Public Key Infrastructure in India: Status and Issues. Palash Sarkar



Similar documents
Digital Signatures: A Panoramic View. Palash Sarkar

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

7 Key Management and PKIs

Asymmetric cryptosystems fundamental problem: authentication of public keys

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

esign Online Digital Signature Service

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2

Pre requisites for Digital Signature

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

Public Key Cryptography in Practice. c Eli Biham - May 3, Public Key Cryptography in Practice (13)

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

Steps to Troubleshoot Error Your CA is not trusted. Please use a trusted CA

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Introduction to Cryptography

Cryptography and Network Security Chapter 14

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

Ciphire Mail. Abstract

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

CERTIFICATION PRACTICE STATEMENT UPDATE

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Authentication Application

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Authentication Scenarios India. Ramachandran

CSCE 465 Computer & Network Security

Overview. SSL Cryptography Overview CHAPTER 1

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

NIST Test Personal Identity Verification (PIV) Cards

How To Understand And Understand The Security Of A Key Infrastructure

Guidelines for Usage of Digital Signatures in e-governance Version 1.0 (December 2010)

Publicly trusted certification authorities (CAs) confirm signers identities and bind their public key to a code signing certificate.

associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS)

CRYPTOGRAPHY IN NETWORK SECURITY

Controller of Certification Authorities of Mauritius

Public Key Encryption and Digital Signature: How do they work?

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Digital Signature. Signatures on the documents submitted in electronic form. Under the provision of IT Act, 2000, the office of Controller of

The Concept of Trust in Network Security

Overview of Public-Key Cryptography

National Certification Authority Framework in Sri Lanka

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Lecture VII : Public Key Infrastructure (PKI)

I N F O R M A T I O N S E C U R I T Y

Understanding digital certificates

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS

State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Websense Content Gateway HTTPS Configuration

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Savitribai Phule Pune University

The Role of Digital Certificates in Contemporary Government Systems: the Case of UAE Identity Authority

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Neutralus Certification Practices Statement

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Module 7 Security CS655! 7-1!

I N F O R M A T I O N S E C U R I T Y

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Table of Contents. Bibliografische Informationen digitalisiert durch

CALIFORNIA SOFTWARE LABS

Key Management and Distribution

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

Lecture 9: Application of Cryptography

Interoperability Guidelines for Digital Signature Certificates issued under Information Technology Act

Introduction to Public Key Technology and the Federal PKI Infrastructure 26 February 2001

Security Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -

Key Management and Distribution

Lightweight Security using Identity-Based Encryption Guido Appenzeller

X.509 Certificate Policy for India PKI

Public-Key Infrastructure

e-mudhra CPS e-mudhra CERTIFICATION PRACTICE STATEMENT VERSION 2.1 (emcsl/e-mudhra/doc/cps/2.1) Date of Publication: 11 February 2013

Ericsson Group Certificate Value Statement

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS Aristotle University of Thessaloniki PKI ( WHOM IT MAY CONCERN

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

TELSTRA RSS CA Subscriber Agreement (SA)

Danske Bank Group Certificate Policy

Public Key Infrastructure (PKI)

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Certificate Based Signature Schemes without Pairings or Random Oracles

HKUST CA. Certification Practice Statement

How To Create A Digital Signature Certificate

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)

Authentication Applications

Digital Signature Certificate (DSC)

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves

Introduction to Network Security Key Management and Distribution

Concept of Electronic Approvals

An Introduction to Cryptography as Applied to the Smart Grid

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Authenticity of Public Keys

Transcription:

Public Key Infrastructure in India: Status and Issues Palash Sarkar Applied Statistics Unit Indian Statistical Institute, Kolkata India palash@isical.ac.in 15 th January, 2012 Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 1 / 46

Structure of the Presentation A perspective. Digital signatures and digital certificates. IT Act and the enabling of PKI in India. Examples of e-protocols. Questions for information security researchers. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 2 / 46

A Perspective Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 3 / 46

Digital World A new way of interaction and communication. e-commerce: consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. (Wikipedia) e-government: the use of information and communication technology to provide and improve government services, transactions and interactions with citizens, businesses, and other arms of government. (Wikipedia) Counterpoint: agriculture will continue to be done in the fields. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 4 / 46

Why E-Commerce? There are lots of reasons. Primary among them would be the following. Convenience. Efficiency. A new medium opens up new possibilities. Caveat: a new medium also opens up new pitfalls. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 5 / 46

Paperless World Assumption: whatever can be done using paper-based methods can be done digitally (in fact, much more can be done). As yet, we do not know whether this assumption is true. We are still at a fledgling stage. Efforts by governments and big businesses to reach the ideal. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 6 / 46

Enabling E-Tasks Each e-task requires a protocol to achieve its goal. Different parties/players/users are involved. Each player has a pre-defined role. Need to ensure that a player sticks to the assigned role. This typically takes the form of a commitment by the player. Non-fulfillment of commitment brings upon legal punishment. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 7 / 46

Commitment In the conventional world, a commitment is achieved by getting a player to sign a statement on a piece of paper. In the digital world, the same needs to be created (at least, to simulate the conventional world). This gives rise to digital signatures. This views the move from the conventional to the digital world as a bridging process. One may consider direct digitial methods; digital signatures would still remain relevant. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 8 / 46

Digital Signatures and Digital Certificates Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 9 / 46

Cryptology: The Background Science Two basic tasks. Encryption. Authentication. Two basic notions. Conventional or classical notion: secret or symmetric key cryptosystems. Paradigm shift: asymmetric key cryptosystem (Diffie-Hellman, 1976). Public key agreement. Public key encryption. Digital signature. In practice a combination is actually employed. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 10 / 46

Digital Signature Schemes Consists of three procedures: (Setup, Sign, Verify). Setup: generates (pk B, sk B ) for Bob; pk B is made public (placed in a public directory). Sign: Bob signs message M using sk B to obtain signature σ. Verify: Alice can verify the validity of (M,σ) using pk B ; Alice does not need any secret information to verify a signature. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 11 / 46

Overview of Signature Scheme Alice pk public channel Bob signing key: sk verification key: pk sk yes/no Verify (M,σ) Sign M Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 12 / 46

(Wo)man in the Middle Eve impersonates Bob. Puts a public key pk E in the name of Bob. Eve signs a message M using sk E. Alice verifies the signature using pk E that she thinks is Bob s public key. Question: when can Bob trust that the public key is indeed that of Alice? Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 13 / 46

How to Trust a Public Key? Alice Eve, pk E Bob, pk B Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 14 / 46

Certifying Authority A CA has a key pair (pk C, sk C ). Bob obtains certificate. Bob generates (pk B, sk B ); sends pk B to CA. CA signs (Bob, pk B ) using sk C to obtain σ B ; Bob s certificate: (Bob, pk B, σ B ). Alice verifies (M,σ) signed by Bob. Verifies (Bob, pk B, σ B ) using pk C. Verifies (M,σ) using pk B. Trust: Alice trusts pk C ; hence, Alice trusts pk B. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 15 / 46

Management of Certificates A CA may revoke Bob s certificate. Bob has lost her private key. The validity of the certificate has expired. Other reasons? Alice needs to know whether Bob s certificate is fresh. Certificate revocation list (CRL). Online certificate status protocol (OCSP). One-way hash chains. Public Key Infrastructure (PKI) covers all of the above. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 16 / 46

X.509 Certificate Format version number serial number signature algorithm ID issuer name validity period subject name (i.e., certificate owner) certificate owner s public key optional fields the CA s signature on all previous fields Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 17 / 46

The Legal Angle For digital signatures to be accepted, the law has to recognise these as legal. United Nations Commission on International Trade Law (UNCITRAL). Formulated a model law on e-commerce in 1996. Adopted by the General Assembly resolution 51/162 of 16 December 1996. Recommends that all States give favourable consideration to the Model Law when they enact or revise their laws, in view of the need for uniformity of the law applicable to alternatives to paper-based methods of communication and storage of information; Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 18 / 46

IT Act and the Enabling of PKI in India Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 19 / 46

Indian IT Act, 2000, 2006 Provides legal sanctity to digital signatures based upon the principle of equivalence to handwritten signatures. Provides for the creation and management of PKI in India. Cascaded amendments to several other acts. Indian Evidence Act, 1872. Banker s Book Evidence Act, 1891. Reserve Bank of India Act, 1934. Indian Penal Code. Covers aspects other than digital signatures. Issues related to digital distribution of obscenity. Issues related to wire-tapping by governmental agencies. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 20 / 46

PKI-India Framework A Three Level Hierarchy Controller of Certifying Authorities CA CA CA CA User User User User User User User Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 21 / 46

Three-Level Hierarchy The CCA (or root CA) only issues certificates to CAs. The CAs issue certificates to individual users. Certain CAs issue certificates to certain category of users. There are no lower level CAs, i.e., a CA cannot issue a certificate to another CA. Trust in a certificate is ultimately derived from the root CA. Cross-certification with a foreign CA. An individual CA can arrange for cross-certification after due approval by the CCA, India. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 22 / 46

Functions of the CCA Creation and maintenance of the Root CA of India (RCAI). Root CA certificate is a self-signed certificate. It is based on the ITU-T X.509 standard. Protection of private key of CCA (using tamper proof hardware and 3-out-of-3 access control). Issue certificates to individual CAs. Maintain the national repository of digital certificates (NRDC) (mandated under Section 20 of the IT Act): copies of all certificates and certificate revocation lists. Empanel auditors for auditing infrastructure of CAs. Generally act as the controlling authority of all PKI-related issues in India. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 23 / 46

Standards Notified in India Internet Engineering Task Force (IETF): Internet X.509 Public Key Infrastructure. IEEE standard P1363 for three families: Discrete Logarithm (DL) systems; Elliptic Curve Discrete Logarithm (EC) systems; Integer Factorization (IF) systems. Public-key Cryptography Standards (PKCS): numbers 1,3,5,6,7,8,9,10,11,12,13 and 15. Federal Information Processing Standards (FIPS): FIPS 180-1, Secure Hash Standard; FIPS 186-1, Digital Signature Standard (DSS). FIPS 140-1 level 3, Security Requirement for Cryptographic Modules. Discrete Logarithm (DL) systems: Diffie-Hellman, MQV key agreement; DSA, Nyberg-Rueppel signatures. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 24 / 46

Standards Notified in India (contd.) Elliptic Curve (EC) systems: elliptic curve analogs of DL systems. Integer Factorization (IF) systems: RSA encryption; RSA, Rabin-Williams signatures. Key agreement schemes. Signature schemes: DL/EC scheme with message recovery; PSS, FDH, PKCS #1 encoding methods for IF family; PSS-R for message recovery in IF family. Encryption schemes: Abdalla-Bellare-Rogaway DHAES for DL/EC family. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 25 / 46

Rules Governing Key Pairs CA: at least 2048-bit RSA keys; users: at least 1024-bit RSA keys. CA has to change key pair every 3 to 5 years as per certificate practice statement (CPS) guidelines. Subscriber s key pair should be changed every 1 to 2 years. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 26 / 46

CAs in India Information as of 2009. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 27 / 46

CAs in India Safescrypt: private sector. Information as of 2009. IDRBT: issues certificates to the banking sector. National Informatics Centre: issues certificates to the government sector. TCS: private sector. Customs and Central Excise: government department. MTNL: telecom sector. GNFC, (n)code: private sector. e-mudhra: private sector. More than 50,000 certificates have issued (as of 2009). Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 27 / 46

Classes of Certificates Class 0: issued only for demonstration/test purposes. Class 1: issued to individuals/private subscribers; confirms that user s name (or alias) and e-mail address form an unambiguous subject within the CA s database. Class 2: issued for both business personnel and private individuals use; confirms that the information in the application provided by the user does not conflict with the information in well-recognized consumer databases. Class 3: issued to individuals as well as organizations; high assurance certificates, intended for e-commerce applications; issued to individuals only on their personal (physical) appearance before the CA. A CA may issue other classes of certificates, provided purpose and verification method is explicitly outlined. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 28 / 46

Examples of E-Protocols Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 29 / 46

Examples of E-Protocols E-Procurement. Air India: online bidding for all purchase categories (1st April, 2009); no paper bids accepted for tenders against whom online bids have been invited. Northern Railways: started from May, 2005; covers all types of tenders issued by engineering (works) and stores department of NR; tender notices are published on NR s website; offers are submitted electronically with digital signatures; tenderers can see the tabulation statement of all offers after opening of advertised tenders and also the status of their tenders; security money is deposited electronically through a payment gateway; information regarding purchase order is conveyed to the concerned vendors through e-mail. Source: A. K. Jain, S. Jain, e-procurement in Indian Railways. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 30 / 46

Examples of E-Protocols Financial Services. National Securities Depository Limited (NSDL): speed-e service; A demat account holder can access NSDL through speed-e; access for clearing members only through smart cards; authentication by digital signatures which are embedded in the smart card; after authorization, a demat account holder can issue clearing instructions. Central Depository Services (India) Limited (CDSL). Stock exchanges. National Stock Exchange: apparently works as sub-ca for Safescrypt-CA. Bombay Stock Exchange: works as sub-ca for TCS-CA, issuing certificates to its members. E-Contract notes as per SEBI guidelines. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 31 / 46

Examples of E-Protocols Banking Services. Indian Financial Network (INFINET) by IDRBT: countrywide communication backbone for the banks and financial institutions for payment system; INFINET established by IDRBT; membership open to the Reserve Bank of India, public sector banks, private banks, foreign banks, cooperative banks and financial institutions in India; IDRBT-CA is licensed to issue certificates to members of INFINET. Structured financial messaging systems (SFMS): securing inter/intra bank messaging systems for applications such as money transfer. Corporate internet banking: by banks like ICICI, Punjab National Bank. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 32 / 46

Examples of E-Protocols Government. Ministry of Commerce and Industries: e-application and approvals for special economic zones (SEZ) and export oriented units; Income Tax department: online tax returns through e-intermediaries. Railway ticketing agent: authentication via user-id/password and digital certificates to access the railway reservation network. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 33 / 46

e-payment System: Government of India According to a PIB release on 28th October, 2011, the GOI has launched an e-payment System (http://pib.nic.in/newsite/erelease.aspx?relid=76885). Developed by Controller General of Accounts (CGA), Department of Expenditure, Ministry of Finance. For payment of direct credit of dues from the Government of India into the account of beneficiaries. Uses digitally signed electronic advice (e-advice) through the Government e-payment Gateway (GePG). Goals: Will bring transparency and expedite direct payments. Direct payment of subsidies to the users and consumers of fertilizer, kerosene and cooking gas. Increase the adoption of other e-services. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 34 / 46

e-governance in India: Some Links MIT-CCA: http://www.mit.gov.in/content/cca e-governance: http://www.mit.gov.in/content/e-governance. Projects and Initiatives http://www.mit.gov.in/content/projects-and-initiatives. Acts and Policies: http://www.mit.gov.in/content/acts-policies. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 35 / 46

Questions for Information Security Researchers Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 36 / 46

From the IT Act If, by application of a security procedure agreed to by the parties concerned, it can be verified that a digital signature, at the time it was affixed, was (a) unique to the subscriber affixing it; (b) capable of identifying such subscriber; (c) created in a manner or using a means under the exclusive control of the subscriber and is linked to the electronic record to which it relates in such a manner that if the electronic record was altered then digital signature would be invalidated, then such digital signature shall be deemed to be a secure digital signature. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 37 / 46

From the IT Act If, by application of a security procedure agreed to by the parties concerned, it can be verified that a digital signature, at the time it was affixed, was (a) unique to the subscriber affixing it; (b) capable of identifying such subscriber; (c) created in a manner or using a means under the exclusive control of the subscriber and is linked to the electronic record to which it relates in such a manner that if the electronic record was altered then digital signature would be invalidated, then such digital signature shall be deemed to be a secure digital signature. Question. What is the relationship of the above to the scientific definition of secure digital signature? Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 37 / 46

From the IT Act A has a letter of credit upon B for Rupees 10,000, written by Z. A, in order to defraud B, adds a cipher to the 10,000, and makes the sum 1,00,000 intending that it may be believed by B that Z so wrote the letter. A has committed forgery. A signs his own name to a bill of exchange, intending that it may be believed that the bill was drawn by another person of the same name. A has committed forgery. There are 16 such illustrations. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 38 / 46

From the IT Act A has a letter of credit upon B for Rupees 10,000, written by Z. A, in order to defraud B, adds a cipher to the 10,000, and makes the sum 1,00,000 intending that it may be believed by B that Z so wrote the letter. A has committed forgery. A signs his own name to a bill of exchange, intending that it may be believed that the bill was drawn by another person of the same name. A has committed forgery. There are 16 such illustrations. Question: Can one come up with a good explanation of how and why the scientific definition of secure digital signature rules out these and similar cases? Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 38 / 46

Digital Signatures Galore There are many variants of digital signatures. Blind, unique, ring, aggregate, multi-signature, proxy, deniable,... Identity-based versions. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 39 / 46

Digital Signatures Galore There are many variants of digital signatures. Blind, unique, ring, aggregate, multi-signature, proxy, deniable,... Identity-based versions. Papers introducing variants provide some motivation. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 39 / 46

Digital Signatures Galore There are many variants of digital signatures. Blind, unique, ring, aggregate, multi-signature, proxy, deniable,... Identity-based versions. Papers introducing variants provide some motivation. Problems: For complex real-life examples identify appropriate portions where suitable variants can be fitted. Come up with general principles of mapping signature variants to applications. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 39 / 46

Identity-Based Encryption PKG id A d A PP Alice id A ciphertext Bob Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 40 / 46

Hierarchical Identity-Based Encryption PKG id A d A PP Alice id A ciphertext Bob Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 41 / 46

Should HIBE be Deployed in India? HIBE has the potential to reduce/simplify issues of certificate management. If not replace, HIBE may mitigate PKI-related problems. May be ideal for small niche applications. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 42 / 46

Should HIBE be Deployed in India? HIBE has the potential to reduce/simplify issues of certificate management. If not replace, HIBE may mitigate PKI-related problems. May be ideal for small niche applications. The 3-level PKI framework can very easily double as a 3-level HIBE: the CCA works as the root private key generator (PKG); the second level CAs issues private keys corresponding to identities; the third level are the actual users. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 42 / 46

Should HIBE be Deployed in India? HIBE has the potential to reduce/simplify issues of certificate management. If not replace, HIBE may mitigate PKI-related problems. May be ideal for small niche applications. The 3-level PKI framework can very easily double as a 3-level HIBE: the CCA works as the root private key generator (PKG); the second level CAs issues private keys corresponding to identities; the third level are the actual users. Key escrow: inherent in (H)IBE framework; can be overcome using different approaches: sharing of master secret key of the PKG; certificate-less encryption/certificate-based encryption; other methods... Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 42 / 46

Protocol Analysis Usual approach: protocols and security definitions, protocol specifications, detailed proofs of security reductions. Appearance of new protocols will raise new challenges for this approach. Alternative approach: logic based specification and automated tools for analysis; challenge: may require new logic modalities; how far can this approach be relied upon? Both approaches are at certain levels of abstractions. How to verify actual implementations? Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 43 / 46

Analysis of Deployed Systems Several large projects have already been deployed. Example: Government e-payment Gateway. A detailed and threadbare analysis of these systems is the call of the day for information security researchers. Even a small (and subtle) security flaw can lead to catastrophic consequences. Study of large complex security systems is really an ongoing process. Especially since one can hardly prove such systems to be secure. Academicians have a role to play. Potentially a huge area of research. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 44 / 46

Opportunities for Innovative Applications Rapid development of mobile communication technology and the fast disappearing digital divide. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 45 / 46

Opportunities for Innovative Applications Rapid development of mobile communication technology and the fast disappearing digital divide. Online services over mobile phones can now be leveraged in the villages. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 45 / 46

Opportunities for Innovative Applications Rapid development of mobile communication technology and the fast disappearing digital divide. Online services over mobile phones can now be leveraged in the villages. Opens up possibilities for new business applications geared towards rural India. Rural social network: for exchange of agriculture related information by farmers from different parts of India (or the world). Share information about NREGA, MSP, cost of fertilisers,... Online rural credit system: to provide credit to farmers freeing them from money lenders. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 45 / 46

Opportunities for Innovative Applications Rapid development of mobile communication technology and the fast disappearing digital divide. Online services over mobile phones can now be leveraged in the villages. Opens up possibilities for new business applications geared towards rural India. Rural social network: for exchange of agriculture related information by farmers from different parts of India (or the world). Share information about NREGA, MSP, cost of fertilisers,... Online rural credit system: to provide credit to farmers freeing them from money lenders. Research problem: Design and implement comprehensive solutions for these (and other related) applications. Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 45 / 46

Thank you for your attention! Palash Sarkar (ISI, Kolkata) PKI in India SIT, IIT-KGP, 2012 46 / 46