Left Navigation

Cryptography Roadmap

India needs to focus on research and development to build its technology independence roadmap and strategy to bolster its aim to gain self-reliance in technology.

India has a strong ecosystem of academic and R&D institutions with industry and startup. India can build its research and development capabilities to position itself as the R&D hub for the world, especially for Cyber Security.

The research and development efforts of the academia and R&D institutions, industry and startups however need to synergies their efforts in technology and engineering to build the India stack in technology.

MeitY R&D in Cyber Security Group has embarked on seeking multi stakeholder consultations for the roadmaps for various thrust areas viz IoT Security, Mobile Security, Cyber Forensics, Cryptography. The team is conducting multi-stake holder consultation meets at four regions of country for each roadmap, that shall be followed by inter-ministerial consultation at Delhi before its submission to NITI Aayog. The roadmap aligns to NITI Aayog’s strategy for Research and Development in the country.

Cryptography security being critical and adaption making it ubiquitous in human lives.

India needs to develop indigenous tools and technologies and standards, for mobile security.

The draft roadmaps are published on MeitY website to seek inputs from stakeholders:

  1. Improvement in the draft technology roadmap proposed

2.Insights on emerging threats in the IoT Security landscape, not addressed in the roadmap.

  1. ⁠Short term (5), medium (10-15years) and long-term technology (15-25 years) targets missed if any in the roadmap
  2. Proven research or tools that are available with your team, please submit with supporting documentary proofs.

Roadmap Highlights:

The roadmap comprehensively covers research, development and improvements of the cryptographic primitives including Symmetric Cryptography, Asymmetric Cryptography, Randomness, Hashing, Research on new hard problems for cryptography and Creation of COEs. The national mobile security priorities outlined in the draft roadmap include, but are not limited to the following:

 Short Term (0-3 Years):

In the short term, focus would be on

  1. Symmetric Cryptography
    1. Trusted implementation of AES
    2. Formal proofs of existing popular block/stream ciphers.
    3. New key establishment schemes.
  2. Asymmetric Cryptography
    1. Establishment of Certification Agency for evaluation of new and existing elliptic curves intended for cryptography
    2. Generation of cryptographically secure and trusted elliptic curves over 512-bit prime field.
    3. In-house implementation of PQC Algorithms.
  3. Randomness – Trusted RNGs development
  4. Creation of COEs for scaling up the existing hard problems for Cryptography.

Mid Term (3-5 years):

In the mid-term, the roadmap involves

  1. Symmetric Cryptography
    1. New competitive S-box design for trusted implementation of AES.
    2. Novel fast, secure and efficient block/stream ciphers.
    3. Fast secure and efficient symmetric Cryptographic schemes for resource constrained devices.
  2. Asymmetric Cryptography
    1. New elliptic curves over 1024-bit prime field for reasonable quantum resiliency.
    2. Development of quantum resistant Cryptography.
    3. Development of quantum safe PKI.
    4. PKI for IoT
  3. Hashing
    1. New construction of SPONGE-like functions for hashing.
    2. New Boolean functions for hashing and cryptography.
  4. Randomness – New randomness test suite for QRNG.
  5. Creation of COEs – Indigenization of some crypto solutions, protocols/schemes.

 Long term (5-10 years):

In the long term, the roadmap focuses on

  1. Symmetric Cryptography
    1. Construction of formal proofs of all popular Stream/Block Ciphers.
    2. New key establishment schemes
  2. Asymmetric Cryptography
    1. Development of mature quantum safe Cryptography.
    2. Development of quantum safe IoT for resources constrain devices.
    3. Isogenies based elliptic curve generation for crypto development.
  3. Hashing
    1. Novel non-linearity scheme for Cryptography.
    2. New construction of SPONGE-like functions for hashing and Cryptography.
  4. Creation of COEs
    1. Indigenization of all existing Cryptography solutions of INDIA.
    2. New hard problem for Crypto Design.

 Disclaimer: The draft roadmap has been prepared by conducting multi-stakeholder consultations and are open for comments and suggestions. It is a constantly evolving process and roadmap shall be updated as per the comments received. The roadmap does not limit anyone to take up research in areas not covered, instead it is roadmap to guide the need for India’s digital technologies related to a Trusted and Secure mobile ecosystem