Communications security and content protection

Subject description

Data integrity and basic aspects of security: confidentiality, authenticity, authenticity, and availability. Types of coding procedures and classification of cryptographic algorithms: stream, block, symmetric, asymmetric. Basic symmetric encryption algorithms (DES, AES), examples of practical applications. Review of asymmetric cryptographic algorithms (RSA, ElGamal, DH) on a practical application. The digital signature of information content and the basics of hash algorithms. The management of encryption keys, digital certificates, and public key infrastructure. Secure communications on the Internet with the review of protection mechanisms at different layers (IPSec, SSL, secure mail). Basic principles of security devices: routers, firewalls, and security of content. Secure electronic commerce. Security policy and security management in multimedia systems. Mechanisms of copyright protection and copyright management systems, multimedia content (DRM, CA, TP, Watermarking). Blockchain technologies and their applications in the area of communications security and content protection.

The subject is taught in programs

Objectives and competences

Understanding basic principles of information security in multimedia systems. Basic knowledge of security mechanisms and practical knowledge of the security protocols used in the Internet and in mobile radio networks. Understanding the principles of technical protection of copyright of multimedia content.

Teaching and learning methods

Lectures and lab exercises and individual work.

Expected study results

After successful completion of the course, students should be able to:

– identify threats to ICT systems,

– identify various online scams,

– protect the ICT system,

– ensure the integrity of electronic documents,

– assess the security of the ICT system,

– design a security policy.

Basic sources and literature

  1. Sašo Tomažič, Varnost informacijsko komunikacijskih sistemov, 2014 (Objavljena elektronska knjiga kot študijsko gradivo).
  2. B. Schneier: Applied Cryptography, John Wiley & Sons, 1996
  3. M. Y. Rhee, Internet Security: Cryptographic Principles, Algorithms and Protocols, John Wiley & Sons, 2003
  4. G. J. Simmons: Contemporary Cryptology, IEEE Press, 1991.
  5. B. Furth, D. Kirovski: Multimedia Security Handbook, CRC Press, 2004
  6. W. Zeng, H.Yu, C. Lin: Multimedia Security Technologies for Digital Rights Management, Academic Press, 2006
  7. F. Casino, T. K. Dasaklis, C. Patsakis: A systematic literature review of blockchain-based applications: Current status, classification and open issues, Telematics and Informatics, Volume 36, 2019, Pages 55-81, https://doi.org/10.1016/j.tele.2018.11.006.

Stay up to date

University of Ljubljana, Faculty of Electrical Engineering Tržaška cesta 25, 1000 Ljubljana

E:  dekanat@fe.uni-lj.si T:  01 4768 411