chmodshubham.hashnode.devHow LibOQS Uses Valgrind to Hunt for Constant-Time Leaks?In cryptography, ensuring constant-time execution is a critical defense against timing side-channel attacks. An implementation is considered constant-time if its execution time and memory access patterns are independent of secret-valued inputs. Failu...Nov 6, 2025·7 min read
chmodshubham.hashnode.devConstant Time Implementation for CryptographyLet’s start the story with how constant time came into light in late 1996, when Paul Kocher published a novel attack on RSA, specifically on the RSA implementation, that extracted information on the private key by simply measuring the time taken by t...Oct 26, 2025·13 min read
chmodshubham.hashnode.devUnderstanding IPsec: How Internet Security WorksHello there, crypto commandos! Remember those old-school spy gadgets from James Bond movies where everything needed a secret handshake and decoder ring? Well, today we’re diving into IPsec — the protocol suite that basically gave every packet on the ...Jul 1, 2025·15 min read
chmodshubham.hashnode.devQUIC: The Future of Internet TransportHello again, my fellow digital warriors! If you thought my last blog on TLS/SSL was intense, well, grab your favorite beverage because today we’re diving into something that’s reshaping how the entire internet works. Yes, I’m talking about QUIC — the...Jun 26, 2025·15 min read
chmodshubham.hashnode.devTLS/SSL ConnectionHi bugs! Currently, I’m working around security protocols and decided to start a blog series to revive my knowledge of the sacred art (cryptography) of protecting our digital world from the darkness of evil spirits (yes, I’m talking about attackers)....Jun 22, 2025·5 min read