Design of indigenous encryption algorithms (e.g., AES-256-based algorithms) to protect sensitive data.
Implementation of hardware security modules (HSMs) to ensure the security of network communications and digital transactions.
Development of encryption protocols for 5G networks and the Internet of Things (IoT), with an emphasis on cyber sovereignty.