Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applic ....Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applications of pairings. The results will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users. It will also support many new product opportunities aligned with Motorola's business markets.Read moreRead less
Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computatio ....Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computational and storage demands. This project will study five recently proposed public key algorithms and assess their suitability for various secure applications. These results are of significant potential value in Australia's electronic commerce market.Read moreRead less
Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automate ....Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automated classification and de-obfuscation technologies are a precondition to applying more sophisticated detection heuristics. The project will be instrumental in safeguarding Australia by protecting critical infrastructure and defending us from online organised crime and information warfare.Read moreRead less
Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramat ....Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramatically benefit Australian people and government, especially for the Australian ICT industry for commercializing the research outputs. Read moreRead less
A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucr ....A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucrative opportunity for expanding the export capabilities of Australian ICT industry.Read moreRead less
Improved security and privacy for online platforms. Online platforms provide goods and services to people all over the world in a flexible way. Due to COVID-19, the number of online platforms increased significantly. As more and more business activities are conducted in a virtual environment, there is a corresponding increase in major privacy and security challenges. This project aims to work in the online education industry to provide a revolutionary secure environment for both business owners ....Improved security and privacy for online platforms. Online platforms provide goods and services to people all over the world in a flexible way. Due to COVID-19, the number of online platforms increased significantly. As more and more business activities are conducted in a virtual environment, there is a corresponding increase in major privacy and security challenges. This project aims to work in the online education industry to provide a revolutionary secure environment for both business owners and users. This secure online environment will enable privacy and security guarantees that will be first implemented on our Partner Organisation’s education platform. The developed technologies can be easily adapted to most online-service industries and can be commercialised immediately.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptiv ....Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptive trust and integrity preserving methods, and reliable distributed data processing mechanisms to mitigate vulnerabilities in real-time IoT-enabled critical surveillance. This should provide significant benefits to Australia's economy, one of which is the enhanced consumer-centric adoption of IoT for sensitive operations.Read moreRead less
Secure Communications for Critical Infrastructure Control Systems. Control systems are crucial to the nation's critical infrastructure. They supervise and command the remote devices used in the energy distribution, water management, telecommunications, and transport industries. Historically, security has not been a concern in the design of control systems communications, which has resulted in their current vulnerable state. This project will establish the communications security requirements ....Secure Communications for Critical Infrastructure Control Systems. Control systems are crucial to the nation's critical infrastructure. They supervise and command the remote devices used in the energy distribution, water management, telecommunications, and transport industries. Historically, security has not been a concern in the design of control systems communications, which has resulted in their current vulnerable state. This project will establish the communications security requirements of control systems technologies and propose suitable secure communications schemes. New cryptographic protocols and analytic models will be developed to account for the criticality and operational peculiarities of control systems communications. These results are of significant potential value to Australia's critical infrastructure protection.Read moreRead less
Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level arch ....Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level architecture of the solution.Read moreRead less