Construction methods and analysis tools for repeat-accumulate error correction codes. Error correction codes play an integral role in digital communications systems, enabling technologies such as compact-disk players, hard-disk drives, high-speed modems, digital audio broadcasting and deep-space communications. This project develops the techniques which underlie the success of next-generation error correction technologies and thus addresses an important and fundamental problem in the area of inf ....Construction methods and analysis tools for repeat-accumulate error correction codes. Error correction codes play an integral role in digital communications systems, enabling technologies such as compact-disk players, hard-disk drives, high-speed modems, digital audio broadcasting and deep-space communications. This project develops the techniques which underlie the success of next-generation error correction technologies and thus addresses an important and fundamental problem in the area of information and communications technology (ICT). The nature of the project presents significant potential for project outcomes to be beneficial to the Australian telecommunications industry in a wide range of application areas including wireless networks, mobile communications, and data storage.
Read moreRead less
Optimising Cooperation in Multiterminal Wireless Networks. With more and more of our communications networks becoming wireless, new technologies are required to ensure optimal use of limited resources. This project develops and optimises cooperation for multiterminal wireless networks to increase the transmission rate and / or lower the power consumption of wireless networks. Benefits of this research are efficient deployment and operation of high-speed wireless networks such as broadband Inter ....Optimising Cooperation in Multiterminal Wireless Networks. With more and more of our communications networks becoming wireless, new technologies are required to ensure optimal use of limited resources. This project develops and optimises cooperation for multiterminal wireless networks to increase the transmission rate and / or lower the power consumption of wireless networks. Benefits of this research are efficient deployment and operation of high-speed wireless networks such as broadband Internet and digital television, and improved lower-power wireless sensor networks for applications such as remote monitoring bushfire early warning systems.Read moreRead less
Iterative coding for next generation networks. The demands on next generation telecommunication networks can be extrapolated from the increasing use of Voice Over IP (e.g., Skype), real-time streaming media (e.g., live sporting events), and downloaded movies (e.g., the iTunes Music Store). In this data-rich environment, it is necessary to utilise the network itself intelligently. This project draws together ideas from error correction and network coding to provide the technologies that will un ....Iterative coding for next generation networks. The demands on next generation telecommunication networks can be extrapolated from the increasing use of Voice Over IP (e.g., Skype), real-time streaming media (e.g., live sporting events), and downloaded movies (e.g., the iTunes Music Store). In this data-rich environment, it is necessary to utilise the network itself intelligently. This project draws together ideas from error correction and network coding to provide the technologies that will underpin next generation communication networks. With a focus on implementable technologies, this project presents significant potential for project outcomes to impact the Australian information economy, spawning new businesses, transforming established industries, and creating new jobs. Read moreRead less
Structured low-density parity-check codes for next-generation digital communications. The promise of essentially error-free information transmission is a cornerstone of digital communications. Next-generation applications demand increasingly effective error correction, yet traditional systems fall well short of fundamental capacity limits established some fifty years ago. Exciting breakthroughs in the mid-1990s delivered capacity-approaching codes on graphs employing iterative decoding algorithm ....Structured low-density parity-check codes for next-generation digital communications. The promise of essentially error-free information transmission is a cornerstone of digital communications. Next-generation applications demand increasingly effective error correction, yet traditional systems fall well short of fundamental capacity limits established some fifty years ago. Exciting breakthroughs in the mid-1990s delivered capacity-approaching codes on graphs employing iterative decoding algorithms, including low-density parity-check (LDPC) codes. This project applies techniques from discrete mathematics to design structured LDPC coding schemes for widespread implementation. Outcomes of this research will be new LDPC codes, encoding algorithms and analysis techniques for applications including wireless networks, data storage and Internet communications.Read moreRead less
A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucr ....A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucrative opportunity for expanding the export capabilities of Australian ICT industry.Read moreRead less
Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes nove ....Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes novel dynamic group key management and denial of service protection schemes, develops new security mechanisms for ad hoc routing, provides new insights into formal reasoning of security and demonstrates and evaluates practical secure wireless mobile applications.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less
Security Services for Stream-Oriented and Multicast-Based Communication. Multicast communication over lossy networks is becoming the basic for a growing number of aplications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only partial solutions. This project is concerned with two major security problems of multicast communications: authentication and secrecy. The goal of this project is to: (1) deve ....Security Services for Stream-Oriented and Multicast-Based Communication. Multicast communication over lossy networks is becoming the basic for a growing number of aplications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only partial solutions. This project is concerned with two major security problems of multicast communications: authentication and secrecy. The goal of this project is to: (1) develop a framework for analysis and evaluation of security services for multicast communication; (2) design efficient algorithms and protocols for securing emerging applications that are multicast-based and/or stream-oriented.
Read moreRead less