LATEST POSTS

FOTA-IOT-title-2
Securing the Lifeline
Firmware Over-the-Air (FOTA) is the essential mechanism for maintaining, securing, and improving billions of connected devices, from modern automobiles to critical infrastructure sensors. Currently, FOTA security relies entirely on classical asymmetric cryptography, such as RSA and ECC, to create a digital Root of Trust, ensuring that only authentic firmware from the manufacturer can be installed....
HandshakesintheDark
Handshakes in the Dark
While the industry has long favored Elliptic Curve Cryptography (ECC) for its agility, that very efficiency now acts as a bullseye for Shor’s Algorithm. Because ECC requires significantly fewer logical qubits to shatter than RSA, our most modern infrastructures will be the first to collapse. This creates a terrifying reality for "Data in Motion." Every encrypted handshake intercepted today is being...
Architecting for Uncertainty
Architecting for Uncertainty
For decades, the cryptographic foundations of the modern enterprise have been treated as "set it and forget it" infrastructure, poured like concrete and rarely revisited. However, as the shadow of quantum computing grows longer and NIST finalizes the first post-quantum standards, this rigidity has become a critical liability. The transition to Post-Quantum Cryptography (PQC) is not a simple software...
HybridPQCText
Double-Locking the Quantum Door
Think of Hybrid Post-Quantum Cryptography (PQC) not as a translator between old and new systems, but as a double-locked vault. Currently, our digital world relies on "Classic" locks (like RSA and ECC) that have worked perfectly for decades but are vulnerable to future quantum computers. On the other hand, new "Post-Quantum" locks are designed to defeat quantum computers, but because they are brand...
Total Exposure
Total Exposure
A compromised private cryptography key destroys the core security it protects: attackers can impersonate the key owner, decrypt sensitive data, forge signatures, and gain unauthorized access to systems. Once exposed, encrypted communications and authentication become unsafe, and trust breaks down until the key is revoked and replaced.
The Silent compromise
Cryptography’s Ghost
What if the quantum era starts with a whisper, not a bang? A compromised network, an "impossible" decryption—is the silent singularity already here? Are your keys actually safe?
EndOfSecrets
The End of Secrets?
The security of the modern internet rests upon a mathematical "trapdoor" that is easy to enter but nearly impossible to exit without the right key. This trapdoor is the core of the RSA cryptosystem. For decades, it has protected everything from your credit card details to state secrets, under the assumption that classical computers simply cannot factor large numbers efficiently.
Screenshot 2025-07-31 201144
Langchain: Chains with Chat history
LangChain is a powerful framework for building applications powered by Large Language Models (LLMs). It simplifies the process of connecting LLMs with various data sources and tools to create more sophisticated and intelligent applications. This tutorial will introduce you to the basics of LangChain, including how to maintain chat history for context, and walk you through a few simple chain examples...
Screenshot2 2025-06-08 194014
Quantum Teleportation
Quantum teleportation is a real process in quantum physics that allows the state of a particle (like an electron or photon) to be transferred from one place to another — without physically moving the particle itself. It’s not like “Star Trek”-style teleportation of objects or people, but it’s still amazing and real science. Quantum teleportation transfers information — the quantum...
Title
Qiskit multi qubit quantum gates
In the last post, I explained about matrix operations, the eigen vectors, the operator matrix, etc. We also went through the basic single qubit gates, like the Pauli X gate, Hadamard gate etc.In this post we will cover multi Qubit Quantum gates and visualize the entanglement between states. Quantum CNOT gate The quantum CNOT gate (Controlled-NOT gate) is a two-qubit quantum gate that flips the...
1 2 3 4 5 6 7