MIT 6.S976 and 18.S996 (Spring 2026)
Cryptography and Machine Learning: Foundations and Frontiers

Course Description

Cryptography offers a playbook for building trust on untrusted platforms. This course applies that playbook to modern machine learning. We will study how cryptographic modeling and tools—ranging from privacy-preserving algorithms to interactive proofs and debate protocols—can endow ML systems with privacy, verifiability, and reliability. Topics include mechanisms for data and model privacy; methods to verify average-case quality and certify worst-case correctness; and strategies for robustness and alignment across discriminative and generative models. The course will start to draw the contours of a new field at the Crypto × ML interface and identify concrete problems in trustworthy ML that benefit from cryptographic thinking and techniques.

Prerequisites: 6.1220 (Algorithms) AND 6.390 (Intro to Machine Learning); or equivalent. Alternatively, permission from the instructors.

Course Information

INSTRUCTORS Shafi Goldwasser
Email: shafi at csail dot mit dot edu
Vinod Vaikuntanathan
Email: vinodv at csail dot mit dot edu
LOCATION AND TIME Tuesday and Thursday 11:00am-12:30pm in 24-115 37-212.
TAs Neekon Vafa
Email: nvafa at mit dot edu
Office hours: Tuesdays 7-8pm, Thursdays 4-5pm (locations TBD)

ASSIGNMENTS AND GRADING Grading will be based on problem sets (25%), scribe notes (20%), a final project (45%) and class participation (10%).

Released Problem Sets:
SCRIBING Students are required to produce notes for one lecture in groups of 2-3 students. Since scribe notes are worth 20% of the final grade, we expect your scribe notes to be polished and high quality. Use the LaTeX template provided here, and be sure not to modify the "scribe.sty" file in your submitted notes. To sign up to scribe a lecture, refer to the spreadsheet link sent over the class email list. The final deadline to submit scribe notes is 1 week after lecture.

RESOURCES For background on ML basics, we recommend the following free resources:

Schedule (tentative and subject to change)

Lecture Topic
Module 1: Introduction to the Course and ML/Crypto Basics
Lecture 1 (Tue Feb 3) Overview of the course.
Resources:
Lecture 2 (Thu Feb 5) Guest Lecturer: Jonathan Shafer
ML basics: Classification, Regression, Generation; Access models to data.
Resources:
Lecture 3 (Tue Feb 10) Guest Lecturer: Jonathan Shafer
ML basics (contd.)
Resources:
Lecture 4 (Thu Feb 12) Crypto basics: Secure communication, one-time pads, pseudorandomness (computational indistinguishability).
Resources:
No Lecture (Tue Feb 17) No classes
Lecture 5 (Thu Feb 19) Crypto basics, continued: Pseudo Random Functions, LPN, learning impossibility based on cryptographic hardness
Resources:
Module 2: Watermarking
Lecture 6 (Tue Feb 24) MIT Closure--Class Canceled
Lecture 7 (Thu Feb 26) Watermarking: problem definition, digital signatures, classical approaches, watermarking LLM outputs.
Resources:
Lecture 8 (Tue Mar 3) Watermarking: pseudorandom codes and robust watermarking; open problems.
Resources:
Module 3: Verification
Lecture 9 (Thu Mar 5) Guest Lecturer: Adam Kalai
Hallucinations and how to mitigate them.
Resources:
Lecture 10 (Tue Mar 10) Verification: crypto tools, interactive proofs, zero knowledge.
Resources:
Lecture 11 (Thu Mar 12) Guest Lecturer: Jonathan Shafer
PAC verification: how to verify properties of models?
Resources:
Lecture 12 (Tue Mar 17) Self-proving LLM, modify interactive proofs to the learning setting.
Lecture 13 (Thu Mar 19) Guest Lecturer: Orr Paradise
Self-proving LLM (contd.)
Lecture 14 (Tue Mar 31) Guest Lecturer: Cameron Freer
Lean: a different take on verification.
Module 4: Robustness and Alignment
Lecture 15 (Thu Apr 2) Robust statistics (in training).
Lecture 16 (Tue Apr 7) Backdoors in ML.
Lecture 17 (Thu Apr 9) Backdoors in ML.
Lecture 18 (Tue Apr 14) Alignment.
Module 5: Privacy and Security
Lecture 19 (Thu Apr 16) Privacy 1: differential privacy, copyright protection.
Lecture 20 (Tue Apr 21) Privacy 2: machine unlearning.
Lecture 21 (Thu Apr 23) Privacy 3: model stealing.
Lecture 22 (Tue Apr 28) Privacy 3: model stealing (continued)
Lecture 23 (Thu Apr 30) Privacy 4: cryptographic techniques, Homomorphic Encryption, Private Information Retrieval. ML techniques, embeddings.
Lecture 24 (Tue May 5) Cryptographic techniques, continued. Federated learning.
Module 6: Special Topics and Projects
Lecture 25 (Thu May 7) Crypto for ML efficiency.
Lecture 26 (Tue May 12) Project presentations.