{"title":"A hybrid hyperchaotic based dynamic keystream generator using perturbance process for public key infrastructure application","authors":"A. Sivapriya, D. K. Barman, K. Pandian","doi":"10.1109/PKIA56009.2022.9952210","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952210","url":null,"abstract":"A need for secured communication under hostile condition mandated to incorporate the cryptographic methods in the PKI system. Chaos is another promising paradigm which offshoots from nonlinear dynamics where its randomness has no stochastic origin. Hence a deterministic Pseudo Random Number Generator (PRNG) plays a vital role in chaotic-cryptography. Though many PRNG based chaotic systems are proposed, the low- key space chaotic systems and the finite precision of processor deteriorates the periodic function. The paper intent to achieve larger Lyapunov exponent by the proposed system in the post quantum ecosystem. The proposed system provides an improved key spacing and randomness with a novel approach of perturbing the sequence obtained from the hyperchaotic system with Non-Linear Feedback based Self-Shrinking Generators (NLFSR-SSG). As a result, an improved Lyapunov exponents (2.94, 0.1, 0, −15.341) are obtained and also a dynamic key stream using the proposed hyperchaotic system is generated with high resistance towards cryptanalytic attacks in the post quantum enabled PKI ecosystem.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"165 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127535015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Public Key Cryptographic Implementation Validation: A Review","authors":"P. Mohan, Abey Jacob, R. Patil","doi":"10.1109/PKIA56009.2022.9952350","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952350","url":null,"abstract":"This paper reviews the Validation procedures of Implementation in hardware, software, and firmware of Public Key Cryptographic algorithms. NIST standardized several algorithms for the present era a few years ago. Detailed test procedures for algorithm validation and Crypto module validation of implementations have been developed. In the Post-Quantum cryptography scenario, algorithm selection will take place in the coming few months, for which validation procedures need to be established by NIST. These algorithms are for KEM (Key Encapsulation Module) and Digital signatures. The symmetric encryption algorithms continue to be the same as before, using AES with a key length of 256 bits. This paper reviews the scope of validation for traditional Public key algorithms for illustration in this paper. Next, we look at a typical Post Quantum KEM and Digital signature algorithm and discuss the validation procedures to be followed.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133213192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved PKI Certificate Lifecycle Management With Centralized Device Management For Industrial IoT","authors":"A. Krishnan, S. Rajendran, T. K. S. Kumar","doi":"10.1109/PKIA56009.2022.9952216","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952216","url":null,"abstract":"The present industrial scenario requires frequent transfer of data between remote servers and on premise devices and hence the risk of attacks on these data cannot be overlooked. Such security risk is even aggravated in case of sensitive information being compromised due to inefficient security implementations. Various forms of security implementations are being discussed and experimented for the same. With the introduction of devices with better processing capabilities, Public Key Infrastructure is a very popular technique being widely implemented, wherein symmetric and asymmetric key based encryptions are used inorder to secure the data being transferred and it has proven to be an effective technique. The PKI however suffers certain drawbacks and it is evident from the attacks. A system specifically designed for scenarios such as a factory having a centralised device management system requiring multiple devices to communicate and upload data safely to server is being put forward in this paper.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125103692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolving Role of PKI in Facilitating Trust","authors":"Vishwas T. Patil, R. Shyamasundar","doi":"10.1109/PKIA56009.2022.9952249","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952249","url":null,"abstract":"A digital certificate is by far the most widely used artifact to establish secure electronic communication over the Internet. It certifies to its user that the public key encapsulated in it is associated with the subject of the certificate. A Public Key Infrastructure (PKI) is responsible to create, store, distribute, and revoke digital certificates. To establish a secure communication channel two unfamiliar entities rely on a common certificate issuer (a part of PKI) that vouches for both entities' certificates - thus authenticating each other via public keys listed in each other's certificates. Therefore, PKIs act as a trusted third party for two previously unfamiliar entities. Certificates are static data structures, their revocation status must be checked before usage; this step inadvertently involves a PKI for every secure channel establishment - leading to privacy violations of relying parties. As PKIs act as trust anchors for their subjects, any inadvertent event or malfeasance in PKI setup breaches the trust relationship leading to identity theft. Alternative PKI trust models, like PGP and SPKI, have been proposed but with limited deployment. With several retrofitting amendments to the prevalent X.509 standard, the standard has been serving its core objective of entity authentication but with modern requirements of contextual authentication, it is falling short to accommodate the evolving requirements. With the advent of blockchain as a trust management protocol, the time has come to rethink flexible alternatives to PKI core functionality; keeping in mind the modern-day requirements of contextual authentication-cum-authorization, weighted trust anchors, privacy-preservation, usability, and cost-efficient key management. In this paper, we assess this technology's complementary role in modern-day evolving security requirements. We discuss the feasibility of re-engineering PKIs with the help of blockchains, and identity networks.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133990317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vivin Krishnan, C. Sreeja, S. Binu, M. Misbahuddin
{"title":"A JSON Web Signature Based Adaptive Authentication Modality for Healthcare Applications","authors":"Vivin Krishnan, C. Sreeja, S. Binu, M. Misbahuddin","doi":"10.1109/PKIA56009.2022.9952258","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952258","url":null,"abstract":"In the era of fast internet-centric systems, the importance of security cannot be stressed more. However, stringent and multiple layers of security measures tend to be a hindrance to usability. This even prompts users to bypass multi-factor authentication schemes recommended by enterprises. The need to balance security and usability gave rise to Adaptive authentication. This system of utilizing the user's behavioral context and earlier access patterns is gaining popularity. Continuously analyzing the user's request patterns and attributes against an established contextual profile helps maintain security while challenging the user only when required. This paper proposes an Open standards based authentication modality that can seamlessly integrate with an Adaptive Authentication system. The proposed authentication modality uses JavaScript Object Notation(JSON), JSON Web Signature(JWS) and supports a means of verifying the authenticity of the requesting client. The proposed authentication modality has been formally verified using Scyther and all the claims have been validated.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132136404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Automated PKI Trust Transfer for IoT","authors":"Joel Höglund, S. Raza, Martin Furuhed","doi":"10.1109/PKIA56009.2022.9952223","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952223","url":null,"abstract":"IoT deployments grow in numbers and size and questions of long time support and maintainability become increasingly important. To prevent vendor lock-in, standard compliant capabilities to transfer control of IoT devices between service providers must be offered. We propose a lightweight protocol for transfer of control, and we show that the overhead for the involved IoT devices is small and the overall required manual overhead is minimal. We analyse the fulfilment of the security requirements to verify that the stipulated requirements are satisfied.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126347635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}