003) [PDF,
PS]
- Analysis of the SSL 3.0 protocol, D. Wagner and B. Schneier
(Usenix Workshop on electronic commerce, 1996) [website] [revised
PDF]
- Identity-Based Encryption [website] [PDF]
Lecture 14 (Tu 10/21/2003): Secret Sharing
- Handouts:
- Handout 14: Problem Set 4 Solutions [PDF, PS]
- Related (Optional) Reading:
Lecture 15 (Th 10/23/2003): Zero-Knowledge
- Reading: Section 13.3 of the textbook
- Handouts:
- Handout 15: Take-Home Midterm [PDF, PS]
Lecture 16 (Tu 10/28/2003): Watermarking and Fingerprinting (Guest
Lecture)
- Related (Optional) Reading:
Lecture 17 (Th 10/30/2003): Tamper Resistance and Disk Forensics
- Handouts:
- Handout 16: Problem Set 5 [PDF, PS]
- Related (Optional) Reading:
Lecture 18 (Tu 11/4/2003): Physical Security: Physical Uncloneable
Functions, TEMPEST
- Reading:
- Related (Optional) Reading:
Lecture 19 (Th 11/6/2003): Self-Referential Programs, Viruses,
Buffer Overflow Attacks
- Handouts:
- Handout 17: Take-Home Midterm Solutions [PDF,
PS]
- Handout 18: Problem Set 6
[PDF,
PS]
- Reading:
Lecture 20 (Th 11/13/2003): More on Viruses
- Handouts:
- Handout 17: Midterm solutions
[PDF,
PS]
- Handout 19: Problem Set 5 Solutions
[PDF,
PS]
- Reading:
- Related (Optional) Reading:
Lecture 21 (Tu 11/18/2003): Trusted Computing (NGSCB aka
Palladium; TCPA)
- Lecture Notes:
- Lecture 12 notes from Fall 2002: [PDF, PS]
- Reading:
- Related (Optional) Reading:
Lecture 22 (Th 11/20/2003): Trusted Computing, Java Security,
Biometrics
- Handouts:
- Handout 20: Problem Set 6 Solutions
[PDF,
PS]
- Reading:
- Lecture 20 notes from Fall 2001 --- Java Security: [PDF,
PS]
- Lecture 21 notes from Fall 2001 --- Java Security and Biometrics: [PDF,
PS]
- Gummy finger slides
- Recommended (Optional) Reading:
Lecture 23 (Tu 11/26/2003): Quiz 2, concluding remarks
Quiz 2 during lecture today
Lecture 24 (Tu 12/02/2003): Talks
Lecture 25 (Th 12/04/2003): Talks
Lecture 26 (Tu 12/09/2003): Talks
6.857 home //
Last updated (GMT) $Date: 2004/03/23 02:20:29 $ by $Author: simsong $