Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Special Research Initiatives - Grant ID: SR0354832
Funder
Australian Research Council
Funding Amount
$10,000.00
Summary
Dependable Distributed Enterprises and Services. Distributed systems (clusters, grids, peer-to-peer) are the mainstay of many new applications. This has the potential of providing consumers with much more timely, accurate, and comprehensive information on which to base major decisions in financial, medical, and other areas. As with any new technology, related applications should be designed and implemented in such a way that users can depend on the application's availability and results, which i ....Dependable Distributed Enterprises and Services. Distributed systems (clusters, grids, peer-to-peer) are the mainstay of many new applications. This has the potential of providing consumers with much more timely, accurate, and comprehensive information on which to base major decisions in financial, medical, and other areas. As with any new technology, related applications should be designed and implemented in such a way that users can depend on the application's availability and results, which is the main focus of this network. The CIs will collaborate in several ways, ranging from basic research to applications, to enable the creation and maintenance of highly dependable computer systems and networked applications.
Read moreRead less
Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will he ....Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will help to maintain high research profile of Australian researchers, to increase the capacity for consultancy and contract work, and provide a cutting-edge information technology for the Australian telecommunications industry, business and government (Priority 3 - Frontier Technologies). Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less
Towards a unified theory of constrained control and estimation. The project will investigate the implications of duality and other connections between constrained control and estimation. We believe that the research will result in a richer understanding of these problems. In particular, we envisage an impact in at least four areas: (i) Computational issues, i.e., development of more efficient algorithms for constrained problems. (ii) Geometry of constrained problems, by extending recent results ....Towards a unified theory of constrained control and estimation. The project will investigate the implications of duality and other connections between constrained control and estimation. We believe that the research will result in a richer understanding of these problems. In particular, we envisage an impact in at least four areas: (i) Computational issues, i.e., development of more efficient algorithms for constrained problems. (ii) Geometry of constrained problems, by extending recent results pertaining to constrained control to estimation problems. (iii) Problems with mixed constraints, for example, interval and finite set constraints. (iv) Fundamental limitations imposed by constraints to filtering and control problems.Read moreRead less
Knowledge Based Model Updating for the Correctness of Security Protocols. This project will fundamentally provide a new paradigm of the security protocol verification and modification. As such, it will significantly enhance Australia's already leading role in the cutting edge research on information security. By applying the new methodology and technology, Australian IT industry will be able to develop more secure communication systems in real world domains. With a very strong research team acro ....Knowledge Based Model Updating for the Correctness of Security Protocols. This project will fundamentally provide a new paradigm of the security protocol verification and modification. As such, it will significantly enhance Australia's already leading role in the cutting edge research on information security. By applying the new methodology and technology, Australian IT industry will be able to develop more secure communication systems in real world domains. With a very strong research team across different areas such as knowledge reasoning, temporal logics and information security, and a collaborative research training environment, this project will further enhance Australia's international reputation as a leader in computing and IT research.Read moreRead less
Efficient Processing of Complex Spatial Queries. Similarity search and join are two of the most popular yet complex queiries in spatial databases. They are also two of the major spatial data analysis paradigms. To complement the existing techniques, this project aims to investigate a more complex and important form of these two problems, and to develop novel framework to approach the proposed problems. The successful achievements of the project will not only bring new spatial data analysis techn ....Efficient Processing of Complex Spatial Queries. Similarity search and join are two of the most popular yet complex queiries in spatial databases. They are also two of the major spatial data analysis paradigms. To complement the existing techniques, this project aims to investigate a more complex and important form of these two problems, and to develop novel framework to approach the proposed problems. The successful achievements of the project will not only bring new spatial data analysis techniques but also deliever effective solutions to a number of real-life apllications.Read moreRead less
Application of novel exact combinatorial optimisation techniques and metaheuristic methods for problems in cancer research. Novel biotechnologies are offering an unprecedented opportunity to understand the genetic basis of cancer development and progression. However, they present us with a challenge; new computational methods and improved mathematical models and algorithms need to be introduced to complement these technologies in the determination of the function of our individual genetic makeup ....Application of novel exact combinatorial optimisation techniques and metaheuristic methods for problems in cancer research. Novel biotechnologies are offering an unprecedented opportunity to understand the genetic basis of cancer development and progression. However, they present us with a challenge; new computational methods and improved mathematical models and algorithms need to be introduced to complement these technologies in the determination of the function of our individual genetic makeup, especially in connection with disease states. The project will deal with research questions and datasets related to some of the highest incidence cancers in Australia. This project will contribute towards the development of new powerful algorithms for pattern recognition for future "personalized" molecular diagnostics methods.Read moreRead less
An Integrative and Interactive Approach for Co-estimation of Multiple Sequence Alignment and Phylogeny Reconstruction. In this project innovative IT methods will be developed to assist biologists to solve complex and important biological problems. Many important applications in computational biology need very accurate and reliable tools for multiple sequence alignment and phylogeny reconstruction. Unfortunately, current existing tools are unreliable and are prone to serious errors when applied t ....An Integrative and Interactive Approach for Co-estimation of Multiple Sequence Alignment and Phylogeny Reconstruction. In this project innovative IT methods will be developed to assist biologists to solve complex and important biological problems. Many important applications in computational biology need very accurate and reliable tools for multiple sequence alignment and phylogeny reconstruction. Unfortunately, current existing tools are unreliable and are prone to serious errors when applied to large and divergent biological sequences. The success of this project will not only make significant contribution to the relevant research fields, but also help achieve goals in certain real-life biological research projects which are unique and important to Australia.Read moreRead less