Amarjeet Shukla
Software Engineer — SSL/TLS
Amarjeet works on SSL certificate lifecycle management at QCecuring. He writes about TLS protocols, certificate automation, and PKI deployment patterns.
42 articles published
Ssh
What are SSH KeysSSH keys are cryptographic key pairs used to authenticate users and systems to SSH servers without passwords. Here's how they work, which algorithms to use, and where key management fails at scale.
24 May, 2026
Standards
NIST SP 800-57 (Key Management)NIST SP 800-57 defines how cryptographic keys should be managed throughout their lifecycle: generation, use, rotation, and destruction. Here's what it recommends, what crypto-periods mean, and how it applies to certificate and key management.
18 May, 2026
Standards
What is FIPS 140-2/140-3FIPS 140 defines security requirements for cryptographic modules (HSMs, software libraries, hardware tokens). Here's what the levels mean, when you need it, and what FIPS compliance actually requires operationally.
10 May, 2026
Pki
47-Day TLS Certificates: How to Prepare for the New CA/B Forum StandardThe CA/Browser Forum voted to reduce maximum TLS certificate validity to 47 days by 2029. Here's the timeline, what it means for your infrastructure, and how to prepare before it's enforced.
07 May, 2026 · 06 Mins read
Cryptography fundamentals
Digital SignaturesA digital signature proves who created a message and that it hasn't been modified. Here's how signing works with RSA and ECDSA, where signatures are used in PKI, and where verification fails.
04 May, 2026
Protocols
What is Certificate Transparency (CT)Certificate Transparency requires all publicly-trusted certificates to be logged in append-only public logs. Here's how CT works, what SCTs are, and how to monitor CT logs for unauthorized certificates issued for your domains.
02 May, 2026
Post quantum
CNSA 2.0: Your Complete Guide to Quantum-Safe CryptographyNSA's CNSA 2.0 mandates quantum-resistant algorithms for national security systems by 2030-2033. Here's what the requirements are, which algorithms to adopt, and how to plan your migration.
28 Apr, 2026 · 05 Mins read
Cryptography fundamentals
RSA Algorithm ExplainedRSA is the most widely deployed asymmetric algorithm, used in TLS certificates, code signing, and key exchange. Here's how the math works, what key sizes to use, and why RSA is being replaced by ECC and post-quantum algorithms.
26 Apr, 2026
Key management
Key Lifecycle ManagementKey lifecycle management covers every stage a cryptographic key passes through: generation, distribution, use, rotation, archival, and destruction. Here's how to manage keys properly and where lifecycle gaps create risk.
26 Apr, 2026
Machine identity
What is Machine Identity ManagementMachine identity management is the discipline of issuing, tracking, and rotating cryptographic credentials for every non-human entity in your infrastructure. Here's what it covers, why it's growing exponentially, and where organizations lose visibility.
24 Apr, 2026
Ready to Secure Your Enterprise?
Experience how our cryptographic solutions simplify, centralize, and automate identity management for your entire organization.