QCecuring - Enterprise Security Solutions

Amarjeet Shukla

Software Engineer — SSL/TLS

Amarjeet works on SSL certificate lifecycle management at QCecuring. He writes about TLS protocols, certificate automation, and PKI deployment patterns.

Insights by Amarjeet Shukla

Pki

47-Day TLS Certificates: How to Prepare for the New CA/B Forum Standard

The CA/Browser Forum voted to reduce maximum TLS certificate validity to 47 days by 2029. Here's the timeline, what it means for your infrastructure, and how to prepare before it's enforced.

By Amarjeet Shukla

07 May, 2026 · 06 Mins read

Post quantum

CNSA 2.0: Your Complete Guide to Quantum-Safe Cryptography

NSA's CNSA 2.0 mandates quantum-resistant algorithms for national security systems by 2030-2033. Here's what the requirements are, which algorithms to adopt, and how to plan your migration.

By Amarjeet Shukla

28 Apr, 2026 · 05 Mins read

Pki

What is PKI? A Complete Guide to Public Key Infrastructure

Public Key Infrastructure enables trust, encryption, and authentication across the internet. Here's how PKI works end-to-end, how to design a hierarchy, and where enterprise PKI deployments fail.

By Amarjeet Shukla

15 Apr, 2026 · 07 Mins read

Ssh

SSH Key Management in the Enterprise: The Complete Guide

Most enterprises have 10x more SSH keys than they think, with no inventory, no rotation, and no offboarding. Here's how to get SSH key sprawl under control before it becomes a breach.

By Amarjeet Shukla

28 Mar, 2026 · 05 Mins read

Security

Machine Identity Management: Why It's the Biggest Gap in Enterprise Security

Machine identities outnumber human identities 45:1 but are managed with 10% of the rigor. Here's why this gap exists, what the risks are, and how to build a machine identity management program.

By Amarjeet Shukla

10 Mar, 2026 · 05 Mins read

Compliance

PCI DSS 4.0 Cryptography Requirements: What Changed and How to Comply

PCI DSS 4.0 introduced new cryptographic requirements including cipher suite inventory, certificate lifecycle documentation, and stronger key management. Here's what's new, what's mandatory by March 2025, and how to prepare.

By Amarjeet Shukla

15 Feb, 2026 · 06 Mins read

Pki

DigiCert vs Let's Encrypt vs Sectigo: Which Certificate Authority Should You Use?

Three CAs dominate the TLS certificate market with very different models. Here's a practical comparison covering cost, automation, validation levels, support, and when each makes sense.

By Amarjeet Shukla

28 Jan, 2026 · 05 Mins read

Post quantum

Harvest Now, Decrypt Later: The Quantum Threat That's Already Happening

Nation-state adversaries are recording encrypted traffic today, planning to decrypt it when quantum computers arrive. Here's why this matters now, what data is at risk, and how to protect long-lived secrets.

By Amarjeet Shukla

15 Jan, 2026 · 05 Mins read

Pki

IoT Device Identity and Certificate Management: Securing Billions of Devices

Every IoT device needs a cryptographic identity to authenticate securely. Here's how to provision certificates at manufacturing scale, manage them over 10-20 year device lifetimes, and handle the unique challenges of constrained environments.

By Amarjeet Shukla

28 Dec, 2025 · 05 Mins read

Pki

TLS 1.2 vs TLS 1.3: What Changed, Why It Matters, and How to Migrate

TLS 1.3 removed insecure options, reduced latency to 1-RTT, and encrypted the handshake. Here's a complete comparison with TLS 1.2, what breaks during migration, and how to configure both correctly.

By Amarjeet Shukla

21 Dec, 2025 · 05 Mins read

Pki

PKI for Financial Services: Certificate Management in Banking and BFSI

Financial services face unique PKI challenges: regulatory mandates, payment security, high-availability requirements, and massive certificate volumes. Here's how banks and financial institutions should approach PKI.

By Amarjeet Shukla

10 Dec, 2025 · 06 Mins read

Cryptography

What Are Public and Private Keys? Asymmetric Cryptography Explained

Public and private keys are the foundation of modern encryption, digital signatures, and TLS. Here's how key pairs work, where they're used, and what happens when a private key is compromised.

By Amarjeet Shukla

12 Nov, 2025 · 05 Mins read

Compliance

SOC 2 Cryptographic Controls: What Auditors Expect for Encryption and Key Management

SOC 2 audits examine your cryptographic controls under Common Criteria CC6 and CC7. Here's what auditors test, what evidence to prepare, and how to pass without findings on encryption and certificate management.

By Amarjeet Shukla

10 Nov, 2025 · 06 Mins read

Pki

How to Fix the SSL Handshake Failed Error (Complete Guide)

Learn what causes SSL handshake failed errors and how to troubleshoot TLS issues on clients and servers using proven enterprise-grade fixes.

By Amarjeet Shukla

09 Nov, 2025 · 04 Mins read

Cryptography

What Is an Encryption Algorithm? Types, Strengths, and How to Choose

Encryption algorithms transform readable data into unreadable ciphertext. Here's how the major algorithms work (AES, RSA, ECC, ChaCha20), their strengths and weaknesses, and which to use for each scenario.

By Amarjeet Shukla

01 Nov, 2025 · 04 Mins read

Pki

SSL vs TLS: What's the Difference and Why It Matters

SSL is dead. TLS replaced it in 1999. Here's what actually changed, why the name 'SSL' persists, and what you need to know about TLS versions for your infrastructure.

By Amarjeet Shukla

13 Oct, 2025 · 04 Mins read

Clm

What Is Certificate Management? The Complete Enterprise Guide

Certificate management is the practice of discovering, tracking, renewing, and governing TLS certificates across your infrastructure. Here's why it matters, what it involves, and how to do it at scale.

By Amarjeet Shukla

10 Sep, 2025 · 04 Mins read

Ssl tls

How to Fix the SSL/TLS Handshake Failed Error: Complete Troubleshooting Guide

SSL handshake failures happen when client and server can't agree on TLS parameters. Here's every cause — cipher mismatch, expired cert, incomplete chain, version incompatibility — with exact fixes.

By Amarjeet Shukla

20 Aug, 2025 · 04 Mins read

Education Articles

Ssh

What are SSH Keys

SSH keys are cryptographic key pairs used to authenticate users and systems to SSH servers without passwords. Here's how they work, which algorithms to use, and where key management fails at scale.

By Amarjeet Shukla

24 May, 2026

Standards

NIST SP 800-57 (Key Management)

NIST SP 800-57 defines how cryptographic keys should be managed throughout their lifecycle: generation, use, rotation, and destruction. Here's what it recommends, what crypto-periods mean, and how it applies to certificate and key management.

By Amarjeet Shukla

18 May, 2026

Standards

What is FIPS 140-2/140-3

FIPS 140 defines security requirements for cryptographic modules (HSMs, software libraries, hardware tokens). Here's what the levels mean, when you need it, and what FIPS compliance actually requires operationally.

By Amarjeet Shukla

10 May, 2026

Cryptography fundamentals

Digital Signatures

A digital signature proves who created a message and that it hasn't been modified. Here's how signing works with RSA and ECDSA, where signatures are used in PKI, and where verification fails.

By Amarjeet Shukla

04 May, 2026

Protocols

What is Certificate Transparency (CT)

Certificate Transparency requires all publicly-trusted certificates to be logged in append-only public logs. Here's how CT works, what SCTs are, and how to monitor CT logs for unauthorized certificates issued for your domains.

By Amarjeet Shukla

02 May, 2026

Cryptography fundamentals

RSA Algorithm Explained

RSA is the most widely deployed asymmetric algorithm, used in TLS certificates, code signing, and key exchange. Here's how the math works, what key sizes to use, and why RSA is being replaced by ECC and post-quantum algorithms.

By Amarjeet Shukla

26 Apr, 2026

Key management

Key Lifecycle Management

Key lifecycle management covers every stage a cryptographic key passes through: generation, distribution, use, rotation, archival, and destruction. Here's how to manage keys properly and where lifecycle gaps create risk.

By Amarjeet Shukla

26 Apr, 2026

Machine identity

What is Machine Identity Management

Machine identity management is the discipline of issuing, tracking, and rotating cryptographic credentials for every non-human entity in your infrastructure. Here's what it covers, why it's growing exponentially, and where organizations lose visibility.

By Amarjeet Shukla

24 Apr, 2026

Protocols

What is EST (Enrollment over Secure Transport)

EST (RFC 7030) is the modern replacement for SCEP, using HTTPS and TLS client authentication for secure certificate enrollment. Here's how it works, what it improves over SCEP, and where to use it.

By Amarjeet Shukla

24 Apr, 2026

Cryptography fundamentals

What is Asymmetric Encryption

Asymmetric encryption uses a key pair — public key encrypts, private key decrypts. Here's how it enables TLS, digital signatures, and key exchange without sharing secrets.

By Amarjeet Shukla

22 Apr, 2026

Kubernetes

TLS Certificates in Kubernetes

Kubernetes uses TLS certificates for cluster communication, ingress termination, and service-to-service encryption. Here's where certificates live in K8s, how they're managed, and where they expire without warning.

By Amarjeet Shukla

19 Apr, 2026

Clm

Certificate Automation at Scale

Certificate automation eliminates human involvement from enrollment through renewal. Here's how organizations automate at scale, what architecture patterns work, and where automation creates new failure modes.

By Amarjeet Shukla

18 Apr, 2026

Hsm

Cloud HSM and Managed HSM Services

Cloud HSMs provide FIPS 140-2 Level 3 hardware key protection without managing physical devices. Here's how AWS CloudHSM, Azure Managed HSM, and Google Cloud HSM compare, and where cloud HSM creates operational dependencies.

By Amarjeet Shukla

12 Apr, 2026

Clm

Certificate Enrollment

Certificate enrollment is the process of requesting, validating, and receiving a signed certificate from a CA. Here's how enrollment works across protocols (ACME, EST, SCEP, manual), what differs between them, and where enrollment fails silently.

By Amarjeet Shukla

10 Apr, 2026

Devsecops

Certificate Automation in CI/CD

CI/CD pipelines can automate certificate provisioning for every deployment — requesting, validating, and deploying certificates as part of the release process. Here's how to integrate certificate automation into pipelines and where it fails.

By Amarjeet Shukla

08 Apr, 2026

Code signing

What is Code Signing

Code signing uses digital signatures to prove software came from a known publisher and hasn't been tampered with. Here's how it works, what it protects against, and where the signing process fails.

By Amarjeet Shukla

07 Apr, 2026

Code signing

Software Supply Chain Security

Software supply chain security ensures that code, dependencies, build processes, and distribution channels haven't been compromised. Here's how attacks happen, what frameworks exist, and where code signing fits in the defense.

By Amarjeet Shukla

05 Apr, 2026

Pki

Certificate Policy and Practice Statement (CP/CPS)

A Certificate Policy defines what a CA will do. A Certification Practice Statement defines how it does it. Here's what they contain, why auditors care, and where gaps between CP and CPS create real risk.

By Amarjeet Shukla

04 Apr, 2026

Pki

PKI for IoT Devices

IoT devices need cryptographic identity for authentication and encrypted communication. Here's how PKI works at device scale, what's different from server PKI, and where IoT certificate management fails.

By Amarjeet Shukla

28 Mar, 2026

Ssl tls

What is mTLS (Mutual TLS)

Mutual TLS (mTLS) requires both client and server to present certificates during the handshake, enabling cryptographic identity verification for service-to-service communication. Here's how it works, where it's deployed, and what breaks.

By Amarjeet Shukla

15 Mar, 2026

Ssl tls

TLS 1.3 vs TLS 1.2

TLS 1.3 removed insecure algorithms, reduced handshake latency to 1-RTT, and encrypted more of the handshake. Here's what changed, what was removed, and what breaks during migration.

By Amarjeet Shukla

12 Mar, 2026

Ssl tls

Certificate Validity and 90-Day Proposals

Certificate validity periods are shrinking from 398 days to 90 days. Here's why shorter lifetimes reduce risk, what the CA/Browser Forum proposals mean for operations, and how to prepare.

By Amarjeet Shukla

10 Mar, 2026

Ssl tls

What is a TLS Handshake

A TLS handshake is the negotiation process that establishes an encrypted connection between client and server. Here's how TLS 1.3 reduced it to one round trip, what happens at each step, and where it fails.

By Amarjeet Shukla

20 Feb, 2026

Ssl tls

What is a TLS Certificate

A TLS certificate binds a public key to a domain identity, enabling encrypted HTTPS connections. Here's how it works, where it breaks, and what engineers need to know.

By Amarjeet Shukla

14 Feb, 2026

Ready to Secure Your Enterprise?

Experience how our cryptographic solutions simplify, centralize, and automate identity management for your entire organization.

Stay ahead on cryptography & PKI

Get monthly insights on certificate management, post-quantum readiness, and enterprise security. No spam.

We respect your privacy. Unsubscribe anytime.