Communications security and content protection

Higher education teachers: Tomažič Sašo
Credits: 6
Semester: winter
Subject code: 64198

Subject description


  • Enrollment in the study year.

Content (Syllabus outline):

Data integrity and basic aspects of security: confidentiality, authenticity, authenticity and availability. Types of coding procedures and classification of cryptographic algorithms: stream, block, symmetric, asymmetric. Basic symmetric encryption algorithms (DES, AES), examples of practical applications. Review of asymmetric cryptographic algorithms (RSA, ElGamal, DH) on a practical application. Digital signature of information content and the basics of hash algorithms. The management of encryption keys, digital certificates and public key infrastructure. Secure communications on the Internet with the review of protection mechanisms at different layers (IPSec, SSL, secure mail). Basic principles of security devices: routers, firewalls and security of content. Secure electronic commerce. Secure radio communication systems with practical examples in GSM, UMTS, WLAN networks. Security policy and security management in multimedia systems. Mechanisms of copyright protection and copyright management systems, multimedia content (DRM, CA, TP, Watermarking).

Objectives and competences:

Understanding basic principles of information security in multimedia systems. Basic knowledge of security mechanisms and practical knowledge of the security protocols used in the Internet and in mobile radio networks. Understanding the principles of technical protection of copyright of multimedia content.

Intended learning outcomes:

Understanding the basic principles of information security and knowledge of the main cryptographic algorithms and security protocols in multimedia systems.

Learning and teaching methods:

Lectures and lab exercises and individual work.

Study materials

  • B. Schneier: Applied Cryptography, John Wiley & Sons, 1996
  • M. Y. Rhee, Internet Security: Cryptographic Principles, Algorithms and Protocols, John Wiley & Sons, 2003
  • G. J. Simmons: Contemporary Cryptology, IEEE Press, 1991.
  • B. Furth, D. Kirovski: Multimedia Security Handbook, CRC Press, 2004
  • W. Zeng, H.Yu, C. Lin: Multimedia Security Technologies for Digital
  • Rights Management, Academic Press, 2006

  • Study in which the course is carried out

    • 3 year - 1st cycle - Multimedia