A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucr ....A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucrative opportunity for expanding the export capabilities of Australian ICT industry.Read moreRead less
Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research ....Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research will include new data privacy models, new privacy-preserving data mining algorithms, and a prototype of cloud data mining software. These will help businesses cut costs for data mining and privacy protection, and provide significant benefits toward helping Australia achieve its national cyber security strategy and potentially provide economic impact from commercialisation of new software technology for the industry partner.Read moreRead less
Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and ....Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and privacy concerns than other health databases. In this project we shall investigate privacy and ethical issues connected to genetic information and we develop techniques to prevent a disclosure of individual values through statistical analysis.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less
Information-theoretic secure communications via caching. This project aims to address the cybersecurity problem of securing telecommunication networks to prevent data leakage. Current widely-adopted data-encryption approaches to secure communications will be broken with large-scale quantum computers, and existing information-theoretic approaches rely on the channel quality of the network. To circumvent these risks, this project proposes a new information security approach using information cache ....Information-theoretic secure communications via caching. This project aims to address the cybersecurity problem of securing telecommunication networks to prevent data leakage. Current widely-adopted data-encryption approaches to secure communications will be broken with large-scale quantum computers, and existing information-theoretic approaches rely on the channel quality of the network. To circumvent these risks, this project proposes a new information security approach using information cached at devices to camouflage data. The project will future-proof secure communication systems against large-scale quantum computers, which threaten current encryption approaches. This should ensure that data transmitted over communication networks can never be revealed to interceptors or hackers, even in public WiFi.Read moreRead less
Security Services for Stream-Oriented and Multicast-Based Communication. Multicast communication over lossy networks is becoming the basic for a growing number of aplications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only partial solutions. This project is concerned with two major security problems of multicast communications: authentication and secrecy. The goal of this project is to: (1) deve ....Security Services for Stream-Oriented and Multicast-Based Communication. Multicast communication over lossy networks is becoming the basic for a growing number of aplications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only partial solutions. This project is concerned with two major security problems of multicast communications: authentication and secrecy. The goal of this project is to: (1) develop a framework for analysis and evaluation of security services for multicast communication; (2) design efficient algorithms and protocols for securing emerging applications that are multicast-based and/or stream-oriented.
Read moreRead less
Secure Multi-Party Computation. The outcomes of this project will enhance information protection which is crucial fore rapidly growing e-commerce service and strengthen national safeguard capability of our digital systems and infrastructure. It will contribute to maintain Australia's leading position in the telecommunication and information industries. It will contribute to the quality of our culture by protecting individual's privacy and providing security for sensitive data.
Non-Parametric Modelling of Motion and Depth fields with Boundary Geometry for Scalable Compression and Dissemination. Applications for large format video surveillance are about to grow rapidly, starting with military applications and then moving into the civilian arena, highlighting the importance of compression for interactive dissemination, so as to make best use of limited communication channels. This project will develop an innovative representation for motion and depth/elevation maps, whi ....Non-Parametric Modelling of Motion and Depth fields with Boundary Geometry for Scalable Compression and Dissemination. Applications for large format video surveillance are about to grow rapidly, starting with military applications and then moving into the civilian arena, highlighting the importance of compression for interactive dissemination, so as to make best use of limited communication channels. This project will develop an innovative representation for motion and depth/elevation maps, which addresses a key obstacle in the deployment of technology for efficient interactive access to large format video and geospatial imagery. These applications are relevant to Australia's defence and infrastructure for smart information use. Moreover, this is a strategic proposal to strengthen Australia's existing lead in aspects of interactive media dissemination.Read moreRead less