If you have any trouble accessing any of these materials, please post a note on Piazza and we'll help.
- Slides: all animations, limited animations
- Outline
- Recording
- Supplemental Reading: Textbook §11.3-11.5
- Given a protocol that combines encryption, MACs, and signutures, decide whether it provides confidentiality and/or integrity, and whether it's secure against replay and reflection attacks. Problem 9 from the 2017 exam (below) is a good example of such a problem.
- You do not need to understand the math behind encrypt/decrypt, MAC, or sign/verify. We will only ask you about schemes that use these functions as building blocks. You should understand the properties they provide and how they are properly used in a secure channel, but you do not need to understand, e.g., the mathematical reasons that encryption provides confidentiality but not integrity.
- Given p and g, perform Diffie-Hellman key exchange between two parties.
- Explain the attack on Diffie-Hellman key exchange.
- Explain how to use public-key cryptography to verify the identity of users, including how certificates are created and distributed.
- You do not need to understand the details of the TLS handshake, although you should recognize familiar elements within it (sequence numbers, keys, etc.)
Exam questions about secure channels tend to look more mathematical than most 6.033 exam questions, because they typically involve mathematical notation. It's worth checking out a few of the practice problems below just to get a feel of how these questions are written/formatted.
Practice problems