Demystifying Diffie-Hellman: The Mathematical Foundations of Secure Key Exchange
A deep dive into Diffie-Hellman key exchange: the math behind secure symmetric key sharing and its role in modern cryptography.
 
            AI • Cybersecurity • Research
Cybersecurity & AI Researcher | IEEE Author | Patent Holder
Building ML-powered security systems for intrusion detection, IoT protection, and enterprise defense. Published IEEE researcher and patent holder bridging theoretical AI advancements with practical cybersecurity implementations.
Professional roles applying theoretical knowledge to real-world systems and infrastructure.
Shree New Janki Traders
Bajra Technologies
Applied research in cybersecurity, reinforced with AI and full-stack engineering.
 
            Precision-oriented IDS with tuned XGBoost and threshold calibration to cut false positives while keeping recall.
 
            Real-time vitals (HR, temp, SpO₂) with secure data path and alerts. Granted under Indian IP.
 
            2D image-based VITON: segment person + garment and warp clothing with geometric matching—no 3D meshes required.
 
            Role-based platform with secure one-time payments, real-time notifications, and responsive UI.
 
            Coccidiosis detection pipeline with CI/CD and cloud testing for throughput and reliability.
 
            Low-cost vitals monitoring with secure data flow and alerting.
 
            2D try-on stack (segmentation + pose + warping) with texture realism ablations.
 
            Precision-oriented IDS with threshold calibration to cut false positives.
Hands-on cybersecurity skills developed through practical labs and challenges.
 
            Developed practical skills in network reconnaissance, web app penetration testing, and exploitation methodologies using industry-standard tools.
 
            Mastered cybersecurity fundamentals and basic attack methodologies through hands-on labs covering networking, web basics, and Linux fundamentals.
From ML research to security practice — notes on systems and engineering.
A deep dive into Diffie-Hellman key exchange: the math behind secure symmetric key sharing and its role in modern cryptography.
Step-by-step guide to RSA: math foundations, key generation, encryption/decryption, and CTF applications.
Explore how Windows domain authentication works, from legacy NetNTLM handshakes to modern Kerberos tickets.
Intuition + formulas for PDFs, CDFs, and where they show up in ML workflows.
Learn how graphs and networks can model relationships in data and their applications in ML workflows.
Want to collaborate or chat about research/engineering? I read every message.