TWO PAGERS

DESIGNS & ARCHITECTURES

LATEST ARTICLES

HardVsImpossible
Hard to Break vs. Impossible to Break
In the current era of cybersecurity, we are locked in a race against the clock. Most encryption methods we rely on today are computationally secure, meaning they are essentially math...
FOTA-IOT-title-2
Securing the Lifeline
Firmware Over-the-Air (FOTA) is the essential mechanism for maintaining, securing, and improving billions of connected devices, from modern automobiles to critical infrastructure sensors....
HandshakesintheDark
Handshakes in the Dark
While the industry has long favored Elliptic Curve Cryptography (ECC) for its agility, that very efficiency now acts as a bullseye for Shor’s Algorithm. Because ECC requires significantly...
Architecting for Uncertainty
Architecting for Uncertainty
For decades, the cryptographic foundations of the modern enterprise have been treated as "set it and forget it" infrastructure, poured like concrete and rarely revisited. However, as...
HybridPQCText
Double-Locking the Quantum Door
Think of Hybrid Post-Quantum Cryptography (PQC) not as a translator between old and new systems, but as a double-locked vault. Currently, our digital world relies on "Classic" locks...
Total Exposure
Total Exposure
A compromised private cryptography key destroys the core security it protects: attackers can impersonate the key owner, decrypt sensitive data, forge signatures, and gain unauthorized...
The Silent compromise
Cryptography’s Ghost
What if the quantum era starts with a whisper, not a bang? A compromised network, an "impossible" decryption—is the silent singularity already here? Are your keys actually safe?
EndOfSecrets
The End of Secrets?
The security of the modern internet rests upon a mathematical "trapdoor" that is easy to enter but nearly impossible to exit without the right key. This trapdoor is the core of the...
Screenshot 2025-07-31 201144
Langchain: Chains with Chat history
LangChain is a powerful framework for building applications powered by Large Language Models (LLMs). It simplifies the process of connecting LLMs with various data sources and tools...
Screenshot2 2025-06-08 194014
Quantum Teleportation
Quantum teleportation is a real process in quantum physics that allows the state of a particle (like an electron or photon) to be transferred from one place to another — without physically...
Title
Qiskit multi qubit quantum gates
In the last post, I explained about matrix operations, the eigen vectors, the operator matrix, etc. We also went through the basic single qubit gates, like the Pauli X gate, Hadamard...
Title
Quantum computing - maths
My next few posts will be about quantum computing, (not the Iran’s version where they portrayed a ZedBoard Zynq-7000 as a quantum processor).We will code on IBM Qiskit libraries....

Connect

Send me a note if you want to contribute here or need details on some topic.