Week One
- 05/21/2015: Learned about symmetric and asymmetric cryptography as well as the topics that deal with it. Understand how the Chinese Remainder Theorem works. Go over RSA. Started working on the website
- 05/22/2015: First presentation in group discussion. We discussed what we were working on for the first week, which is basically to fully understand cryptography as well as the famous algorithms in use today. We also met with Richard and he told us to start reading about the applications of private key encryption. At this point, we are still in the process of reading journals and articles related to our field of study and trying to collect data that will lead us to (hopefully) a better algorithm.
Week Two
- 05/26/2015: Today we had another group discussion, but it was with Dr.Fu and it was very brief where we summarized what we've been doing this past week and what our goals are. Dr.Fu and Ahmad said we need to create an Android/iOS app. with a user-friendly interface to perform the AMSC algorithm. This app. will be used to test the encryption speed and also compare AMSC with other algorithms (AES,DES). The group that will be focusing on the application of AMSC will try to see how AMSC can be applied to VANETs as well as crowd sourcing and crowd sensing. We got the latest rough draft of the paper on the AMSC algorithm. We read through it and we did the math behind the initialization step on the board.
- 05/27/2015: First, we tried to compare the RSA and AMSC algorithms and see if we can find someway to combine them instead of nest them. We were also split up into our respective groups: Kevin and Yakeen focusing on the applications of AMSC and Matthew and Andrew focusing on the AMSC algorithm. Matthew and Andrew used real examples to understand AMSC and RSA. They also looked at special cases of the Chinese Remainder Theorem and delved into the Extended Euclidean Algorithm some more as it is essential.
- 05/28/2015: Today, half of our group focused heavily on the applications of our algorithm to real-life problems regarding security and privacy. We read articles regarding crowdsourcing, VaNET, and other location based services and the major concerns that will need to be addressed before they can be feasible systems. Among these, cryptographic algorithms can be used to maintain differential privacy in a secure way; however, it is necessary that the encrypted databases still have utility. It is important to find an algorithm that satisfies the maximum possible security and utility and examines the trade-offs so a solution can be implemented. Furthermore, these algorithms need to address identity privacy as well as location privacy. The other group researched current implementations of the Chinese Remainder Theorem as well as look at current improvements to RSA. They also looked at different a different version of the Chinese Remainder Theorem and researched modular arithmetic. In addition, the group investigaed further the Extended Euclidean Algorithm.
- 05/29/2015: Today, Kevin and Yakeen read more research articles focusing on the cryptographic techniques used to encrypt messages in LBS. Andrew and Mathew went through proofs of RSA and CRT. They also created accurate testing data. After having a brief meeting with Richard, Kevin and Yakeen focused solely on the application of AMSC in VANETs.
Week Three
- 06/01/2015: The group collectively prepared for the group presentation and eventually presented. Matthew and Andrew later examined the problems with RSA and CRT and also looked at current solutions. Yakeen and Kevin created a rough timeline and determined what they would focus on VANET for the rest of the week. They also continued to read articles on VANETs and how certain cryptographic techniques measure up in terms of privacy and security.
- 06/02/2015: Matthew and Andrew examined current secret sharing schemes using CRT. They also researched various attacks on RSA and current implementations of CRT. Kevin and Yakeen continued looking for articles that highlighted the pros and cons of certain cryptographic techniques, especially those pertaining to VANET environments. They also tried looking for journals that focus on non-cryptographic methods that address security & privacy issues in VANETs and see why these methods are not as good as cryptographic methods.
- 06/03/2015: Kevin and Yakeen worked on summarizing the applications of AMSC in a hardcopy and chose certain points from the articles they've read that they felt contributed to how AMSC can be applied to VANETs. The summary they wrote also focused on the limitations of AMSC. Kevin started working on converting the C# code of the AMSC application into Java code. Matthew and Andrew investigated how likely it is for two users to pick the same q or p in an RSA algorithm. They also continued researching RSA and CRT.
- 06/04/2015: Yakeen worked on rewriting some parts of the paper she and Kevin wrote together as well as reading some more articles while Kevin worked some more on converting the C# code of the algorithm to Java. Matthew and Andrew worked on examining the speed of different CRT-RSA algorithms.
- 06/05/2015: The group presented what they were working on so far to Dr.Fu and a few other people. Kevin continued working on the Java code to fix some bugs while Yakeen looked for more articles on VANETs that could help her and Kevin find specific ways AMSC could be applied to VANETs. Andrew and Matthew worked on making a presentation for Monday.
Week Four
- 06/08/2015: Both groups presented today in the weekly group meeting. After the meeting, Kevin and Yakeen worked on reading material that will help them figure out what the existing protocols for VANETs are right now. Matthew and Andrew worked on creating a working algorithm for multi asymmetric key cryptography.
- 06/09/2015: Dr.Fu decided that this week, Kevin and Yakeen will focus on building the app for comparing different symmetric algorithms with AMSC. Kevin continued working on converting the other symmetric algorithms to Java code while Yakeen started familiarizing herself with Android Studio in order to build the interface for the app. Matthew and Andrew worked on programming their algorithm.
- 06/10/2015: Yakeen and Kevin continued working on the app to run the different algorithms on an Android platform. They've gotten the app working except they are running into a problem with the DES/AES algorithm. Matthew and Andrew tested their algorithm with various numbers of users/keys.
- 06/11/2015: Yakeen and Kevin have worked to resolve more issues with the Android application. Both groups gave a presentation to Dr.Fu about their current progress. Mathew and Andrew also researched proofs of cryptography and finalized their presentation or Monday.
- 06/12/2015: The application is now working for Yakeen and Kevin. However, they are working to figure out why the RC6 algorithm performs better than the AMSC algorithm on the Android platform. They have also started working on their presentation for Monday.
Week Five
- 06/15/2015: Both groups presented today in the weekly group meeting. After the meeting, Kevin and Yakeen focused on making improvements to the application in order for the results to be more accurate. Matthew and Andrew starting working on creating a proof of security for their cryptosystem.
- 06/16/2015: Kevin focused on implementing threading in the application while Yakeen focused on implementing a WiFi networking functionality in the application. Andrew and Matthew worked on analyzing the security of AMSC.
- 06/17/2015: Yakeen and Kevin switched over to Bluetooth networking capabilities because they were not making progress in WiFi networking. For today, Matthew and Andrew researched game proofs that are used to prove the security of algorithms.
- 06/18/2015: Yakeen and Kevin got the Bluetooth networking to work on the application so that they are able to pair their devices and send simple messages over the application. Yakeen also worked on changing the layout of the user interface so that the application looks cleaner. Matthew and Andrew worked on formulating a game proof for IND-CPA security.
- 06/19/2015: Yakeen and Kevin worked on fixing the bugs that are still in the application. Changing the layout of the application caused some functionalities to stop working, so they had to work on retaining the functionalities that were there before they changed the layout. They also worked on putting together a presentation for Monday. Matthew and Andrew worked focused on researching CCA proofs as well as finishing their presentation for Monday.
Week Six
- 6/22/2015: Both groups presented their mid-term presentations. Matthew and Andrew started research on CCA secure RSA adaptations while Kevin and Yakeen focused on making a write-up for their Android application.
- 6/23/2015: Matthew and Andrew continued looking into CCA security in RSA. Kevin and Yakeen started reading and summarizing the long technical report on VANETs they received from Dr. Fu.
- 6/24/2015: Matthew and Andrew compiled all documents for multi asymmetric cryptographic RSA scheme. Kevin and Yakeen continued reading Dr. Fu's and summarizing it.
- 6/25/2015: The group attended a graduate school presentation. Matthew and Andrew continued to work on their compiled document. Kevin and Yakeen finished summarizing Dr. Fu's technical report and started working on formulating a an AMSC protocol that can be applied in VANETs.
- 6/26/2015: Matthew and Andrew started working on writing their research paper. Yakeen and Kevin presented their AMSC VANET protocol to Ahmad and Richard. They also worked on putting together a presentation for Monday and summarizing their protocol in a document.
Week Seven
- 6/29/2015: Both groups presented at the weekly meeting. Matthew and Andrew started writing their literature review and paper. Yakeen and Kevin focused on finding solutions or at least better clustering scheme.
- 6/30/2015: Andrew and Matthew continued working on writing their paper and literature review. Kevin and Yakeen continued looking for more articles dealing with cluster aggregation in VANETs to see if the scheme they proposed could do without clustering or if they could find a clustering scheme with no group leader.
- 7/01/2015: Matthew and Andrew finished their literature review and continued working on their paper. Kevin and Yakeen met with Richard and discussed what could be done if they were to take away clustering/aggregation from their proposed scheme. They continued reading through articles dealing with aggregation in VANETs.
- 7/02/2015: Kevin and Yakeen found a very recent article that addresses some of the problems that they were having with group leaders in clusters. They started working on a literature review summing up the different clustering mechanisms they encountered.
Week Eight
- 7/6/2015: Yakeen and Kevin have started working on their paper. Matthew and Andrew are still working on writing their paper.
- 7/7/2015: Yakeen and Kevin are working on their paper. Matthew and Andrew are still working on writing their paper.
- 7/8/2015: Yakeen and Kevin are working on making their protocol better for their paper. Matthew and Andrew are still working on writing their paper.
- 7/9/2015: Yakeen and Kevin are working on their paper. Matthew and Andrew are still working on writing their paper.
- 7/10/2015: Yakeen and Kevin are working on their paper and created a presentation for Monday. Matthew and Andrew are working on their paper as well as preparing a presentation for Monday.
Week Nine
- 7/13/2015: Both groups presented their powerpoint presentations at the weekly meeting. Yakeen and Kevin continued working on their paper.
- 7/14/2015: Yakeen and Kevin continued working on their paper.
- 7/15/2015: Matthew and Andrew have been working on their poster. Kevin and Yakeen started working on their poster.
- 7/16/2015: Matthew and Andrew made the first draft of their poster. Kevin and Yakeen continued working on their poster.
- 7/17/2015: Matthew and Andrew made final changes to their presentation poster and submitted it in order for it to be printed. Kevin and Yakeen also made some edits to their poster and submitted it to be printed.
Week Ten
- 7/20/2015: Andrew and Matthew worked on preparing for their poster presentations that are going to take place later in the week. Kevin and Yakeen also did the same as well as worked on editing some parts of their paper.
- 7/21/2015: Both groups attended the poster presentation event hosted by Oakland University, where all REU students present their research projects.
- 7/22/2015: Both groups presented their poster presentations at the MID-SURE event.
- 7/23/2015: Mathew and Andrew worked on finishing their deliverables. Kevin and Yakeen worked on adding a section to their paper that highlights why they use the AMSC algorithm instead of the other symmetric algorithms. Kevin and Yakeen also worked on finishing their deliverables.
- 7/24/2015: Both groups handed in the deliverables and attended the farewell lunch.