Who Am I
Yang X. CHEN
Cryptography engineer at a cloud vendor, working in the industry since 2015.
| Domain | Focus |
|---|---|
| Cryptography | Classical algorithms, cloud KMS, key management |
| AI Agent Security | Credential management, authorization models |
| Post-Quantum Cryptography | ML-KEM/ML-DSA, migration strategies |
Education
Dalian Maritime University, Class of 2015
Major: Electronic Technology and Science
Career Path
Landun Information Technology (Guangzhou)
2015 - 2017 | VPN Device R&D
| |
Key Work:
- Linux kernel protocol stack and network packet processing
- First encounter with Chinese Cryptography (Guomi) in VPN implementations
- Customer deployment and troubleshooting
Baidu Cloud (Beijing)
2018
Public network traffic ingress and SSLVPN development.
Tencent (Shenzhen)
2018 - Present
Phase 1: IEG — Anti-Addiction System
2018 - 2019
Large-scale online system engineering.
Phase 2: Yunding Lab — Cryptography Products
2019 - Present
Products Built:
| Product | Description |
|---|---|
| KMS | Key Management Service |
| Secrets Manager | Credential Management Service |
| CloudHSM | Hardware Security Module |
Other Contributions:
- Bastion Host: SSH/database protocols, identity authentication
- Database Audit: Authorization systems, compliance templates
- Sensitive Data Identification: Compliance specifications
Algorithm Coverage:
| |
Current Focus (2024 - Present)
1. Cryptography Engineering
Professional Focus | 2015 - Present
Cloud-scale cryptographic systems: KMS, Secrets Manager, CloudHSM.
2. AI Agent Security
Exploration Focus | 2025 - Present
| |
Practice: Building OpenClaw-Vango as a personal AI assistant.
3. Post-Quantum Cryptography
Future Focus
NIST FIPS Standards: ML-KEM, ML-DSA, SLH-DSA
Integration: Cloud KMS, AI agent identity.
Open Source
easy-encryption-tool
PyPI: easy-encryption-tool
CLI encryption tool with multi-algorithm and cloud KMS backend support.
AI Usage
| Area | Role |
|---|---|
| Development | Test cases, code review, prototyping |
| Learning | Quick grasp of new tech stacks |
| Writing | Drafts, polishing |
Principles: Verify everything. Never input secrets.
Contact
- Website: cipherhub.cloud
- Blog: blogs.cipherhub.cloud
- WeChat: 密码学人 CipherHUB
Last Updated: 2026-03-23