Academic Year 2019-2020

CYBERSECURITY

Teachers

Gian Luca Foresti
Marco Vernier
Pankaj Mishra
Unit Credits
6
Teaching Period
Second Period
Course Type
Caratterizzante
Prerequisites. The prerequisites of the course are: knowledge of basic mathematics (in particular, logarithms, exponential, derivatives, integrals, arithmetic and geometric sequences, functions, modular arithmetic), operating systems, computer networks (network architectures, protocols, client systems / server, etc.) and multimedia systems.
Teaching Methods. The course includes:

– Frontal teaching activities finalized to the main theoretical concepts of basic security of multimedia systems, the encryption, the staganografia multimedia data, and watermarking and fingerprinting techniques. The lectures are supplemented with specific assignments involving the study and individual performance by the students of exercises and case studies provided by the teacher. The correction of such assignment takes place in the classroom with presentations by students of the work done.

– Laboratory activities are aimed at developing the student’s ability to apply their knowledge on real application cases regarding the security of multimedia systems. The laboratory classes are integrated with the planning activities of the group that include the creation of a limited multimedia system that can securely transmit data and information. The teaching materials, slides and video recordings of classroom lectures are made available on the E-learning platform of the University of Udine. Such materials are reserved for students enrolled in the course.

Verification of Learning. Students are invited to perform during the assignment specific training (duration one week) in order to acquire the skills and knowledge of what was presented in class. In mid-course and at the end of the course there will be two mid-term tests of the preparation review experience gained by the students. The exam is completed by completion of a project application assigned by the teacher.
More Information. Teaching takes place in two locations (Udine and Pordenone) linked by a distance learning platform. The teacher balances his presence in the two locations and transmits the lessons from remotely to either site. The educational material and video recordings of classroom lectures are made available on the E-learning platform of the University of Udine. Such materials are reserved for students enrolled in the course. Moreover, during the course, the teacher proposes some research arguments for Master’s degree theses.
Objectives
At the end of the course, students will have advanced methodologies to analyze and use specific algorithms for secure transmission of multimedia data through computer networks, with particular reference to steganography and encryption techniques.

In particular, the student will acquire the following competencies on:

– techniques and algorithms for secure transmission of multimedia data (images, videos, audio tracks, etc.) through the Internet and, more generally, through communication channels unsafe.

– techniques of steganography, watermarking and fingerprint

– knowledge how to analyze and understand the basics of based on symmetric (private) key and asymmetric (public) key encryption techniques.

– knowledge how to use the major programming languages for the web such as PHP,Java, MySQL and HTML5

– knowledge how to design and develop a secure multimedia application.

Skills related to the disciplines:

– Knowledge and understanding

The student will acquire during the course specific knowledge about the main theoretical concepts and principles of security of multimedia systems, the encryption, the steganography of multimedia data, watermarking and fingerprinting techniques. The student also will acquire specific competencies on the main security aspects of major programming languages for the Web used in media and new digital media systems.

– Ability to apply knowledge and understanding

The student will acquire specific abilities to apply to real cases the understanding and knowledge gained on different methods of analysis and modeling of problems related to the security of the data used by multimedia applications. The student will be able to apply understanding and knowledge to the creation of complex and multidisciplinary projects in the field of advanced multimedia systems, which require secure transmission of data and information (cloud platforms, social media, distributed databases, interactive systems, robotic systems, etc.). Students will acquire also ability to design, develop and test secure multimedia systems, adapting them to real contexts and specific operating requirements.

Transversal skills / soft skills

– Making judgments

The student will acquire the ability to process and interpret independently the level of security of multimedia systems, the ability to identify security issues and make choices on the most appropriate information technology to solve security problems. He will acquire also the capacity for judgment required to assess the appropriateness of applying data encryption algorithms (symmetric or asymmetric) to the transmission of specific media, identifying positive effects and criticality.

– Communication skills

The student will acquire appropriate communication skills thanks to an activity targeted at the presentation in the classroom of scientific and technical reports on the implementation and functionning of information systems that provide secure transmission of multimedia data over the network.

– Learning ability

The student will also acquire specific transversal skills related to the ability to identify the techniques and/or protocols for security more suitable for the transmission of multimedia data over insecure channels.

Contents
The course will introduce the main security issues in multimedia applications. In particular, they will be discussed the issues related to modern cryptography (from the Caesar’s cipher to the Enigma machine), steganography, watermarking and fingerprinting. Particular attention will be given to contemporary encryption techniques (Cipher One-Time Pad (OTP), stream ciphers, block ciphers, the confusion and diffusion concepts, the Avalanche’s criterion, the substitution-permutation networks, the Feistel networks, the Data Encryption Standard (DES, 3DES and AES). During the course, specific laboratory exercises related to security of networks and multimedia applications will be given.
Texts
[1] William Stallings, Cryptography and Network Security – principles and practice, 7th Edition, Prentice Hall, 2017.

[2] William Stallings, Computer Security – Principles and Practice, 4th Edition, Prentice Hall, 2013.

[3] B. Forouzan & D. Mukhopadhyay, “Cryptography and Network Security”, 2th Edition, Mc Graw Hill, 2013.

[4] A.S. Tanembaum, D.J. Wetherall, Computer Networks, 6th Edition, Pearson, 2011.

[5] M. E. Davis, J. A. Phillips, “Learning PHP & MySQL”, 2th Edition, O’Reilly Media, 2014.