Efficient and Secure Word-Based Stream Ciphers for Wireless Communications. Wireless networks are increasingly being used for communication, and to manage and control Australia's critical infrastructure. However, current methods of securing wireless networks are flawed, putting the country's economy, environment, and citizens at risk. The most reliable method for protecting wireless communications requires secure and efficient encryption algorithms. However, flaws have been found in most algo ....Efficient and Secure Word-Based Stream Ciphers for Wireless Communications. Wireless networks are increasingly being used for communication, and to manage and control Australia's critical infrastructure. However, current methods of securing wireless networks are flawed, putting the country's economy, environment, and citizens at risk. The most reliable method for protecting wireless communications requires secure and efficient encryption algorithms. However, flaws have been found in most algorithms proposed to date. This project will examine existing algorithms and attacks to determine design criteria for secure encryption algorithms for use in a wireless environment. An algorithm which meets these criteria and can be implemented efficiently in hardware and software will be proposed.Read moreRead less
Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applic ....Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applications of pairings. The results will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users. It will also support many new product opportunities aligned with Motorola's business markets.Read moreRead less
Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of el ....Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users.Read moreRead less
Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Throu ....Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Through the expertise and experience gained with this project, Australia's excellence in information security research will be reinforced. The training of PhD and Honours students will provide a much needed source of highly trained information security professionals.Read moreRead less
Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computatio ....Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computational and storage demands. This project will study five recently proposed public key algorithms and assess their suitability for various secure applications. These results are of significant potential value in Australia's electronic commerce market.Read moreRead less
Robust transmission, identification and key agreement in communications networks. This project identifies significant, innovative directions to achieve robust data transmission, identification and key agreement in networks. It presents the information and communication technology industry with new and profitable markets, contributing to wealth creation, employment and exports. Immediate benefits are: 1. Contribution to the growing knowledge base and fundamental capabilities in networks; 2. Crea ....Robust transmission, identification and key agreement in communications networks. This project identifies significant, innovative directions to achieve robust data transmission, identification and key agreement in networks. It presents the information and communication technology industry with new and profitable markets, contributing to wealth creation, employment and exports. Immediate benefits are: 1. Contribution to the growing knowledge base and fundamental capabilities in networks; 2. Creation and commercialization of valuable intellectual property; 3. Education of future leading academic and industrial innovators within Australia; 4. High international profile of Australian communications and information technology research.
Read moreRead less
Closing the Gap: Fundamental Capacity Limits for Interfering Wireless Networks and Practical Methods to Get There. Enhancing communication networks to achieve broadband data rates is now a national priority. Wireless communications is hugely important, with mobile phones, wireless computers, and wireless Internet access to homes, all rapidly growing areas. This project addresses the fundamental bottleneck of interference between links in wireless networks. Wireless unplugs the user and allows hi ....Closing the Gap: Fundamental Capacity Limits for Interfering Wireless Networks and Practical Methods to Get There. Enhancing communication networks to achieve broadband data rates is now a national priority. Wireless communications is hugely important, with mobile phones, wireless computers, and wireless Internet access to homes, all rapidly growing areas. This project addresses the fundamental bottleneck of interference between links in wireless networks. Wireless unplugs the user and allows him/her to roam, and to set up ad-hoc networks with other users. This research will thus contribute to Australia's increased productivity. Just as importantly, this project addresses fundamental research; it will increase Australia's knowledge base and provide training for students and researchers in how to think about communications problems.Read moreRead less
Efficient Data Transport using Network Coding. Large-scale content distribution is driving the evolution of future Internet, cellular and wireless data networks. This project develops theory and practice underpinning entirely new modes of content distribution. This presents the ICT industry with new and profitable markets, contributing to wealth creation, employment and exports. Immediate benefits to Australia are: Contribution to the growing knowledge base and fundamental capabilities in the im ....Efficient Data Transport using Network Coding. Large-scale content distribution is driving the evolution of future Internet, cellular and wireless data networks. This project develops theory and practice underpinning entirely new modes of content distribution. This presents the ICT industry with new and profitable markets, contributing to wealth creation, employment and exports. Immediate benefits to Australia are: Contribution to the growing knowledge base and fundamental capabilities in the important area of telecommunication networks; Creation and commercialisation of intellectual property; Education of future Australian academic leaders and industrial innovators; Raising the international profile of Australian research in communications and information technology.Read moreRead less
Construction methods and analysis tools for repeat-accumulate error correction codes. Error correction codes play an integral role in digital communications systems, enabling technologies such as compact-disk players, hard-disk drives, high-speed modems, digital audio broadcasting and deep-space communications. This project develops the techniques which underlie the success of next-generation error correction technologies and thus addresses an important and fundamental problem in the area of inf ....Construction methods and analysis tools for repeat-accumulate error correction codes. Error correction codes play an integral role in digital communications systems, enabling technologies such as compact-disk players, hard-disk drives, high-speed modems, digital audio broadcasting and deep-space communications. This project develops the techniques which underlie the success of next-generation error correction technologies and thus addresses an important and fundamental problem in the area of information and communications technology (ICT). The nature of the project presents significant potential for project outcomes to be beneficial to the Australian telecommunications industry in a wide range of application areas including wireless networks, mobile communications, and data storage.
Read moreRead less
Information Capacity of High Data Rate Wireless Networks. Future wireless networks must support huge data rates in order to meet
the escalating demands of emerging Internet applications. Required
capacities far exceed those which can be provided by existing wireless
systems. Space-time coding is one very promising new technique which
may provide a solution. In spite of the potentials of this technique,
there are many important practical issues that affect the realizable
capacities. We a ....Information Capacity of High Data Rate Wireless Networks. Future wireless networks must support huge data rates in order to meet
the escalating demands of emerging Internet applications. Required
capacities far exceed those which can be provided by existing wireless
systems. Space-time coding is one very promising new technique which
may provide a solution. In spite of the potentials of this technique,
there are many important practical issues that affect the realizable
capacities. We aim to investigate two such issues: the impact of
channel uncertainty at the receiver, and the impact of multiple access
interference. This research will provide new directions for the design
of wireless data networks.
Read moreRead less