Cyber, Information & Communication Security
| Technology Category | Technology Development Task | Lab |
|---|---|---|
| AI/ML Technology | Cyber Defence & Cryptanalysis Automation | SAG |
| Safety & security system using deep learning and computer vision | PXE | |
| Application Security | Analysis of (Telecommunication Electronics Material Protected from Emanating Spurious Transmission) TEMPEST Attacks on PC Monitors and Mobile Devices | SAG |
| Exploring Newer Micro-architectural Attacks | SAG | |
| Development of PUF chips, security documentation and masks for production | CAIR | |
| Screaming Channel Analysis on Mixed Signal Integrated Circuits | SAG | |
| Blockchain Security | Blockchain for Defence Applications - Access Control & Trust Management | DYSL-AI |
| Cryptography | Encryption for Military IoT | SAG |
| Hackproof Cryptography based on Honey Encryption | SAG | |
| Node encryption/ decryption based communication Security | CAIR | |
| Post Quantum Cryptography | CAIR | |
| Cryptology | Automation of Cryptanalysis and Traffic Analysis | SAG |
| Bio-Inspired Cryptography Algorithms | SAG | |
| Homographic Encryption Algorithms | SAG | |
| Post Quantum Cryptosystems and Protocols | SAG | |
| Side Channel Leakage Analysis on Quantum Key Distribution, Crypto Algoritms and Communication Channels | SAG | |
| Security Evaluation | Security Analysis of Blockchain Networks | SAG |
| Suite of tools for Network Security Assurance | SAG | |
| AI-enabled Tools for Automating Security Assesment | SAG | |
| Evaluation of Trustworthiness of AI-enabled Systems | SAG | |
| Formal Methods for Information Security Testing and Assurance | SAG | |
| Security Evaluation of Critical Information Storage Systems | SAG | |
| Security Evaluation of Smart Devices on Public Networks | SAG |
