@keerthankasula
Software Developer
Embracing this journey, eager to confront new challenges daily and strive towards becoming the best version of myself.
I am available to share my experiences and learnings in the information technology.
Sep 7, 2025 · 5 min read · My name is keerthan, working as a java-security developer and In this article, let us programmatically explore how digital signatures are generated and validated using industry-standard cryptographic library called bouncy castle. Consider reading my ...
Join discussion
Sep 5, 2025 · 4 min read · We must have heard this fancy term called ‘quantum computing’ or a quantum computer, what exactly is a quantum computer ? and why it is a threat to data security? let us actually try to get to know answers about these questions in a simple manner. My...
Join discussion
Dec 22, 2024 · 5 min read · In an era where data breaches and cyber threats dominate headlines, securing information has become more critical than ever. Cryptography, the art of protecting data through encryption and decryption, is at the heart of modern cybersecurity. This art...
Join discussion
Oct 27, 2024 · 3 min read · Prologue In this article, we’ll explore the communication process between the client (browser) and server, focusing on how they exchange data and validate each other to ensure that only the intended parties are involved and that the data remains secu...
Join discussion