Communications security and content protection (FRI)

Higher education teachers: Stankovski Vlado
Credits: 6
Semester: winter
Subject code: 63289

Subject description


  • Enrollment in the study year.

Content (Syllabus outline):

Data integrity and basic aspects of security: confidentiality, authenticity, authenticity, and availability. Types of coding procedures and classification of cryptographic algorithms: stream, block, symmetric, asymmetric. Basic symmetric encryption algorithms (DES, AES), examples of practical applications. Review of asymmetric cryptographic algorithms (RSA, ElGamal, DH) on a practical application. The digital signature of information content and the basics of hash algorithms. The management of encryption keys, digital certificates, and public key infrastructure. Secure communications on the Internet with the review of protection mechanisms at different layers (IPSec, SSL, secure mail). Basic principles of security devices: routers, firewalls, and security of content. Secure electronic commerce. Security policy and security management in multimedia systems. Mechanisms of copyright protection and copyright management systems, multimedia content (DRM, CA, TP, Watermarking). Blockchain technologies and their applications in the area of communications security and content protection.

Objectives and competences:

Understanding basic principles of information security in multimedia systems. Basic knowledge of security mechanisms and practical knowledge of the security protocols used in the Internet and in mobile radio networks. Understanding the principles of technical protection of copyright of multimedia content.

Intended learning outcomes:

After successful completion of the course, students should be able to:

  • identify threats to ICT systems,
  • identify various online scams,
  • protect the ICT system,
  • ensure the integrity of electronic documents,
  • assess the security of the ICT system,
  • design a security policy.

Learning and teaching methods:

Lectures and lab exercises and individual work.

Study materials

  • Sašo Tomažič, Varnost informacijsko komunikacijskih sistemov, 2014 (Objavljena elektronska knjiga kot študijsko gradivo).
  • B. Schneier: Applied Cryptography, John Wiley & Sons, 1996
  • M. Y. Rhee, Internet Security: Cryptographic Principles, Algorithms and Protocols, John Wiley & Sons, 2003
  • G. J. Simmons: Contemporary Cryptology, IEEE Press, 1991.
  • B. Furth, D. Kirovski: Multimedia Security Handbook, CRC Press, 2004
  • W. Zeng, H.Yu, C. Lin: Multimedia Security Technologies for Digital Rights Management, Academic Press, 2006
  • F. Casino, T. K. Dasaklis, C. Patsakis: A systematic literature review of blockchain-based applications: Current status, classification and open issues, Telematics and Informatics, Volume 36, 2019, Pages 55-81,

Study in which the course is carried out

  • 3 year - 1st cycle - Multimedia