Amarjeet Shukla
Software Engineer — SSL/TLS
Amarjeet works on SSL certificate lifecycle management at QCecuring. He writes about TLS protocols, certificate automation, and PKI deployment patterns.
Insights by Amarjeet Shukla
Pki
47-Day TLS Certificates: How to Prepare for the New CA/B Forum StandardThe CA/Browser Forum voted to reduce maximum TLS certificate validity to 47 days by 2029. Here's the timeline, what it means for your infrastructure, and how to prepare before it's enforced.
Post quantum
CNSA 2.0: Your Complete Guide to Quantum-Safe CryptographyNSA's CNSA 2.0 mandates quantum-resistant algorithms for national security systems by 2030-2033. Here's what the requirements are, which algorithms to adopt, and how to plan your migration.
Pki
What is PKI? A Complete Guide to Public Key InfrastructurePublic Key Infrastructure enables trust, encryption, and authentication across the internet. Here's how PKI works end-to-end, how to design a hierarchy, and where enterprise PKI deployments fail.
Ssh
SSH Key Management in the Enterprise: The Complete GuideMost enterprises have 10x more SSH keys than they think, with no inventory, no rotation, and no offboarding. Here's how to get SSH key sprawl under control before it becomes a breach.
Security
Machine Identity Management: Why It's the Biggest Gap in Enterprise SecurityMachine identities outnumber human identities 45:1 but are managed with 10% of the rigor. Here's why this gap exists, what the risks are, and how to build a machine identity management program.
Compliance
PCI DSS 4.0 Cryptography Requirements: What Changed and How to ComplyPCI DSS 4.0 introduced new cryptographic requirements including cipher suite inventory, certificate lifecycle documentation, and stronger key management. Here's what's new, what's mandatory by March 2025, and how to prepare.
Pki
DigiCert vs Let's Encrypt vs Sectigo: Which Certificate Authority Should You Use?Three CAs dominate the TLS certificate market with very different models. Here's a practical comparison covering cost, automation, validation levels, support, and when each makes sense.
Post quantum
Harvest Now, Decrypt Later: The Quantum Threat That's Already HappeningNation-state adversaries are recording encrypted traffic today, planning to decrypt it when quantum computers arrive. Here's why this matters now, what data is at risk, and how to protect long-lived secrets.
Pki
IoT Device Identity and Certificate Management: Securing Billions of DevicesEvery IoT device needs a cryptographic identity to authenticate securely. Here's how to provision certificates at manufacturing scale, manage them over 10-20 year device lifetimes, and handle the unique challenges of constrained environments.
Pki
TLS 1.2 vs TLS 1.3: What Changed, Why It Matters, and How to MigrateTLS 1.3 removed insecure options, reduced latency to 1-RTT, and encrypted the handshake. Here's a complete comparison with TLS 1.2, what breaks during migration, and how to configure both correctly.
Pki
PKI for Financial Services: Certificate Management in Banking and BFSIFinancial services face unique PKI challenges: regulatory mandates, payment security, high-availability requirements, and massive certificate volumes. Here's how banks and financial institutions should approach PKI.
Cryptography
What Are Public and Private Keys? Asymmetric Cryptography ExplainedPublic and private keys are the foundation of modern encryption, digital signatures, and TLS. Here's how key pairs work, where they're used, and what happens when a private key is compromised.
Compliance
SOC 2 Cryptographic Controls: What Auditors Expect for Encryption and Key ManagementSOC 2 audits examine your cryptographic controls under Common Criteria CC6 and CC7. Here's what auditors test, what evidence to prepare, and how to pass without findings on encryption and certificate management.
Pki
How to Fix the SSL Handshake Failed Error (Complete Guide)Learn what causes SSL handshake failed errors and how to troubleshoot TLS issues on clients and servers using proven enterprise-grade fixes.
Cryptography
What Is an Encryption Algorithm? Types, Strengths, and How to ChooseEncryption algorithms transform readable data into unreadable ciphertext. Here's how the major algorithms work (AES, RSA, ECC, ChaCha20), their strengths and weaknesses, and which to use for each scenario.
Pki
SSL vs TLS: What's the Difference and Why It MattersSSL is dead. TLS replaced it in 1999. Here's what actually changed, why the name 'SSL' persists, and what you need to know about TLS versions for your infrastructure.
Clm
What Is Certificate Management? The Complete Enterprise GuideCertificate management is the practice of discovering, tracking, renewing, and governing TLS certificates across your infrastructure. Here's why it matters, what it involves, and how to do it at scale.
Ssl tls
How to Fix the SSL/TLS Handshake Failed Error: Complete Troubleshooting GuideSSL handshake failures happen when client and server can't agree on TLS parameters. Here's every cause — cipher mismatch, expired cert, incomplete chain, version incompatibility — with exact fixes.
Education Articles
Ssh
What are SSH KeysSSH keys are cryptographic key pairs used to authenticate users and systems to SSH servers without passwords. Here's how they work, which algorithms to use, and where key management fails at scale.
By Amarjeet Shukla
24 May, 2026
Standards
NIST SP 800-57 (Key Management)NIST SP 800-57 defines how cryptographic keys should be managed throughout their lifecycle: generation, use, rotation, and destruction. Here's what it recommends, what crypto-periods mean, and how it applies to certificate and key management.
By Amarjeet Shukla
18 May, 2026
Standards
What is FIPS 140-2/140-3FIPS 140 defines security requirements for cryptographic modules (HSMs, software libraries, hardware tokens). Here's what the levels mean, when you need it, and what FIPS compliance actually requires operationally.
By Amarjeet Shukla
10 May, 2026
Cryptography fundamentals
Digital SignaturesA digital signature proves who created a message and that it hasn't been modified. Here's how signing works with RSA and ECDSA, where signatures are used in PKI, and where verification fails.
By Amarjeet Shukla
04 May, 2026
Protocols
What is Certificate Transparency (CT)Certificate Transparency requires all publicly-trusted certificates to be logged in append-only public logs. Here's how CT works, what SCTs are, and how to monitor CT logs for unauthorized certificates issued for your domains.
By Amarjeet Shukla
02 May, 2026
Cryptography fundamentals
RSA Algorithm ExplainedRSA is the most widely deployed asymmetric algorithm, used in TLS certificates, code signing, and key exchange. Here's how the math works, what key sizes to use, and why RSA is being replaced by ECC and post-quantum algorithms.
By Amarjeet Shukla
26 Apr, 2026
Key management
Key Lifecycle ManagementKey lifecycle management covers every stage a cryptographic key passes through: generation, distribution, use, rotation, archival, and destruction. Here's how to manage keys properly and where lifecycle gaps create risk.
By Amarjeet Shukla
26 Apr, 2026
Machine identity
What is Machine Identity ManagementMachine identity management is the discipline of issuing, tracking, and rotating cryptographic credentials for every non-human entity in your infrastructure. Here's what it covers, why it's growing exponentially, and where organizations lose visibility.
By Amarjeet Shukla
24 Apr, 2026
Protocols
What is EST (Enrollment over Secure Transport)EST (RFC 7030) is the modern replacement for SCEP, using HTTPS and TLS client authentication for secure certificate enrollment. Here's how it works, what it improves over SCEP, and where to use it.
By Amarjeet Shukla
24 Apr, 2026
Cryptography fundamentals
What is Asymmetric EncryptionAsymmetric encryption uses a key pair — public key encrypts, private key decrypts. Here's how it enables TLS, digital signatures, and key exchange without sharing secrets.
By Amarjeet Shukla
22 Apr, 2026
Kubernetes
TLS Certificates in KubernetesKubernetes uses TLS certificates for cluster communication, ingress termination, and service-to-service encryption. Here's where certificates live in K8s, how they're managed, and where they expire without warning.
By Amarjeet Shukla
19 Apr, 2026
Clm
Certificate Automation at ScaleCertificate automation eliminates human involvement from enrollment through renewal. Here's how organizations automate at scale, what architecture patterns work, and where automation creates new failure modes.
By Amarjeet Shukla
18 Apr, 2026
Hsm
Cloud HSM and Managed HSM ServicesCloud HSMs provide FIPS 140-2 Level 3 hardware key protection without managing physical devices. Here's how AWS CloudHSM, Azure Managed HSM, and Google Cloud HSM compare, and where cloud HSM creates operational dependencies.
By Amarjeet Shukla
12 Apr, 2026
Clm
Certificate EnrollmentCertificate enrollment is the process of requesting, validating, and receiving a signed certificate from a CA. Here's how enrollment works across protocols (ACME, EST, SCEP, manual), what differs between them, and where enrollment fails silently.
By Amarjeet Shukla
10 Apr, 2026
Devsecops
Certificate Automation in CI/CDCI/CD pipelines can automate certificate provisioning for every deployment — requesting, validating, and deploying certificates as part of the release process. Here's how to integrate certificate automation into pipelines and where it fails.
By Amarjeet Shukla
08 Apr, 2026
Code signing
What is Code SigningCode signing uses digital signatures to prove software came from a known publisher and hasn't been tampered with. Here's how it works, what it protects against, and where the signing process fails.
By Amarjeet Shukla
07 Apr, 2026
Code signing
Software Supply Chain SecuritySoftware supply chain security ensures that code, dependencies, build processes, and distribution channels haven't been compromised. Here's how attacks happen, what frameworks exist, and where code signing fits in the defense.
By Amarjeet Shukla
05 Apr, 2026
Pki
Certificate Policy and Practice Statement (CP/CPS)A Certificate Policy defines what a CA will do. A Certification Practice Statement defines how it does it. Here's what they contain, why auditors care, and where gaps between CP and CPS create real risk.
By Amarjeet Shukla
04 Apr, 2026
Pki
PKI for IoT DevicesIoT devices need cryptographic identity for authentication and encrypted communication. Here's how PKI works at device scale, what's different from server PKI, and where IoT certificate management fails.
By Amarjeet Shukla
28 Mar, 2026
Ssl tls
What is mTLS (Mutual TLS)Mutual TLS (mTLS) requires both client and server to present certificates during the handshake, enabling cryptographic identity verification for service-to-service communication. Here's how it works, where it's deployed, and what breaks.
By Amarjeet Shukla
15 Mar, 2026
Ssl tls
TLS 1.3 vs TLS 1.2TLS 1.3 removed insecure algorithms, reduced handshake latency to 1-RTT, and encrypted more of the handshake. Here's what changed, what was removed, and what breaks during migration.
By Amarjeet Shukla
12 Mar, 2026
Ssl tls
Certificate Validity and 90-Day ProposalsCertificate validity periods are shrinking from 398 days to 90 days. Here's why shorter lifetimes reduce risk, what the CA/Browser Forum proposals mean for operations, and how to prepare.
By Amarjeet Shukla
10 Mar, 2026
Ssl tls
What is a TLS HandshakeA TLS handshake is the negotiation process that establishes an encrypted connection between client and server. Here's how TLS 1.3 reduced it to one round trip, what happens at each step, and where it fails.
By Amarjeet Shukla
20 Feb, 2026
Ssl tls
What is a TLS CertificateA TLS certificate binds a public key to a domain identity, enabling encrypted HTTPS connections. Here's how it works, where it breaks, and what engineers need to know.
By Amarjeet Shukla
14 Feb, 2026
Ready to Secure Your Enterprise?
Experience how our cryptographic solutions simplify, centralize, and automate identity management for your entire organization.