Amarjeet Shukla
Software Engineer — SSL/TLS
Amarjeet works on SSL certificate lifecycle management at QCecuring. He writes about TLS protocols, certificate automation, and PKI deployment patterns.
42 articles published
Post quantum
Harvest Now, Decrypt Later: The Quantum Threat That's Already HappeningNation-state adversaries are recording encrypted traffic today, planning to decrypt it when quantum computers arrive. Here's why this matters now, what data is at risk, and how to protect long-lived secrets.
15 Jan, 2026 · 05 Mins read
Pki
IoT Device Identity and Certificate Management: Securing Billions of DevicesEvery IoT device needs a cryptographic identity to authenticate securely. Here's how to provision certificates at manufacturing scale, manage them over 10-20 year device lifetimes, and handle the unique challenges of constrained environments.
28 Dec, 2025 · 05 Mins read
Pki
PKI for Financial Services: Certificate Management in Banking and BFSIFinancial services face unique PKI challenges: regulatory mandates, payment security, high-availability requirements, and massive certificate volumes. Here's how banks and financial institutions should approach PKI.
10 Dec, 2025 · 06 Mins read
Cryptography
What Are Public and Private Keys? Asymmetric Cryptography ExplainedPublic and private keys are the foundation of modern encryption, digital signatures, and TLS. Here's how key pairs work, where they're used, and what happens when a private key is compromised.
12 Nov, 2025 · 05 Mins read
Compliance
SOC 2 Cryptographic Controls: What Auditors Expect for Encryption and Key ManagementSOC 2 audits examine your cryptographic controls under Common Criteria CC6 and CC7. Here's what auditors test, what evidence to prepare, and how to pass without findings on encryption and certificate management.
10 Nov, 2025 · 06 Mins read
Pki
How to Fix the SSL Handshake Failed Error (Complete Guide)Learn what causes SSL handshake failed errors and how to troubleshoot TLS issues on clients and servers using proven enterprise-grade fixes.
09 Nov, 2025 · 04 Mins read
Cryptography
What Is an Encryption Algorithm? Types, Strengths, and How to ChooseEncryption algorithms transform readable data into unreadable ciphertext. Here's how the major algorithms work (AES, RSA, ECC, ChaCha20), their strengths and weaknesses, and which to use for each scenario.
01 Nov, 2025 · 04 Mins read
Ready to Secure Your Enterprise?
Experience how our cryptographic solutions simplify, centralize, and automate identity management for your entire organization.