This document outlines the topics and key dates for a course on network and computer security. The course covers 25 class sessions on topics such as encryption, hashing, digital signatures, zero-knowledge proofs, and security of voting. Students are assigned 5 problem sets and work on a final project over the course of the semester, with drafts, reviews, and a final due date. Quizzes and exams are also administered to assess student learning.
This document outlines the topics and key dates for a course on network and computer security. The course covers 25 class sessions on topics such as encryption, hashing, digital signatures, zero-knowledge proofs, and security of voting. Students are assigned 5 problem sets and work on a final project over the course of the semester, with drafts, reviews, and a final due date. Quizzes and exams are also administered to assess student learning.
This document outlines the topics and key dates for a course on network and computer security. The course covers 25 class sessions on topics such as encryption, hashing, digital signatures, zero-knowledge proofs, and security of voting. Students are assigned 5 problem sets and work on a final project over the course of the semester, with drafts, reviews, and a final due date. Quizzes and exams are also administered to assess student learning.
1 Introduction Done 2 Security Mechanisms and Principles Problem set 1 Out 3 Encryption, Perfect Secrecy, One-Time Pad 4 Cryptographic Hash Functions 5 Hashing Applications and Constructions 6 Bitcoin Problem set 1 Due, Problem set 2 Out 7 Secret Sharing 8 Block Ciphers 9 Block Cipher Modes 10 Message Authentication Codes Problem set 2 Due, Project Ideas Due, Problem set 3 Out 11 Prime Finding and other “Crypto” Math 12 Diffie-Hellman Key Exchange and Crypto Groups 13 Pedersen Commitment, PK Encryption, DDH Project Draft Due 14 Malleability of El Gamal, IND-CCA2 Problem set 3 Due, Problem set 4 Out 15 Digital Signatures 16 DSA, Gap Groups Project Progress Review 17 Gap Groups, Bilinear Maps, and Applications 18 Zero-Knowledge Proofs Problem set 4 Due 19 No Lecture (Quiz) Quiz 20 Security of Voting Problem set 5 Out, Project Progress Review 21 Security of Voting (cont.) 22 Project Presentations 23 Project Presentations (cont.) Problem set 5 Due 24 Project Presentations (cont.) 25 Project Presentations (cont.) 26 No Class Final Project Due https://ocw.mit.edu/courses/6-857-network-and-computer-security-spring-2014/pages/