Computer Science Department

CS773C: Machine Intelligence Advanced Applications

Spring 2000: Cryptography and Biometrics

  • Meets: TR 5:00 - 6:15 pm. (109 FA)

  • Instructors: Dr. George Bebis and Dr. Peter Li

  • Text:

    Douglas StinsonCryptographyTheory and Practice, CRC Press, 1995 (ISBN: 0849385210).
    Notes on Biometrics will be provided in class

  • Other helpful texts:

    • B. Schneier, Applied Cryptography John Wiley & Sons, Inc., 1996.
    • A.K. Jain, R. Bolle, and S. Pankanti (eds.), BIOMETRICS: Personal Identification in Networked societyKluwer Academic Publishers, 1998.

  • Useful links to Cryptography resources:

  • Useful links to Biometrics resources:

  • Course Description and Objectives

    Cryptography is the art and science of communicating in secure, private, and reliable ways. One of the basic problems in cryptography is that of encrypting and decrypting data. Encryption is the transformation of data into a form (ciphertext) which is ideally impossible to read without the need of appropriate knowledge. Its purpose is to ensure privacy by keeping information hidden from anyone for whom it is not intended. Decryption is the reverse of encryption, that is, the transformation of data back to its original form (plaintext). Encryption and decryption generally require the use of some hidden information, referred to as a key. Keys are used to translate a message into its encrypted form, and then to decrypt it back to its original form. Modern algorithms are designed so that a user who knows the algorithm but does not know the key cannot easily derive plaintext from the corresponding ciphertext.

    Biometrics refers to the identification of an individual based on his/her physiological characteristics, like a fingerprint, face, voice or behavior like handwriting or keystroke patterns. Because biometric characteristics are unique to each individual, they can be used to prevent theft of fraud. In addition, unlike a password or a PIN, a biometric cannot be lost, stolen, or recreated. Most biometric technology systems use the same basic principles of operation. First, a person must be registered, or enrolled, on the biometric system. To be authenticated, a person must provide a real-time biometric measurement. This measurement is then processed using the same algorithm that was used at enrollment. The output of the live measurement is then compared to the stored template.

    The goal of the course is to introduce you to the areas of Cryptography and Biometrics. These are two different areas, however, there is a lot of interest lately in combining the two areas together for various applications. One possible application is the use of Biometrics for Encryption (referred to as Biometric Encryption). Another idea is to use Biometrics for Authentication. First, we will review the fundamentals of Cryptography and Biometrics. Then, we will concentrate on a number of interesting papers (mainly on Biometrics). The course requires the completion of a semester project which will involve combining Cryptography with Biometrics. The instructors will discuss with you possible project ideas but you are strongly encouraged to discuss your own project ideas with the instructors.

    This is an advanced level course suited for graduate students in Computer Science and Engineering. It is primarily intended for highly motivated graduate students who are interested in doing work on the areas of Biometrics and Cryptography. There are many problems in these areas suitable for investigation by Master's/PhD's students leading to a master thesis or dissertation. The course contains three main parts:

  • Lectures (instructors)
  • Paper presentations/discussion (students)
  • Semester project (students)

    Course Outline (tentative)

  • Introduction to Cryptography and Biometrics
  • Review (Number Theory, Combinatorics, Linear Algebra)
  • Classical Cryptography (Chapter 1)
  • Biometrics (Notes)
  • Shannon's Theory (Chapter 2)
  • Biometrics (Notes)
  • The Data Encryption Standard (Chapter 3)
  • Biometrics (Notes)
  • The RSA System (Chapter 4)
  • Biometrics (Notes)
  • Selected topics on cryptography
  • Biometrics (student paper presentations)

    Course Prerequisites

    This course requires that the students have previously taken courses on data structures (CS308), calculus (MATH 181, MATH 182), math of computer science (CS 306), linear algebra (MATH 330), analysis of algorithms (CS465/665), and image processing (CS474/674). If you do not meet the prerequisite requirements for this course, you should see me immediately.

    Exams and Assignments

    Grading will be based on homework assignments, a midterm exam, a paper presentation, and a semester project. There will be a semester project which should be carried out in groups of two maximum. Ideally, the project will target a specific problem relevant to the stduents' research interests.


    Department of Computer Science, University of Nevada, Reno, NV 89557
    Page created and maintained by: Dr. George Bebis (