Question map
In India, the term "Public Key Infrastructure" is used in the context of
Explanation
Public Key Infrastructure (PKI) is built on cryptographic security techniques and is part of national digital ID service stacks[2], as evidenced by Singapore's Singpass system. PKI is a framework that uses cryptographic keys (public and private key pairs) to secure digital communications, authenticate users, and ensure data integrity in electronic transactions. In the Indian context, PKI is fundamental to digital security infrastructure, enabling secure online transactions, digital signatures, and authentication systems like Aadhaar-based services and e-governance platforms. The other options—food security, healthcare and education, or telecommunication and transportation—refer to physical or social infrastructure sectors that may *use* digital security, but PKI itself is specifically a digital security technology framework, not a term used to describe these other infrastructure domains.
Sources- [1] http://dea.gov.in/files/g20_press_release_documents/G20_PolicyRecommendationsAdvancingFinancial_Inlcusion_ProductivityGainsThrough_DPI.pdf
- [2] http://dea.gov.in/files/g20_press_release_documents/G20_PolicyRecommendationsAdvancingFinancial_Inlcusion_ProductivityGainsThrough_DPI.pdf
PROVENANCE & STUDY PATTERN
Guest previewThis is a classic 'Term Definition' question from the Science & Tech (ICT) module. While it sounds technical, the word 'Key' is the giveaway linking it to cryptography and security. It is a fair question testing basic digital literacy and the IT Act 2000 framework, rather than deep engineering knowledge.
This question can be broken into the following sub-statements. Tap a statement sentence to jump into its detailed analysis.
- Statement 1: In India, is the term "Public Key Infrastructure" (PKI) used in the context of digital security infrastructure?
- Statement 2: In India, is the term "Public Key Infrastructure" (PKI) used in the context of food security infrastructure?
- Statement 3: In India, is the term "Public Key Infrastructure" (PKI) used in the context of health care and education infrastructure?
- Statement 4: In India, is the term "Public Key Infrastructure" (PKI) used in the context of telecommunication and transportation infrastructure?
Describes 'Digital Public Infrastructure' built on digital identity (Aadhaar) and broad digitalisation — contexts where authentication and secure identity assertions are required.
A student could note that systems based on digital identity often rely on public-key cryptography and then check official Aadhaar/UIDAI or government ICT documents for explicit PKI references.
Mentions UPI and BHIM payment systems — financial payment rails typically use cryptographic mechanisms and certificate-based trust for secure transactions.
Using knowledge that payments use cryptography, a student could look up RBI/NPCI technical standards or UPI security specs to seek explicit PKI terminology.
States digital public infrastructure will be 'open standard and interoperable' — PKI is a common interoperable standard for digital trust across systems.
A student could use the interoperability requirement to hypothesize use of standards like X.509 certificates and then search government standards repositories for PKI references.
Gati Shakti is described as a cross-Ministry digital platform for integrated planning — multi-agency platforms generally need centralized or federated trust frameworks, where PKI is a standard solution.
A student could infer such a platform would require certificate-based trust and then check Gati Shakti technical/implementation documents for PKI mention.
Defines 'infrastructure' and highlights digital/economic infrastructure as support systems — implying security infrastructure is part of digital infrastructure planning.
A student could argue that security components (e.g., PKI) are plausible elements of digital infrastructure and then search policy documents or telecom/IT ministry standards for PKI usage in India.
This statement analysis shows book citations, web sources and indirect clues. The first statement (S1) is open for preview.
Login with Google to unlock all statements.
This statement analysis shows book citations, web sources and indirect clues. The first statement (S1) is open for preview.
Login with Google to unlock all statements.
This statement analysis shows book citations, web sources and indirect clues. The first statement (S1) is open for preview.
Login with Google to unlock all statements.
This tab shows concrete study steps: what to underline in books, how to map current affairs, and how to prepare for similar questions.
Login with Google to unlock study guidance.
Discover the small, exam-centric ideas hidden in this question and where they appear in your books and notes.
Login with Google to unlock micro-concepts.
Access hidden traps, elimination shortcuts, and Mains connections that give you an edge on every question.
Login with Google to unlock The Vault.