Click to listen highlighted text!

Indian Institute of Information Technology, Lucknow
भारतीय सूचना प्रौद्योगिकी संस्थान, लखनऊ
(An Institute of National Importance by the Act of Parliament)

DR. DHANANJOY DEY

Ph.D (Jadavpur University), Former Scientist DRDO, India
ddey@iiitl.ac.in
Lucknow, India

DR. DHANANJOY DEY

Associate Professor, Interim Dean (IPR) & Dean (A)

RESEARCH INTERESTS

  • Design and analysis of block ciphers
  • Design and analysis of cryptographic hash functions
  • Multivariate public key cryptography
  • Post quantum cryptography
  • Quantum computing

EDUCATION

  • Doctorate of Philosophy (Ph.D) Thesis Title: Multivariable Polynomials and its Applications to Cryptology from Jadavpur University, Kolkata, INDIA .
  • M. Sc. (Mathematics) from Jadavpur University, Kolkata, INDIA .
  • B. Sc. (Mathematics (Honors)) from Jadavpur University, Kolkata, INDIA .
  • Diploma in Chinese Language from Barkatullah University, M. P. INDIA .
  • Interpreter-ship in Chinese Language from School of Foreign Languages, Delhi, INDIA.

Teaching

Experience

  • Scientist in Defence R & D Organisation (DRDO), Delhi for more than 20 years

MEMBER OF BOARD OF STUDIES IN MATHEMATICS

  • Kavayitri Bahinabai Chaudhari North Maharashtra University from 12 Oct 2018 – 31 Aug 2022.
  • Moolji Jaitha College, North Maharashtra University from Oct 2018 till date.
  • National Institute of Science and Technology, Berhampur, Odisha from 30 Oct 2018.

SRC MEMBER OF NORTH CAP UNIVERSITY, GURGAON

  • Students pursuing PhD on Information Security of Department of Computer Science, North-Cap University, Gurgaon from 2014 to till date.

MEMBER OF EXECUTIVE COMMITTEE

  • Cryptology Research Society of India (CRSI) from January 2015 – December 2016.

MEMBER OF ADVISORY COMMITTEE

  • Indian Workshop and Symposium on Modelling, Experimentation and Simulation on Complex Systems (MESCoS) 2015.

TECHNICAL PROGRAM COMMITTEE MEMBER

  • International Conference on Advances in Data Science Challenges with Big Data Analysis - 2022
  • International Workshop on Post-Quantum Cryptography for Secure Communications (PQC-SC) by European Alliance for Innovation SecureComm 2021.
  • Conference on IoT and its Applications (CIA-2020)
  • Mathematical Sciences for Advancement of Science and Technology (MSAST) for 2011, 2012, 2013, 2014, 2015, 2016, & 2018.
  • International Conference on Mathematics and Computing (ICMC) for 2013, 2014, 2017, & 2019.
  • National Workshop on Cryptology (NWC) for 2006, 2013, 2014, 2015, & 2016.
  • International Symposium on Security in Computing and Communications (SSCC) for 2015, 2017, 2018, & 2019.

REVIEW COMMITTEE MEMBER

  • Journal of Quantum Information Processing - 2022
  • Journal of Mathematical Cryptology - 2020
  • Journal of Computer, Materials & Continua
  • Journal of System and Software – Elsevier Publication for 2010
  • Inscrypt – 2010.
  • Indocrypt – 2010, 2013, & 2014.
  • International Conference on Security, Privacy and Applied Cryptography Engineering (SPACE) 2014, 2016, & 2017.
  • International Conference on Signal Processing and Communication (SPCOM) 2012.
  • International Conference on Soft Computing for Problem Solving (SoCProS) 2113, 2014, & 2015.
  • Defence Science Journal 2017, & 2018.

ORGANISING COMMITTEE MEMBER

  • National Workshop on Cryptology for 2006, & 2013.
  • International Conference on Cryptology -- Indocrypt-2014, & 2018.
  • Course coordinator for AICTE Training And Learning (ATAL) course on Quantum Computing held at University Institute of Information Technology (UIIT), H. P. University, Shimla in 2019.

AWARDS

  • Titanium award for the year 2005.
  • DRDO Lab scientist award for the year 2011.

MEMBER OF PROFESSIONAL SOCIETY

  • Life member (L/071) of Cryptology Research Society of India (CRSI) .
  • Life member (L/2017/11) of Indian Mathematical Society (IMS) .
  • Life member (LD/82) of Calcutta Mathematical Society (CMS) .
  • Life member (1033) of Ramanujan Mathematical Society (RMS) .
  • Life member (629) of Indian Society of Information Theory and Applications (ISITA).

RESEARCH PUBLICATIONS

International Journal
  • Khushboo Bussi, Dhananjoy Dey, P. R. Mishra, & B.K. Dass, “MGR Hash Function”, in Cryptologia, Vol. 43, Issue 5, pp 372-390, 2019.
  • Khushboo Bussi, Dhananjoy Dey, & B. K. Dass, “Real World Applications of MGR, Neeva and KN Hash”, Journal of Applied Computer Science and Mathematics, Vol. 12, No. 25, Issue-1, pp 9-13, 2018.
  • Khushboo Bussi, Dhananjoy Dey, Manoj Kumar, & B. K. Dass, “Neeva: A Lightweight Hash Function”, Jnanabha, Vol. 48, No. 1, pp 79-91, 2018.
  • Manoj Kumar, Dhananjoy Dey, S. K. Pal, & Anupama Panigrahi, “HeW: A Hash Function Based on Lightweight Block Cipher FeW”, Defence Science Journal, Vol. 67, No. 6, pp 636-644, 2017.
  • Khushboo Bussi, Dhananjoy Dey, Manoj Kumar, & B. K. Dass, “Kupy-Neev Hash Function”, Italian Journal of Pure and Applied Mathematics, Vol. 36, pp 929-944, 2016.
  • Dhananjoy Dey, Noopur Shrotriya, & Indranath Sengupta, “R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2)”, International Journal of Computer Science & Information Technology (IJCSIT) Vol. 4, No. 6, pp 159-168, December 2012.
  • Gurpreet Kaur, Vidyavati S Nayak, Dhananjoy Dey, & S. K. Pal, “Analysis of the Hash Function – Modified Grøstl”, International Journal of Computer Applications, Vol. 44, No. 21, pp 50-55, April 2012.
  • Dhananjoy Dey, Prasanna Raghaw Mishra, & Indranath Sengupta, “GB-hash: Hash Funcions Using Groebner Basis”, International Journal of Modern Engineering Research (IJMER), Vol.2, Issue.2, Mar-Apr 2012, pp 462-470.
  • Dhananjoy Dey, Prasanna Raghaw Mishra, & Indranath Sengupta, “HF-hash: Hash Functions Using Restricted HFE Challenge-1”, International Journal of Advanced Science and Technology Vol. 37, December, 2011, pp 129-140.

International Conference

  • Satyam Omar, Sahadeo Padhye, & Dhananjoy Dey, “A New Identity-Based Multivariate Signature Scheme”, 7th International Conference on Mathematics and Computing ICMC 2021, 02 – 05 Mar 2021.
  • Khushboo Bussi, Dhananjoy Dey, P.R. Mishra, & B.K. Dass, “MGR Hash Function (Extended Abstract)”, International Conference of ISITA on Mathematical Modelling, Optimization and Information Technology, 2015. Full version of this paper is also available online at: https://eprint.iacr.org/2015/856.pdf
  • Gurpreet Kaur, Vidyavati S Nayak, Dhananjoy Dey, & S. K. Pal, “Modified Grostl: An Efficient Hash Function”, Advances in Computer Science, Engineering & Applications, Advances in Intelligent and Soft Computing, Volume 167, pp 803-812, Springer, 2012.

National Conference

  • Gurpreet Kaur, Vidyavati S Nayak, Dhananjoy Dey, & S. K. Pal, “Digital Signature Algorithm using Modified Grøstl”, National Conference on Cyber Security, DIAT Pune, 2012.
  • Dhananjoy Dey, & Laxmi Narain, “Secret Sharing Schemes for Information Security”, National Workshop on Information Theory and Applications, 2003.
  • Dhananjoy Dey, & Laxmi Narain, “Cracking Problems and Their Complexity”, National Workshop on Cryptology, 2003.

ArXiv Pre-print

  • Anirban Pathak, Rishi Dutt Sharma, & Dhananjoy Dey, “How vulnerable are the Indian banks: A cryptographers’ view”. Available online at https://arxiv.org/pdf/1804.03910.pdf

BOOK REVIEW

  • Editor of the Course Material Block-1 (Mathematical Preliminaries and Classical Ciphers), Block-2 (Symmetric Key Cryptosystems and Hash Functions) and Block 3 (Public Key Cryptography & Digital Signature) for M.Sc. (MACS) of IGNOU.
  • Reviewed 6th, 11th, & 5th Chapters of the book “Cryptography and Network Security – Principles and Practice” Sixth, Seventh, & Eighth Edition respectively written by William Stallings.

SOME SELECTED TALKS

  • Securing Online Communication -- A Mathematical Perspective" webinar organized by The Department of Mathematics (FST), The ICFAI University Tripura on 01 Jun 2022.
  • Impact of Quantum Computing on Cryptography and Post Quantum Cryptography Standardization by NIST, online FDP on Cyber Security and Artificial Intelligence with Hands-on Training CSAI-2022 at Sharda University, Noida on 24 Feb 2021.
  • Modern Algebra and its Applications in Cryptography, National E-Conference on Recent Advances in Physical and Computational Sciences at Dr. A. G. D. Bendale Mahila Mahavidyalaya, Jalgaon, North Maharashtra on 15 Feb 2021.
  • Applications of Mathematics in Cryptography, Third 2-Week Refresher Course in Computational and Mathematical Sciences organized by Department of Computer Science, Jamia Millia Islamia, New Delhi-110 025 on 28 Oct 2021.
  • Post Quantum Multivariate Public Key Cryptography, ATAL Academy Sponsored Faculty Development Programme on The Impact of Quantum Computing on Cryptography and Blockchain Technology organized by Department of Mathematics, GITAM, Hyderabad, India, on 15 Sep 2021
  • Block Ciphers: A Gentle Introduction, National Webinar on Cryptography jointly organized by the Department of Mathematics KBC North Maharashtra University, Jalgaon and IIIT Lucknow on 10 Sep 2021.
  • Impact of Quantum Computing on Cryptography, Faculty Development Programme on Emerging Topics in Computing: Quantum, Microfluidics, Memristors organized by Department of Computer Science and Engineering, JIS University, Agarpara, Kolkata, India, on 09 Aug 2021.
  • Impact of Quantum Computing on Cybersecurity, Faculty Development Programme on Cyber Security: Challenges and Practices organized by Computer Science and Engineering Department of Rajkiya Engineering College, Sonbhadra, on 31 July 2021.
  • Modern Algebra in Real Life, Webinar organized by Department of Mathematics, Akal University, Bathinda, Punjab on 02 December 2020.
  • Role of Mathematics in Secure Communication, National Webinar organized by Maitreyi College (University of Delhi), Department of Mathematics, Delhi on 27 November 2020.
  • How We Can Secure Our Online Communication, National Webinar on 19 November 2020 organized by Janki Devi Memorial College (University of Delhi), Department of Mathematics, Delhi.
  • Applications of Mathematics in Cryptography, TEQIP-III RTU (ATU) sponsored Faculty Development Program on Applications of Mathematical Sciences in Engineering and Technology 23-27 September 2020 organized by Department of Mathematics SKIT Jaipur.
  • Modern Algebra in Real Life, National Webinar on Advances in Mathematics and its Applications 28-29 August 2020 organised by Department of Mathematics, Panskura Banamali College (Autonomous), in Collaboration with IQAC and PBC Team Solution,West Bengal.
  • Mathematics for Cryptology, National Instructional Workshop on Cryptology (NIWC-2020), 22-26 July 2020 organised by Jawaharlal Nehru University, New Delhi under the aegis Cryptology Research Society of India.
  • Overview of Quantum and Post-Quantum Cryptography on a National Webinar on An Overview on Cryptography: From Classical to Quantum and Post-Quantum, 18-19 July 2020, organized by Department of Mathematics, Mahatma Gandhi Central University, Bihar
  • Series of nine lectures on Cryptography, Teachers’ Enrichment Workshop on Linear Algebra, Coding Theory and Cryptography, 18-23 November 2019, at Janki Devi Memorial College, University of Delhi.
  • Introduction to Quantum and Post-Quantum Cryptography, National Workshop on Cyber Security & Cyber Laws, 25-26 March 2019 at Saheed Sukhdev College of Business Studies, University of Delhi.
  • Algebra in Cryptography, National Workshop on Algebra and its Applications, 13 March 2019 at Atma Ram Sanatan Dharma College, University of Delhi.
  • Mathematics in Cryptography, Invited talk at Maitreyi College, University of Delhi on 16 Feb 2019.
  • A Gentle Introduction to Quantum and Post-Quantum Cryptography, National Workshop on Cryptology & Network Security(NWCNS-2019), 11-13 January 2019 at PSIT Kanpur.
  • Hash-based Signature Schemes, Continuous Education Program (CEP), 28-30 November 2018 at Scientific Analysis Group (SAG), DRDO, Delhi.
  • Introduction to Post-Quantum Cryptography, Continuous Education Program (CEP), 29-31 October 2018 at Joint Cipher Bureau (JCB), DRDO, Delhi.
  • Secret Sharing Schemes, Invited talk at BML Munjal University on 09 October 2018.
  • Introduction to Post-Quantum Cryptography, Continuous Education Program (CEP), 27-31 August 2018 at Advanced Numerical Research & Analysis Group (ANURAG), DRDO, Hyderabad.
  • Series of lectures on A Gentle Introduction to Cryptography, Design & Analysis of Block Ciphers, Design & Analysis of Hash Functions, Introduction to Quantum & Post-Quantum Cryptography, National Workshop on Cryptography (NWC-2018), 26-27 February at National Institute of Science & Technology, Odisha.
  • Introduction to Quantum and Post-Quantum Cryptography, International Conference on Mathematical Sciences and Applications (ICMSA-2018), 23-25 February, 2018 at GGU Bilaspur.
  • Hash Functions: Design & Analysis, Invited talk at National Technical Research Organisation (NTRO) on 25 January 2018.
  • Series of lectures on A Gentle Introduction to Cryptography, Mathematical Background for Cryptography, Introduction to Block & Stream Ciphers, Introduction to Hash Functions, Introduction to Public Key Cryptography, Introduction to Quantum & Post-Quantum Cryptography in the Post Induction Training School (POINTS-21), 16-17 January 2018 at Centre for Artificial Intelligence and Robotics (CAIR), DRDO, Bangalore.
  • Applications of Algebra in Real Life, Invited talk at Indraprastha College for Women, University of Delhi on 28 February 2017.
  • Applications of Algebra in Cryptography, Invited talk at Janki Devi Memorial College, University of Delhi on 22 February 2017.
  • Rings in Cryptography, State Level Workshop on Ring Theory and Its Applications to Cryptography, 07 January 2017 at M J College, Jalgaon.
  • Algebra in Real Life, International Conference on Recent advances in Mathematical Sciences and its Applications, RAMSA-2016, 08-10 December 2016 at JIIT, Noida.
  • Algebra in Cryptography, State Level Seminar on Mathematics and its Applications, 04 March 2016 at Kamala Nehru College, University of Delhi.
  • Algebra in Cryptography, National Conference on Algebra, Analysis and Fuzzy Mathematics, 29-30 January 2016 at North Maharashtra University, Jalgaon.
  • Tutorial talks on A Gentle Introduction to Block Ciphers – Design & Analysis and A Gentle Introduction to Hash Functions – Design & Analysis, National Instructional Workshop on Cryptology (NIWC-2015), 18-20 May 2015 at Himachal University, Shimla.
  • Tutorial talks on A Gentle Introduction to Block Ciphers – Design & Analysis, International Conference on Mathematics and Computing (ICMC-2015), 05-10 January at Haldia Institute of Technology, Haldia.

SUPERVISORY EXPERIENCE

PH.D. STUDENTS, M.TECH, MS, M.SC, MCA, B.TECH, B.SC.
  • PH.D. STUDENTSOngoing : i. Manjeet Kaur (Co-guide Dr. Manoj Kumar from SAG, DRDO) , ii. Satyam Omar (Co-guide Dr. Sahadeo Padhye from MNNIT)
  • Completed : Khushboo Bussi, “Design and Analysis of Cryptographic Hash Functions”, PhD Thesis, Delhi University.
  • M. TECH. STUDENTS
  • i. Richa Sharma, “Study and Analysis of Authenticated Encryption Scheme”, M.Tech. Thesis, Banasthali University, Jaipur, 2014-2015.
  • ii. Gurpreet Kaur, “Design and Analysis of Efficient Hash Function and its Implementation in Digital Signature”, M.Tech. Thesis, Defence Institute of Advanced Technology, Pune, 2011-2012.
  • MCA STUDENTS Deepti Bhalla, “Study of the Analysis of MD4 Hash Functions”, MCA Project Re- port, Guru Gobind Singh Indrapratha University, Delhi, 2012-2103.
  • MS STUDENTS Ranjan Kumar Roy, “Design & Analysis of Randomness Tests for Stream Cipher”, MS in Computer Science Report, Manipal University, Manipal, 2012-2013
  • M. SC. STUDENTS Pooran Singh, “Cryptographic Algorithms Being Used in Secure Web Connections”, IGNOU, 2019.
  • B. TECH. STUDENTS Sanskriti Hasta, “Practical Padding Oracle Attack”, B.Tech. Project Report, University Institute of Information Technology, HP University, 2020.
  • Prashansa Goel and Aditya Misra, “Analysis of Quantum Random Number Generators”, B.Tech. Project Report, Manipal Institute of Technology, Manipal, 2019.
  • Kunal Manik, “Security Analysis of Block Ciphers”, B.Tech. Project Report, SRM University, Sonipat, 2017.
  • Kunal Gulia, Hitesh Khandelwal and Jatin Singhal “Internet Traffic Analysis”, B.Tech. Project Report, North Cap University, Gurgaon, 2017.
  • Kunal Gulia, “Analysis of MD5 Hash Function”, B.Tech. Project Report, North Cap University, Gurgaon, 2016.
  • Hitesh Khandelwal, “Analysis of SHA-1 Hash Function”, B.Tech. Project Report, North Cap University, Gurgaon, 2016.
  • Jatin Singhal, “Analysis of SHA-0 Hash Function”, B.Tech. Project Report, North Cap University, Gurgaon, 2016.
  • Rajat Chopra, “Cryptanalysis – An Idea”, B.Tech. Project Report, Delhi Technological University, Delhi, 2015.
  • Saurabh Mishra, “Study and Analysis of ACORN: A Lightweight Authenticated Cipher”, B.Tech. Project Report, ITM University, Gurgaon, 2015.
  • Shubham Bhardwaj, “Analysis of JAMBU Lightweight Authenticated Encryption Mode and AES-JAMBU”, B.Tech. Project Report, ITM University, Gurgaon, 2015.
  • Rajat Chopra, “Study and Implementation of GOST Hash Algorithm”, B.Tech. Project Report, Delhi Technological University, Delhi, 2014.
  • Sandeep Kaura, “Study and Implementation of Whirlpool Hash Function”, B.Tech. Project Report, IP University, Delhi, 2013.
  • B. SC. STUDENTSAkanksha Gautam, Garima Joshi, Himani Saini, Mohini Gohri and Parul Dahiya, “Mathematical Aspect of Advanced Encryption Standards (AES)”, B.Sc. Training Report, Kamala Nehru College, Delhi University, Delhi, 2016.
  • Prachika Lathwal, “Mathematics Behind the Functionality of ATM Card”, B.Sc. Training Report, Jesus and Marry College, Delhi University, Delhi, 2015.

HOBBIES

  • Trekking and mountaineering

Contact

Department of Mathematics,
Indian Institute of Information Technology,
Lucknow, India.
ddey@iiitl.ac.in

 

 

Translate »
Skip to content Click to listen highlighted text!