MIT 6.S976 and 18.S996 (Spring 2026)
Cryptography and Machine Learning: Foundations and Frontiers

Course Description

Cryptography offers a playbook for building trust on untrusted platforms. This course applies that playbook to modern machine learning. We will study how cryptographic modeling and tools—ranging from privacy-preserving algorithms to interactive proofs and debate protocols—can endow ML systems with privacy, verifiability, and reliability. Topics include mechanisms for data and model privacy; methods to verify average-case quality and certify worst-case correctness; and strategies for robustness and alignment across discriminative and generative models. The course will start to draw the contours of a new field at the Crypto × ML interface and identify concrete problems in trustworthy ML that benefit from cryptographic thinking and techniques.

Prerequisites: 6.1220 (Algorithms) AND 6.390 (Intro to Machine Learning); or equivalent. Alternatively, permission from the instructors.

Course Information

INSTRUCTORS Shafi Goldwasser
Email: shafi at csail dot mit dot edu
Vinod Vaikuntanathan
Email: vinodv at csail dot mit dot edu
LOCATION AND TIME Tuesday and Thursday 11:00am-12:30pm in 24-115 37-212.
TAs Neekon Vafa
Email: nvafa at mit dot edu
Office hours: Tuesdays 7-8pm, Thursdays 4-5pm (virtual this week)
Liyan Chen
Email: cliyan at mit dot edu
ASSIGNMENTS AND GRADING Grading will be based on problem sets (25%), scribe notes (20%), a final project (45%) and class participation (10%).

Released Problem Sets:
SCRIBING Students are required to produce notes for one lecture in groups of 2-3 students. Since scribe notes are worth 20% of the final grade, we expect your scribe notes to be polished and high quality. Use the LaTeX template provided here, and be sure not to modify the "scribe.sty" file in your submitted notes. To sign up to scribe a lecture, refer to the spreadsheet link sent over the class email list. The final deadline to submit scribe notes is 1 week after lecture.

RESOURCES For background on ML basics, we recommend the following free resources:

Schedule (tentative and subject to change)

Lecture Topic
Module 1: Introduction to the Course and ML/Crypto Basics
Lecture 1 (Tue Feb 3) Overview of the course.
Resources:
Lecture 2 (Thu Feb 5) Guest Lecturer: Jonathan Shafer
ML basics: Classification, Regression, Generation; Access models to data.
Resources:
Lecture 3 (Tue Feb 10) Guest Lecturer: Jonathan Shafer
ML basics (contd.)
Resources:
Lecture 4 (Thu Feb 12) Crypto basics: Secure communication, one-time pads, pseudorandomness (computational indistinguishability).
Resources:
No Lecture (Tue Feb 17) No classes
Lecture 5 (Thu Feb 19) Crypto basics, continued: Pseudo Random Functions, LPN, learning impossibility based on cryptographic hardness
Resources:
Module 2: Watermarking
Lecture 6 (Tue Feb 24) MIT Closure--Class Canceled
Lecture 7 (Thu Feb 26) Watermarking: problem definition, digital signatures, classical approaches, watermarking LLM outputs.
Resources:
Lecture 8 (Tue Mar 3) Watermarking: pseudorandom codes and robust watermarking; open problems.
Resources:
Module 3: Verification
Lecture 9 (Thu Mar 5) Guest Lecturer: Adam Kalai
Hallucinations and how to mitigate them.
Resources:
Lecture 10 (Tue Mar 10) Verification: crypto tools, interactive proofs, zero knowledge.
Resources:
Lecture 11 (Thu Mar 12) Guest Lecturer: Jonathan Shafer
PAC verification: how to verify properties of models?
Resources:
Lecture 12 (Tue Mar 17) Self-proving LLM, modify interactive proofs to the learning setting.
Resources:
Lecture 13 (Thu Mar 19) Guest Lecturer: Orr Paradise
Self-proving LLM (contd.)
Resources:
Lecture 14 (Tue Mar 31) Guest Lecturer: Cameron Freer
Lean: a different take on verification.
Module 4: Robustness and Alignment
Lecture 15 (Thu Apr 2) Guest Lecturer: Sam Hopkins
Robust statistics.
Lecture 16 (Tue Apr 7) Backdoors in ML.
Lecture 17 (Thu Apr 9) Backdoors in ML.
Lecture 18 (Tue Apr 14) Alignment.
Module 5: Privacy and Security
Lecture 19 (Thu Apr 16) Privacy: Overview
Lecture 20 (Tue Apr 21) Model Stealing I
Lecture 21 (Thu Apr 23) Model Stealing II
Lecture 22 (Tue Apr 28) Cryptographic Techniques: Homomorphic Encryption, Private Information Retrieval.
Lecture 23 (Thu Apr 30) Encrypted Matrix-Vector Products via Trapdoored Matrices.
Lecture 24 (Tue May 5) Guest Lecturer: Alexandra Henzinger
Cryptographic techniques, continued: Private Search.
Module 6: Project Presentations
Lecture 25 (Thu May 7) Project presentations.
Lecture 26 (Tue May 12) Project presentations.