Who Am I

Yang X. CHEN

Cryptography engineer at a cloud vendor, working in the industry since 2015.

DomainFocus
CryptographyClassical algorithms, cloud KMS, key management
AI Agent SecurityCredential management, authorization models
Post-Quantum CryptographyML-KEM/ML-DSA, migration strategies

Education

Dalian Maritime University, Class of 2015

Major: Electronic Technology and Science


Career Path

Landun Information Technology (Guangzhou)

2015 - 2017 | VPN Device R&D

1
2
3
4
5
Network Protocol Stack
├── Linux Kernel: Netfilter, iptables, Connection Tracking
├── Routing: OSPF, BGP, Static Routing
├── User-space: DPDK
└── VPN: SSLVPN, IPSECVPN (IKE, AH/ESP)

Key Work:

  • Linux kernel protocol stack and network packet processing
  • First encounter with Chinese Cryptography (Guomi) in VPN implementations
  • Customer deployment and troubleshooting

Baidu Cloud (Beijing)

2018

Public network traffic ingress and SSLVPN development.

Tencent (Shenzhen)

2018 - Present

Phase 1: IEG — Anti-Addiction System

2018 - 2019

Large-scale online system engineering.

Phase 2: Yunding Lab — Cryptography Products

2019 - Present

Products Built:

ProductDescription
KMSKey Management Service
Secrets ManagerCredential Management Service
CloudHSMHardware Security Module

Other Contributions:

  • Bastion Host: SSH/database protocols, identity authentication
  • Database Audit: Authorization systems, compliance templates
  • Sensitive Data Identification: Compliance specifications

Algorithm Coverage:

1
2
3
4
├── Symmetric: AES, SM4, ChaCha20-Poly1305
├── Asymmetric: RSA, ECC, SM2
├── Hash & MAC: SHA-256, SM3, HMAC
└── Post-Quantum: ML-KEM (FIPS203), ML-DSA (FIPS204)

Current Focus (2024 - Present)

graph TD A["Cryptography"] --> B["AI Agent Security"] A --> C["Post-Quantum Cryptography"] B --> B1["Identity & Authorization"] B --> B2["Credential Management"] B --> B3["Audit & Monitoring"] B --> B4["Resource Isolation"] C --> C1["ML-KEM"] C --> C2["ML-DSA"] C --> C3["SLH-DSA"]

1. Cryptography Engineering

Professional Focus | 2015 - Present

Cloud-scale cryptographic systems: KMS, Secrets Manager, CloudHSM.

2. AI Agent Security

Exploration Focus | 2025 - Present

1
2
3
4
├── Identity & Authorization
├── Credential Management
├── Audit & Monitoring
└── Resource Isolation

Practice: Building OpenClaw-Vango as a personal AI assistant.

3. Post-Quantum Cryptography

Future Focus

NIST FIPS Standards: ML-KEM, ML-DSA, SLH-DSA

Integration: Cloud KMS, AI agent identity.


Open Source

easy-encryption-tool

PyPI: easy-encryption-tool

CLI encryption tool with multi-algorithm and cloud KMS backend support.


AI Usage

AreaRole
DevelopmentTest cases, code review, prototyping
LearningQuick grasp of new tech stacks
WritingDrafts, polishing

Principles: Verify everything. Never input secrets.


Contact

Last Updated: 2026-03-23