Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of el ....Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users.Read moreRead less
Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Throu ....Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Through the expertise and experience gained with this project, Australia's excellence in information security research will be reinforced. The training of PhD and Honours students will provide a much needed source of highly trained information security professionals.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less
Use of Interval Arithmetic and GRID Computing in Computational Molecular Science: Bounding Errors and Locating Global Minima. Catastrophic failure of the Ariane 5 rocket in 1996 and the inability of Patriot missile systems to reach their targets during the 1991 Gulf war were both attributed to numerical computing errors. Less dramatic, but in a similar vein, this project aims to study the numerical stability of contemporary computational molecular science applications. The focus will be on linea ....Use of Interval Arithmetic and GRID Computing in Computational Molecular Science: Bounding Errors and Locating Global Minima. Catastrophic failure of the Ariane 5 rocket in 1996 and the inability of Patriot missile systems to reach their targets during the 1991 Gulf war were both attributed to numerical computing errors. Less dramatic, but in a similar vein, this project aims to study the numerical stability of contemporary computational molecular science applications. The focus will be on linear scaling electronic structure codes, methods that are critical to the study of nano- and bio-materials, and are therefore of great importance to our economic future and medical well being. The project will build expertise within Australia in the area of interval arithmetic, an area that is currently poorly represented.Read moreRead less
Data retrieval from massive information structures. Information search is an essential tool. But most current services regard the data as unstructured collections of independent documents, free of context. Next-generation search applications, such as over social networks, or corporate websites, or XML data sets, must account for the inherent relationships between data items, and must allow the efficient inclusion of search context. Queries should favour semantically local data, giving results th ....Data retrieval from massive information structures. Information search is an essential tool. But most current services regard the data as unstructured collections of independent documents, free of context. Next-generation search applications, such as over social networks, or corporate websites, or XML data sets, must account for the inherent relationships between data items, and must allow the efficient inclusion of search context. Queries should favour semantically local data, giving results that depend on the perceived state of the querier. This project will develop indexing and search techniques for massive structured data sets. The new search methods will incorporate theoretical advances and will be experimentally validated using industry-standard open-source distributed systems.Read moreRead less
Complexity Constrained Iterative Information Processing. The contribution of Information and Communications Technologies to the National Economy has been widely recognized. ICT enables wealth creation, employment and exports, and underpins many innovation processes. Immediate project benefits will be: Contribution to the knowledge base and fundamental capabilities in high-speed wireless communications networks; Education of future Australian academic and industrial innovators; Raising the inter ....Complexity Constrained Iterative Information Processing. The contribution of Information and Communications Technologies to the National Economy has been widely recognized. ICT enables wealth creation, employment and exports, and underpins many innovation processes. Immediate project benefits will be: Contribution to the knowledge base and fundamental capabilities in high-speed wireless communications networks; Education of future Australian academic and industrial innovators; Raising the international profile of Australian research in the area of information technology. Applied development of the outcomes will lead to the generation of valuable intellectual property. Close links to Australian industry ensures that Australian ICT companies stand to gain commercial advantage.Read moreRead less
Iterative Architechtures for Data Communications. Growing markets for data intensive applications such as real-time video or speech necessitate continual improvements of communications systems. Iterative information processing algorithms have recently received attention for communications equipment design, however theoretical understanding of these methods is still lacking. Within an iterative processing paradigm, the project aim is the optimization of complex communications systems subject to c ....Iterative Architechtures for Data Communications. Growing markets for data intensive applications such as real-time video or speech necessitate continual improvements of communications systems. Iterative information processing algorithms have recently received attention for communications equipment design, however theoretical understanding of these methods is still lacking. Within an iterative processing paradigm, the project aim is the optimization of complex communications systems subject to constraints on computational complexity. Theoretical analysis and design methodologies for such systems will be developed, resulting in basic contributions to statistical science and in cheaper communications infrastructures supporting a wider range of services through better use of limited bandwidth, power and computational complexity.Read moreRead less
Homomorphic cryptography: computing on encrypted data. This project is driven by the groundbreaking applications of a new cryptographic technology that allows analysis of encrypted (scrambled) data without needing to decrypt (unscramble) it first. The results of this project can be used to enable secure remote data storage, electronic auctions and voting, and protecting medical records.