Published Papers
12
Research Areas
5
NIST Standards Referenced
9
Implementation Benchmarks
45+
Research Domains

Active Research Areas

Post-Quantum Cryptography

Migration pathways from classical to NIST FIPS 203/204/205 algorithms. Hybrid cipher bridge design, performance benchmarking, and enterprise adoption roadmaps.

  • ML-KEM
  • ML-DSA
  • Hybrid Design

Symmetric Encryption

AES-256-GCM and ChaCha20-Poly1305 implementation analysis, nonce management, AEAD construction patterns, and hardware-accelerated performance profiling.

  • AES-256-GCM
  • ChaCha20
  • AEAD

Key Derivation & Management

Argon2id parameter selection for enterprise workloads, HKDF construction analysis, key hierarchy design patterns, and HSM-backed key ceremony procedures.

  • Argon2id
  • HKDF
  • HSM Ceremonies

License Enforcement Architecture

Cryptographic license token design, hardware fingerprinting resistance to virtualisation evasion, offline enforcement models, and seat allocation integrity mechanisms.

  • Token Design
  • HW Fingerprint
  • Offline Model

Transport Security

TLS 1.3 cipher suite selection, certificate lifecycle automation, mTLS deployment patterns for zero-trust architectures, and OCSP stapling implementation analysis.

  • TLS 1.3
  • mTLS
  • Zero-Trust
Recent Publications
TP-2025-01 Post-Quantum 2025

Enterprise Post-Quantum Migration: From RSA-2048 to ML-KEM-768

A practical migration guide for enterprise environments transitioning from classical RSA and ECC key exchange to NIST FIPS 203 ML-KEM (formerly CRYSTALS-Kyber). Covers hybrid cipher bridge deployment, compatibility shims for legacy systems, performance benchmarks on x86-64 and ARM Cortex-A hardware, and organisational change management considerations for regulated industries.

  • ML-KEM-512 / 768 / 1024 performance comparison
  • Hybrid X25519/ML-KEM bridge implementation guide
  • Migration timeline for regulated environments
  • FIPS 203 conformance verification procedures
Request Full Paper
TP-2024-03 Symmetric Encryption 2024

AES-256-GCM vs ChaCha20-Poly1305: Enterprise Workload Analysis

Comprehensive performance and security analysis of AES-256-GCM and ChaCha20-Poly1305 across enterprise workload profiles — bulk data encryption, stream processing, mobile endpoints, and hardware-accelerated server environments. Includes nonce management recommendations and AEAD misuse resistance evaluation.

  • Throughput benchmarks: x86-64, ARM, RISC-V
  • Nonce exhaustion risk modelling at scale
  • Hardware AES-NI acceleration impact analysis
  • Algorithm selection guidance by use case
Ready to Get Started?

Access the Full Research Library

The quantum threat is not theoretical. Organizations that migrate to post-quantum cryptography today will be the ones still secure in 2030.