Thank you for making the conference a grand success. Please keep visiting for PKIA 2022.
About Public Key Infrastructure
The 2nd International Conference on Public Key Infrastructure and its Applications (PKIA 2021) will be a
for bringing together all stakeholders of a Public Key Infrastructure Ecosystem. The objective is to
platform for presenting novel ideas from academia and industry on traditional and emerging topics and
paradigms in the areas of PKI, with a clear connection to real-world problems, systems or applications.
Center for Development of Advanced Computing (C-DAC) is the premier R&D organization of the Department
of Electronics and Information Technology (DietY),
Ministry of Communication and Information Technology (MCIT) for carrying out R&D in IT, Electronics and
C-DAC has today emerged as premier R&D organization in IT&E (Information Technlogies and Electronics) in
the country working on strengthening national technological
capabilities in the context of global developments. More information can be found at:
The Controller of Certifying Authorities (CCA) has been appointed by the Central Government under
section 17 of the Act for the purpose of IT Act.
The office of the CCA aims at promoting the growth of e-Commerce and e-Governance through the wide use
of digital signatures. The CAs issues Digital Signature Certificates to the subscribers.
The CCA certifies the public keys of CAs using its own private key, which enables user in the cyberspace
to verify that a given certificate is issued by a licenced CA.
For this purpose it operates, the Root Certifying Authority of India (RCAI). More information can be
found at: http://cca.gov.in
- Registration & Networking (08:30 - 09:30)
- Inaugural Session (09:30 - 10:05)
- Industry and Academia Talk
- Talk 1 (10:20 - 10:45)
- Title: Status Updates on New Applications of Public Key Technology in Asia
Dr. Wei-Chung Hwang, Institute for Information Industry (III), Taiwan
- Abstract: With the evolution of security technologies, mobile devices, and biometric sensors, there are many new applications of public key technology under development in recent years. To address the needs of these new applications, many countries also started to update or revise their national policy or framework for electronic identification and digital signature. In this talk, we will provide the updated status of new applications of public key technology, and how the government in Asia response this new trend.
- Bio: Dr. Wei-Chung Hwang is the Deputy Director General of Digital Transformation Institute, Institute for Information Industry of Taiwan, and the Liaison Officer of APKIC(Asia PKI Consortium) to FIDO Alliance. He leads the development of open data, data privacy, and electronic authentication projects in Taiwan, under the sponsorship of Ministry of Economy Affairs(MOEA), Ministry of Science and Technology(MOST), and Board of Science and Technology(BOST). He work with government, enterprise, and community to advance the development of electronic authentication technologies and explore the value of open data, personal data, with the adoption of data-centric approach. Wei-Chung is also the executive committee member of Open Data Alliance(ODA) Taiwan, and members of advisory/consultation committee for several government agencies regarding to digital signature, electronic identification, and open data.
- Talk 2 (10:45 - 11:10)
- Title: Light PKI: Need of the Hour
Prof. Ashutosh Saxena, Dean R & D, CMR Technical Campus
- Abstract: The most well-known encryption technique is symmetric cryptography, which is very efficient but presents us with several challenges like transmitting the keys, storing the keys securely and renewing the keys. Asymmetric cryptography solves these challenges in an easier way where a private key is kept secret, and a public key is available to everybody. Messages encrypted with one of the keys in such a pair can be decrypted with the other key in the pair, since the keys are mathematically linked. However, it also suffers on speed as the asymmetric algorithms are approximately 1,000 times slower than symmetric algorithms. Therefore, entities use asymmetric cryptography to authenticate themselves, generate symmetric keys, and exchange the symmetric keys encrypted with the asymmetric algorithm. When the entities have received their symmetric keys, they use symmetric cryptography to protect their communication. Thus, both symmetric and asymmetric cryptography is needed for efficient communication security, especially in the scenario of IoT.However, many small, battery-powered IoT devices lack the required computing resources to use traditional PKI protocols. Most current deployments with constrained devices are not secured at all or only by shared keys, PINs or passwords. As a result, there is a large risk of hacker attacks and eavesdropping. This work presents a broad framework for PKI certificate management which can be easily used in the IoT having secureenrolment and overhead reduction.
- Bio: Dr. Ashutosh Saxena An industry expert and academician with over two decades of experience, 90+international publications, 26 granted patents, and a book on PKI: Concept, Design and Deployment (Tata McGraw Hill 2004) to his credit. Research interest: information security and privacy. Began career as a lecturer and computer engineer in the university and IUC-DAE facilities at Indore. Associate Professor at IDRBT (established by RBI), worked from 1998-2006, supervised TWO PhD. Worked at Infosys Ltd. (2006-16) as Principal Research Scientist & AVP.
Member of the review board for many international journals, conferences and committees. Served as Adjunct Faculty at NIT Warangal & Professor and Dean R&D at CMR Technical Campus. Currently Professor (CS) at CRRAO-AIMSCS, UoH Campus, Hyderabad.
- Talk 3 (11:10 - 11:35)
- Title: Public Key Infrastructure and digital identity development in Thailand
Mr. Thongchai Sangsiri,
Development Agency, Thailand
- Bio: Mr. Thongchai Sangsiri is employed at the Electronic Transactions Development Agency (ETDA) under the Ministry of Digital Economy and Society, Thailand. He is currently tasked with advising digital regulatory policies and international cooperation. Mr. Sangsiri’s background is in the fields of computer security, digital forensic technologies, cybersecurity policy development and international collaboration.
Prior to joining ETDA, he spent ten years in the public sector managing and supporting various governmental information and communication technology initiatives, including the smart citizen identification card, e-government, the government data exchange standard, PKI deployment in the public sector and various security awareness training programs.
Mr. Sangsiri has a keen interest in digital technologies, public policy, and information security policy development. In international fora, he has served as the Convenor for the Security and Prosperity Steering Group (SPSG) from 2014-2016 at the APEC Telecommunications and Information Working Group (TEL) and represented the government of Thailand at a number of international fora. He led the development of an APEC Framework for Securing the Digital Economy at APEC TELWG, chaired the ASEAN Coordinating Committee on e-Commerce (ACCEC) and is currently representing Thailand as a member of the Governmental Advisory Committee at ICANN. He has earned master's degrees in Electrical Engineering and Physics from the USA.
- Talk 4 (11:35 - 12:00)
- Title: Abusing PKI in Microsoft Active Directory: Mitigation Strategies
Mr. Hidayath Khan, Sentelist ME, UAE
- Bio: Hidayath Khan is a SANS Instructor and also Founder and Principal Security Consultant of Sentelist ME , a Cyber Security consulting firm based out of Dubai, UAE. His previous professional experiences include working as a Senior Security Manager for Scanit ME, Head of SOC for Datafort and as a Senior Security Engineer for Emirates Airline, Dubai.
He has his CISSP, GCIH, GPEN, GSEC, GREM, GHD certifications plus more than 20+ years of focused Cyber Security experience and brings with him a wealth of knowledge and hands-on skills garnered from the trenches in various consulting assignments for a range of fortune 500 companies across the EMEA and APAC region. His area of specialization includes Active Defense, Threat Hunting, Cloud Security, Malware Analysis & Incident Response.
Khan is also an active contributor to the information security community and has published several articles in leading regional magazines such as Computer News Middle East, Network Middle East & Security Advisor Middle East. He is also a prominent speaker at various security conferences and has been involved with SANS Institute as a GIAC Advisory Board member and mentor since 2001. He has been teaching for SANS ever since and has taught SANS courses at several events.
- Talk 5 (12:00 - 12:25)
- Title: Identity and Blockchain
Dr. Greg Adamson, University of Melbourne
- Abstract: Blockchain technology solves the "integrity" challenge of the confidentiality-integrity-availability triad in the untrusted environment of the Internet. This can provide persistent evidence of identity. However, when we face requirements such as the GDPR's so-called "right to be forgotten", this feature may become a flaw. Can we be both known and unknown?
- Bio: Dr Greg Adamson has worked with PKI applications since the 1990s, and blockchain since 2013. He is a cybersecurity consultant specializing in healthcare, government, and financial services. He is chair of the IEEE Standards Association industry connection Meta Issues in Cybersecurity, and a past president of the IEEE Society on Social Implications of Technology.
- Talk 6 (12:30 - 12:50)
- Title: Design of Security Protocols for Dynamic Charging of Electric Vehicles
Dr. Goutam Reddy, NIT Andhra Pradesh
- Abstract: Global use of electric vehicles has risen, necessitating the development of an efficient charging method. While static and partially dynamic charging are currently used, they diminish a vehicle's ability to stand charge, which contributes to range anxiety. In the near future, dynamic charging of electric vehicles will be a promising technology, allowing an electric vehicle to charge autonomously while in motion. However, assessing the security risks before enabling dynamic charging is mandatory, with authentication being a necessary step. As a result, developing secure authenticated key-agreement procedures for the interacting entities is as critical as the dynamic charging application itself in this context.
- Bio: Dr. Goutam Reddy is an Assistant Professor of the Department of Computer Science and Engineering at the National Institute of Technology Andhra Pradesh (NIT-AP), India. Before that, Dr. Goutam Reddy was an Assistant Professor at the Department of Computer and Information Security at Sejong University, Seoul, South Korea. Prior to that, Dr. Goutam Reddy was a Post-Doctoral Fellow at the KINDI Center for Computing Research at Qatar University in collaboration with Purdue University. Dr. Goutam Reddy earned his Ph.D. in Computer Science and Engineering from the Kyungpook National University, South Korea. Dr. Goutam Reddy research interests include Information Security and Cryptography. Dr. Goutam Reddy is mainly involved in research projects related to Authentication Protocols.
- Talk 7 (12:50 - 13:15)
- Title: An efficient hyperchaotic keystream generator using perturbance process for Public Key Infrastructure Applications
Dr. K K Soundra Pandian, Scientist 'D', Office of CCA
- Abstract: A need for secured communication under hostile condition mandated to incorporate the cryptographic methods in a system. Chaos is another promising paradigm which offshoots from nonlinear dynamics where its randomness has no stochastic origin. Hence a deterministic Pseudo Random Number Generator (PRNG) plays a vital role in chaotic-cryptography. Though many PRNG based chaotic systems are proposed, the low- key space chaotic systems and the finite precision of processor deteriorates the periodic function. The intent of this paper is to achieve larger Lyapunov exponent by our proposed system. The proposed system provides an improved key spacing and randomness with a novel approach of perturbing the sequence obtained from the hyperchaotic system with Non-Linear Feedback based Self-Shrinking Generators (NLFSR-SSG). As a result, improved Lyapunov exponents (2.94, 0.1, 0, -15.341) are obtained and also a dynamic key stream using the proposed hyperchaotic system is generated with high resistance towards cryptanalytic attacks.
- Bio:Received Ph.D from Indian Institute of Technology (IIT) Patna and Postdoctoral Fellow (PDF) from NewYork University.
Currently serving as "Scientist for Government of India (GoI), in the Ministry of Electronics and Information Technology, Office of CCA, New Delhi, with the responsibility to handle the "Digital Signature Certification, PKI" and Internet of Things (IoT). Prior to this worked for 12 Yrs as Research Scientist (Grade I) in Indian Institute of Information Technology Design and Manufacturing Jabalpur; executed the research work in the field of VLSI Cryptography, PKI, etc., Prior to this worked for 5 Yrs as Research Scientist (Grade II) in Indian Institute of Technology (IIT) Kanpur executed the research projects related to Mechatronics, Robotics. Prior to this worked for 2 Yrs as Project Engineer executed to develop IP core on FPGA Board in Center for Electronics and Design and Technology of India, Ministry of Communications and Information Technology.
Guided several UG, PG, and Ph.D. students for research work and the scholar received a young scientist award under my guidance. Published SCI indexed Journals/conferences (40Nos), funded/Consultancy projects (3Nos) as Principal and Co-Investigator, and Patents (5Nos). Active technical reviewer of reputed IEEE, IET, Elsevier, IOP, AIP, Wiley and Springer Journals. Serving as a reviewer for Government funded research projects (ECR, EMR, etc.,). Received "Outstanding Scientist Award" for my contribution, research excellence and accomplishments in the area of Electronics and Communication.
- Talk 8 (14:00 - 14:25)
- Title: Implications of Quantum Technologies on PKI
Prof. Anil Prabhakar, IIT Madras
- Bio: Dr Anil Prabhakar received his PhD in 1997 from Carnegie Mellon University, with a dissertation on the Nonlinear Spin-wave Optical Interactions.
Anil Prabhakar is currently a Faculty Member in the Department of Electrical Engineering, Indian Institute of Technology (IIT) Madrassince 2002, and am engaged across multiple laboratories that work on quantum technologies, fibre lasers and opto-fluidics
He was previously with the Read-Rite Corporation, Fremont, CA, and at Bangpa-in, Thailand, working in various capacities in charge of the design, characterization, and production of magnetic recording heads for hard disk drives.
He is a member of the Scientific Management Board for LIGO-India, to detect gravity waves, and the India-based Neutrino Observatory, and currently serve on the Editorial Boards for Scientific Reports (Nature) and the IEEE Transactions on Magnetics.
His current research interests in the areas of quantum technologies, have applications in metrology, quantum communication and quantum computing. As a Founder of QuNu Labs, incubated by IIT Madras, he focused on secure optical communications
He is also currently the Director of Yali Mobility and Enability Foundation, companies that focus on rehabilitation engineering
He has over 50 research publications, has co-authored a book on Spin Waves, a few book chapters, have patents on a wide range of devices in areas of photonics, magnonics and assistive devices.
- Talk 9 (14:25 - 14:50)
- Title: Hide-and-Seek: Machine Learning In Encrypted Domain
Prof. Yogachandran Rahulamathavan. Loughborough University London, UK
- Abstract: Machine Learning models were built using a huge amount of high-quality and application-specific data. Even though the machine learning models can only be trained at places where the data is available, anyone can use the trained model for classification tasks via the Internet. While it sounds revolutionary, the trained ML models are not readily available to users in healthcare, finance, or marketing due to privacy issues. Users do not want to share their sensitive data with service providers due to a lack of trust. Simply encrypting the data only protects them during storage and transmission. Researchers and industries are developing novel techniques known as privacy-preserving techniques to process the data in an encrypted domain to tackle the privacy issue. Homomorphic encryption plays a key role in developing privacy-preserving machine learning algorithms. While homomorphic properties exist in traditional cryptographic schemes such as RSA, this talk will focus on fully homomorphic encryption from lattice-based cryptography. We will also go through the state-of-the-art works, challenges and future trend in this domain.
- Bio: Yogachandran received his PhD degree in Signal and Information Processing from Loughborough University in 2011 and then worked as a postdoctoral research associate for six months on encrypted signal processing technique for privacy-preserving multimedia Big data processing. Subsequently he joined City University London as a research fellow in information security within the School of Mathematics, Computer Science and Engineering in 2012.
Yogachandran's research interests are on developing novel algorithms for Internet-of-Things, especially on advancing privacy-preserving data processing methods for cyber-physical systems such as cloud and smart networks, application of which spans mhealth, smart home, smart grid and connected cars. This involves processing big multimedia data in cloud system without violating user's privacy. For this he redesigned the state-of-the-art machine learning techniques such as support vector machine, Gaussian mixture models, and Linear Discriminant analysis using cryptographic primitives to work on encrypted domain.
- Talk 10 (14:50 - 15:05)
- Title: Anti Counterfeiting Method for Drugs Using Synthetic DNA Cryptography
Dr. Sreeja C S, Assistant Professor, CHRIST (Deemed to be University)
- Abstract: Counterfeiting has become a serious issue in the wake of COVID-19 especially for drugs, medical equipment’s and other expensive products. In this paper, a novel and unique cryptographic technique is proposed to resist counterfeiting which is based on the principles of Synthetic DNA. The proposed encryption scheme has applied the unique features of Synthetic DNA, in hybridization with DNA cryptography to ensure information security which acts as an anticounterfeiting technique with usability. Proof of concept and security analysis of the scheme is detailed. Formal analysis protocol is performed using Scyther and all the modeled claims are validated with no attacks.
- Bio: Dr. Sreeja C S is currently working as Assistant Professor in Department of Computer Science, CHRIST (Deemed to be University) Bangalore. Her area of interests in research includes but not limited to Information Security, Authentication, Bio-molecular Computing, DNA Cryptography, and Public Key Cryptography.
She has published her research work in peer-reviewed journals including ELSEVIER, INDERSCIENCE and in proceedings of renowned International conferences by IEEE, SPRINGER, and ACM. She also received IEEE best thesis award (second) for her Ph.D. thesis during graduate congress GraTE '7' 2019. She also served as a reviewer for prestigious IEEE Conferences, Session chair and Publications Co-Chair for IEEE PhD Colloquium on Ethically Driven Innovation & Technology for Society 2019 and 2020.She is an active IEEE ComSoc Excom member.
- Talk 11 (15:05 - 15:20)
- Title: A Signature based Authentication Modality for Adaptive Authentication in Healthcare Devices
Vivin Krishnan, Software Engineer, IBM
- Abstract: Evolving threat vectors arising from rapid penetration of internet-oriented applications has posed an increased risk to confidential data. While traditional authentication strategies have upgraded into multi-factor schemes, there continues to be a gap in terms of usability. Systems and enterprises are now gravitating towards an Adaptive authentication-based approach that uses the user's past behavior to offer protection in this scenario. This paper proposes a signature-based authentication modality that integrates with an adaptive authentication system. The system validates the contextual attributes of the user in every request. The use of an open standard allows integration with existing systems and serves as a means of verifying the client's authenticity. Formal analysis of the protocol has been done using Scyther and all the claims have been verified.
- Bio: Vivin Krishnan received his M.Tech degree in Software Engineering from CUSAT, Kochi, India. He has been working with IBM India Software Labs(ISL), Bangalore since 2007. He presently leads the MobileFirst Platform product development in ISL. He is currently pursuing his Ph.D from CHRIST (Deemed to be University), Bangalore, India. His research interests include Zero Trust architecture, Risk-based authentication, Cloud security.
- Talk 12 (15:20 - 15:40)
- Title: C-DAC's PKI based Solutions
Dr. Balaji Rajendran, Associate Director, C-DAC, Bengaluru
- Panel Discussion (16:00 - 16:45)
- Title: PKI as the National Backbone for Futuristic Applications
- Chair: Prof. R K Shyamasundar, IIT Bombay
Mr. Bindhumadhava B S, C-DAC
Mr. Ramprakash Pandey, O/o CCA
Mr. V Srinivasan, Asia PKI Forum
Ms. Carrie Peter, Impression Signatures, South Africa
- Valedictory and Conclusion
- Dr. Rajendra Kumar, Addl. Secretary, MeitY, GoI
- Col. A.K. Nath, Director General, C-DAC
- Prof. R K Shyamasundar, IIT Bombay
- Dr. S. D. Sudarsan, Executive Director, CDAC, Bengaluru
- Mr. Aashish Banati, Deputy Controller(Technical), O/o CCA
- Dr. Sarat Chandra Babu, Executive Director, SETS Chennai
- Mr. Dilip Kumar Barman, Assistant Controller (Technical)O/o CCA
- Dr. Balaji Rajendran, Associate Director, C-DAC
- Dr. Mohammed Misbahuddin, Associate Director, C-DAC
- Mr. Gopinath P, Joint Director, C-DAC
- Mr. Jitendra Kumar, Joint Director, C-DAC
- Ms. Lavanya P, Principal Technical Officer, C-DAC
- Mr. Anoop kumar Pandey, Principal Technical Officer, C-DAC
- Ms. Geethanjali S, C-DAC
- Mr. Shubham Goyal, Project Enginner, C-DAC
- Mr. Bhupendra Kumar, Project Associate, C-DAC
- Mr. Bindhumadhava, Senior Director, C-DAC
- Gp Capt Pradeep Mehta, Director(Fin & Admin)
- Mr. Ramachandran P, Scientist 'F', Office of CCA
- Mr. Shamsuddin Khan, Scientist 'E', Office of CCA
- Mr. Ram Prakash Pandey, Scientist 'E', Office of CCA
- Dr. K K Soundra Pandian, Scientist 'D', Office of CCA
- Mr. Prabhat Kumar, Scientist 'D', Office of CCA
- Mr. Deepak Kumar, Scientist 'C', Office of CCA
- Dr. Balaji, Associate Director, C-DAC
- Dr. Mohammed Misbahuddin, Associate Director, C-DAC
- Mr. Anoop kumar Pandey, Principal Technical Officer, C-DAC
Promotion Committee & Facilitation Committee
- Ms. Jyotsna Muralidhar, Manager-Admin, C-DAC
- Mr. S. Muthukumaran, Manager-Admin, C-DAC
- Mr. V.V.B. Sudhakar, Chief Finance Officer, C-DAC
- Mr. Mohammad Ashfaqu, Admin Officer, C-DAC
- Ms. Geethanjali S, Personal Secretary, C-DAC
- Ms. Manjula B, Admin Officer, C-DAC
- Mr. Shashidhar N Kunthe, Admin Officer, C-DAC
- Ms. Jayashree Krishnan, Admin Executive, C-DAC
- Ms. Kavitha Vadde, Admin Executive, C-DAC
- Mr. Shubham Parikh, Project Engineer, C-DAC
International Advisory Committee
- Prof. Debabrata Das, Director, IIIT Bangalore
- Prof. K Chandrasekaran, NIT Surathkal
- Mr. Venkatraman Srinivasan, Executive Chairman, eMudhra
- Mr. Pramod Pawar, Cybersecurity Researcher and Analyst
- Mr. Ganapati Subramani, Information Security Director, UPS, United Kingdom
- Mr. Sanjay Adiwal, Joint Director, C-DAC
- Mr. Sreekantha B A, Joint Director, C-DAC
- Mr. Anoop Kumar Pandey, Principal Technical Officer, C-DAC
- Mr. Shubham Parikh, Project Engineer, C-DAC
YouTube Live Link: Watch PKIA 2021 LIVE here!
Event Address: https://cutt.ly/PKIA2021
Date and time: Wednesday, December 22, 2021, 08:30AM India Time (Mumbai, GMT +05:30)
Event Number: 2516 814 0903
India Habitat Centre
Lodhi Road Near Airforce Bal Bharati School
New Delhi - 110003
Centre for Development of Advanced Computing,
#68, Electronic City, Bangalore - 560100