Skip to content

Overview

The vital importance of information systems makes them a tempting target for attacks. We need to protect critical data and the systems that use, store and transmit it.

Future trends like automation and the Internet of Things mean more devices are being interconnected, creating new security threats and increasing the size of the target.

Our research uncovers problems with existing systems and develops new and more efficient methods to counter information security risks for real-world organisations.

Research

We are one of Australia’s leading academic research groups in information security concentrating on cyber-physical systems. We specialise in two key areas of research: cryptography and secure networking.

Supervisory Control and Data Acquisition (SCADA) Cyber Security Laboratory

We simulate cyber attacks using industry-standard equipment and experimental communications networks and protocols to help understand how to better secure critical infrastructure.

We develop techniques for organisations to use in the real world to predict and protect against malfunctions, potentially caused by cyber attacks.

Research conducted in our SCADA lab can be applied to prevent system failures in manufacturing plants, the embedded hardware behind a car’s dashboard, rail switching systems or wireless networks for controlling drones.

Find out more

Cryptography

Cryptography involves writing and solving codes – the tools needed for ensuring unbreakable data security.

Its practical applications include:

  • protecting sensitive communications
  • developing and securing electronic elections and surveys used by entire populations
  • implementing human-centric encryption functionality on websites
  • security systems for financial institutions.

It is also the basis of the new distributed ledger technologies underlying crypto-currencies like Bitcoin.

Browse related student topics

Secure networking

Secure networking is needed to protect data confidentiality and system integrity in telecommunications and wireless networks.

It is essential for critical national infrastructure such as power and water supplies, transport systems and manufacturing plants.

Society relies daily on secure communication protocols to safeguard email and other sensitive communications, and for conducting trustworthy online business transactions.

Browse related student topics

Projects

Creating a simple and strong cryptography for humans to take the front seat in real security protocols

Project leader

Associate Professor Xavier Boyen

Dates

2014-2018

Project summary

Cryptography offers wonderful tools for unbreakable data security, but only between computer nodes, leaving their human owners helpless. Encrypted tunnels terminate not at humans but at mobile phones and personal computers, exposing users' secrets to spyware from search-engine keyloggers to full-bore malware planted by crooks, hackers, and foreign spy agencies.

This project aims to create a simple and strong cryptography, so that humans can, for the first time, take front seat in real security protocols. The technical challenge is to build public-key ciphers, operable manually from a mental key in seconds, and from there remake human-powered versions of many useful information security protocols.

Recreate and expand the power of functional encryption (FE) from post-quantum (PQ) mathematical principles, immune to quantum attacks, building on recent discoveries of limited forms of PQ-FE from rock-solid cryptography principles

Project leader

Associate Professor Xavier Boyen

Dates

2014-2016

Project summary

Modern cryptography has the power to revolutionise virtually every aspect of our online lives. Large-scale secure data sharing could become a breeze, with tools such as functional encryption (FE) to give us fine control over access rights by means of expressive languages, and there will be no more juggling of crypto keys. Finally, the known foundations of FE will crumble when even small-sized quantum computers become reality, perhaps next decade.

This project aims to recreate and expand the power of FE from post-quantum (PQ) mathematical principles, immune to quantum attacks, building on recent discoveries of limited forms of PQ-FE from rock-solid crypto principles.

Interdisciplinary and inter-institution projects

  • Legacy2Service: a novel, model-driven technique for re-engineering on-demand software services out of legacy applications, 2014-2016.
  • Big Data Analysis on Personal Computers, 2017-2020.

Browse our student topics

Partnerships

We offer research consultancy services to industry and government bodies in our specialist fields of cryptography and secure networking.

Contact our academic staff to find out more about their research specialisations, or our Science and Engineering Industry and Engagement office to discuss partnership opportunities.

Ask us about becoming a partner

Our topics

Are you looking to study at a higher or more detailed level? We are currently looking for students to research topics at a variety of study levels, including PhD, Masters, Honours or the Vacation Research Experience Scheme (VRES).

View our topics

Our experts

We host an expert team of researchers and teaching staff, including Head of School and discipline leaders. Our discipline brings together a diverse team of experts who deliver world-class education and achieve breakthroughs in research.

Meet our experts

Contact us