Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Properties of Cryptographic Components and their Cryptanalysis. The outcomes will enhance information and communication security, which is absolutely crucial for the rapidly growing e-commerce and e-government services in Australia. International collaboration will be strengthened by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. Our project will help to maintain a high profile of Australian researchers, to i ....Algebraic Properties of Cryptographic Components and their Cryptanalysis. The outcomes will enhance information and communication security, which is absolutely crucial for the rapidly growing e-commerce and e-government services in Australia. International collaboration will be strengthened by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. Our project will help to maintain a high profile of Australian researchers, to increase the capacity for consultancy and contract work, and provide a cutting-edge information technology for the Australian telecommunications industry, business and government.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less
Efficient Transmission Strategies for Cooperative Wireless Ad Hoc Networks. The contribution of information and communications technologies to the national economy has been widely recognized. It enables wealth creation, employment and exports, underpinning many innovation processes. Immediate project benefits will be: contribution to the knowledge base and fundamental capabilities in wireless communication; education of future Australian academic and industrial innovators; raising the internati ....Efficient Transmission Strategies for Cooperative Wireless Ad Hoc Networks. The contribution of information and communications technologies to the national economy has been widely recognized. It enables wealth creation, employment and exports, underpinning many innovation processes. Immediate project benefits will be: contribution to the knowledge base and fundamental capabilities in wireless communication; education of future Australian academic and industrial innovators; raising the international profile of Australian research in the area of information technology. The proposed research is in areas of great commercial interest, addressing new directions and technologies for future wireless networks. Applied development of the outcomes will lead to valuable intellectual property for commercial exploitation.Read moreRead less
Fundamental Limits of Wireless Data Transmission over Interference Channels. This project aims to develop interference-resilient wireless data transmission techniques that can significantly improve the reliability and data rate of wireless communications. The expected outcomes of the research include new space-time coding techniques and interference coordination techniques. It is anticipated that the research will support the improvement of high-speed wireless communications and influence the de ....Fundamental Limits of Wireless Data Transmission over Interference Channels. This project aims to develop interference-resilient wireless data transmission techniques that can significantly improve the reliability and data rate of wireless communications. The expected outcomes of the research include new space-time coding techniques and interference coordination techniques. It is anticipated that the research will support the improvement of high-speed wireless communications and influence the development of broadband wireless access solutions.Read moreRead less
Security Applications of Combinatorial Puzzles. This project provides a basis for improving the implementation and maintenance of key management systems. The application of discrete mathematics to information security will help safeguard Australia, will provide opportunities for Australians to take a leading role in an important area and will develop a research network, bridging both theoretical and practical aspects of mathematics and computer science. The project will enhance Australia's inter ....Security Applications of Combinatorial Puzzles. This project provides a basis for improving the implementation and maintenance of key management systems. The application of discrete mathematics to information security will help safeguard Australia, will provide opportunities for Australians to take a leading role in an important area and will develop a research network, bridging both theoretical and practical aspects of mathematics and computer science. The project will enhance Australia's international reputation by establishing collaborations with well-respected international mathematicians and computer scientists. The proposal contains topics suitable for the training of new graduates, allowing them to make high quality original research contributions in a novel and important area. Read moreRead less
Use of Interval Arithmetic and GRID Computing in Computational Molecular Science: Bounding Errors and Locating Global Minima. Catastrophic failure of the Ariane 5 rocket in 1996 and the inability of Patriot missile systems to reach their targets during the 1991 Gulf war were both attributed to numerical computing errors. Less dramatic, but in a similar vein, this project aims to study the numerical stability of contemporary computational molecular science applications. The focus will be on linea ....Use of Interval Arithmetic and GRID Computing in Computational Molecular Science: Bounding Errors and Locating Global Minima. Catastrophic failure of the Ariane 5 rocket in 1996 and the inability of Patriot missile systems to reach their targets during the 1991 Gulf war were both attributed to numerical computing errors. Less dramatic, but in a similar vein, this project aims to study the numerical stability of contemporary computational molecular science applications. The focus will be on linear scaling electronic structure codes, methods that are critical to the study of nano- and bio-materials, and are therefore of great importance to our economic future and medical well being. The project will build expertise within Australia in the area of interval arithmetic, an area that is currently poorly represented.Read moreRead less
Interactive and scalable media over software defined networks. A novel API and associated algorithms will be developed to exploit the emerging technology of software defined networks (SDN) for improving the efficiency and responsiveness of interactive media browsing applications. The approach applies to conventional streaming video as well as more interactive services based on scalable media compression and communication technology, notably JPIP (IS15444-9) video. Recent advances in motion codin ....Interactive and scalable media over software defined networks. A novel API and associated algorithms will be developed to exploit the emerging technology of software defined networks (SDN) for improving the efficiency and responsiveness of interactive media browsing applications. The approach applies to conventional streaming video as well as more interactive services based on scalable media compression and communication technology, notably JPIP (IS15444-9) video. Recent advances in motion coding will be combined with new spatio-temporal transforms to develop an efficient inter-frame extension to the JPEG 2000 standard that is fully compatible with JPIP. Each of these innovations is important in its own right, but together they will facilitate a highly compelling interactive media browsing experience.Read moreRead less
Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of el ....Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users.Read moreRead less
Technical and Legal Models for Virtual Info-Sharing Networks (VISN) for Critical Infrastructure Protection (CIP). This project has substantial national benefit because it will result in the design of a virtual information sharing network (VISN) that will better protect Australia's critical infrastructure. It will provide a comprehensive legal/technical analysis of the requirements/characteristics necessary for the development of a VISN. The development of a secure environment for a VISN will i ....Technical and Legal Models for Virtual Info-Sharing Networks (VISN) for Critical Infrastructure Protection (CIP). This project has substantial national benefit because it will result in the design of a virtual information sharing network (VISN) that will better protect Australia's critical infrastructure. It will provide a comprehensive legal/technical analysis of the requirements/characteristics necessary for the development of a VISN. The development of a secure environment for a VISN will improve industry trust and confidence in participating in the sharing of sensitive information; especially the disclosure of potential vulnerabilities or ascertained potential threats. The project will improve information dissemination speeds and assist post information disclosure controls. Read moreRead less