|
Welcome
Welcome to the 6.857 homepage, where you should be able to find all that
you want related to the class. Information about the class is available
here.
Handouts
The following handouts were made available during lecture. Some of
these contained photocopies that can't be made available over the
web. For copies of these, please swing by NE43-311 and pick up a copy
from the course drawer. If it happens to be the last one, PLEASE
notify the course secretary before taking it with you.
Lecture notes
The following are the lecture notes, as taken by students, for the
class. Instructions on how to take notes are available here .
- Lecture 1 :
Course Info, Security Objectives --- Stacey Blau
- Lecture 2 :
Unconditional Security, One-Time Pad, Generating Random Bits, MACs --- Zia Ahmed
- Lecture 3 :
Unconditionally Secure Authenticaiton, MAC, Privacy and Authentication, key length --- Abby Knickerbocker
- Lecture 4 :
Conditionally Secure Cryptography, Block Ciphers --- Michelle Goldberg
- Lecture 5 :
CBC mode, Stream Ciphers, Pay-TV, KDC -- Roberta Braum
- Lecture 6 :
Concepts of Public Key Cryptography, Number Theory, ExpMod, Finding Primes -- Elliot Schwartz
- Lecture 7 :
Density of Primes, Generators, Discrete Logs, Key Exchange, ElGamal -- Vijak Sethaput
- Lecture 8 :
ElGamal, DSS, RSA, Elliptic Curves -- Debajit Ghosh
- Lecture 9 :
Digital Signatures, Hashing Security, MD5, SHA, Birthday Attack, CvHP, MACs -- Jesse Kornblum
- Lecture 10 :
CvHP, Uses of one-way hash functions, randomized hash functions, Auction & Commitment -- Edmond Kayi Lee
- Lecture 11 :
Coin Flipping, Interactive Protocols, Zero Knowledge -- Ching Law
- Lecture 12 :
Halevi-Micali Commitments, Graph 3-Coloring, Blobs, Circuits -- Christine Su
- Lecture 13 :
User Authentication, Passwords, Tokens, Biometrics -- Todd Parnell
- Lecture 14 :
Tamper Resistance, Timing Attacks -- Lewis Girod
- Lecture 15 :
Attacks on RSA smartcards, Secure Channels -- Ben Adida
- Lecture 16 :
Kerberos, BAN Logic, proof of Kerberos -- Chris Sepulveda
- Lecture 17 :
Security of Mobile Code, Java applets, concerns, policies -- Alex Hartemink
- Lecture 18 :
Java, ava Security, Attack Applets -- Jessica Wong
- Lecture 19 :
Java Security, TCP/IP, Syn Flooding, Firewalls -- Thor Sewell
- Lecture 20 :
Certification, PGP, X509 -- Lydia Sandon
- Lecture 21 :
SDSI/SPKI -- James Megquier
- Lecture 22 :
Electronic Voting -- Sabra-Anne Kelin
- Lecture 23 :
Electronic Cash -- Lynn Qu
- Lecture 24 :
More Digital Cash, Fingerprinting -- Eytan Adar
Problem Sets and Solutions
Other Sources of Information
- comp.risks archive via UseNet contains the latest few issues,
it can also be browsed via Discuss
- sci.crypt archive via UseNet contains discussion of cryptography. A
lot of the stuff is questions by people unfamiliar with the topic or just starting out, but there
are sometimes useful postings in there too.
- Ron Rivest's Cryptography Page has lots of links.
- CERT is responsible for helping disseminate information on security problems with computer systems.
- Phrack is an electronic publication aimed
at electronic hackers . Read and enjoy, but don't abuse.
- alt.2600 is yet another hacker publication, which also
has a splufty web page .
If you want to read and review stuff from previous years,
please look at the earlier years
page.
Last Modified: December 9, 1997
Yoav Yerushalmi
yoav@mit.edu
|