Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less
Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automate ....Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automated classification and de-obfuscation technologies are a precondition to applying more sophisticated detection heuristics. The project will be instrumental in safeguarding Australia by protecting critical infrastructure and defending us from online organised crime and information warfare.Read moreRead less
Use of Interval Arithmetic and GRID Computing in Computational Molecular Science: Bounding Errors and Locating Global Minima. Catastrophic failure of the Ariane 5 rocket in 1996 and the inability of Patriot missile systems to reach their targets during the 1991 Gulf war were both attributed to numerical computing errors. Less dramatic, but in a similar vein, this project aims to study the numerical stability of contemporary computational molecular science applications. The focus will be on linea ....Use of Interval Arithmetic and GRID Computing in Computational Molecular Science: Bounding Errors and Locating Global Minima. Catastrophic failure of the Ariane 5 rocket in 1996 and the inability of Patriot missile systems to reach their targets during the 1991 Gulf war were both attributed to numerical computing errors. Less dramatic, but in a similar vein, this project aims to study the numerical stability of contemporary computational molecular science applications. The focus will be on linear scaling electronic structure codes, methods that are critical to the study of nano- and bio-materials, and are therefore of great importance to our economic future and medical well being. The project will build expertise within Australia in the area of interval arithmetic, an area that is currently poorly represented.Read moreRead less
Algebraic Properties of Cryptographic Components and their Cryptanalysis. The outcomes will enhance information and communication security, which is absolutely crucial for the rapidly growing e-commerce and e-government services in Australia. International collaboration will be strengthened by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. Our project will help to maintain a high profile of Australian researchers, to i ....Algebraic Properties of Cryptographic Components and their Cryptanalysis. The outcomes will enhance information and communication security, which is absolutely crucial for the rapidly growing e-commerce and e-government services in Australia. International collaboration will be strengthened by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. Our project will help to maintain a high profile of Australian researchers, to increase the capacity for consultancy and contract work, and provide a cutting-edge information technology for the Australian telecommunications industry, business and government.Read moreRead less
New Mobile Interface Techniques for Accessing Desktop Applications from Mobile Devices. The mobile data industry is a multi-billion dollar industry and is growing at a rate of seventeen percent per year. The capability to access data and applications from handheld devices is becoming increasingly vital for businesses and transforming business practices. However, while there are a multitude of software applications available for use on desktop computers these typically can't be used from mobile d ....New Mobile Interface Techniques for Accessing Desktop Applications from Mobile Devices. The mobile data industry is a multi-billion dollar industry and is growing at a rate of seventeen percent per year. The capability to access data and applications from handheld devices is becoming increasingly vital for businesses and transforming business practices. However, while there are a multitude of software applications available for use on desktop computers these typically can't be used from mobile devices due to the small form factor. In this project we will develop new mobile interface techniques and methodologies that will allow unaltered desktop software applications to be used from small-form factor mobile devices, via transforming the application interfaces.Read moreRead less
Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level arch ....Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level architecture of the solution.Read moreRead less
Developing an Electronic Clearinghouse for Efficient and Unified Government and Corporate Online Procurement using Ontology-based Technologies. National benefits include:
- The generic clearinghouse technologies developed can provide efficiency in all government and corporate procurement
- National tourism would now be able to distribute into the new global electronic economy
- The clearinghouse could even be used in case of national disaster/terrorism attack to relocate large numbers of a me ....Developing an Electronic Clearinghouse for Efficient and Unified Government and Corporate Online Procurement using Ontology-based Technologies. National benefits include:
- The generic clearinghouse technologies developed can provide efficiency in all government and corporate procurement
- National tourism would now be able to distribute into the new global electronic economy
- The clearinghouse could even be used in case of national disaster/terrorism attack to relocate large numbers of a metro population
- The Commonwealth could use this data for things such as setting proper benchmark rates for government travel
- State and regional tourism authorities who would gain huge efficiencies in distribution for their member hotels.
- The project would also help distributors, wholesalers, e-tailers etc.
Read moreRead less
Integrating deep-earth and surface processes for frontier-basin exploration. It is well-known that mantle convection has a profound influence on basin evolution, and the next step will be to quantify this relationship and provide the science that will make these concepts applicable to exploration. To do this, we will develop a workflow to link plate-reconstruction software with the mantle convection modelling to link plate motions mantle convection and the history of sedimentation systematically ....Integrating deep-earth and surface processes for frontier-basin exploration. It is well-known that mantle convection has a profound influence on basin evolution, and the next step will be to quantify this relationship and provide the science that will make these concepts applicable to exploration. To do this, we will develop a workflow to link plate-reconstruction software with the mantle convection modelling to link plate motions mantle convection and the history of sedimentation systematically for the first time for frontier basin-scale applications. We will apply these emerging technologies to the evolution of basins in the Arctic borderlands frontier for resource exploration and on the Australian continent.Read moreRead less