New Post: The Imperative of NIST-Approved Post-Quantum Resistant Algorithms for Securing Mobile Devices

@Randys has written a new blog article for Purism:

2 Likes

It would be nice if there were some clarity as to what Purism is actually doing here. By default messages between phones would be sms messages which would not be encryped with ML-KEM at rest nor in transit, so there’s an implication that something extra was done to make their demo work.

I also am unclear on what Purism is actually doing with regard to ML-KEM. Personally I’m having a hard time finding anything that can be traced back to Purism aside from these marketing posts that don’t actually say what they’re doing.

Maybe @JCS can get someone to shed some light on this?

2 Likes

Thank you for your valuable feedback. I’m making notes for future technical blog posts to include more detail regarding Purism’s direct technical contributions to the subject matter.

I did not directly assist with this demonstration, but @jonathon.hall may be able to elaborate if he’s available.

5 Likes

I can provide a timeline:

  1. I emailed sales@puri.sm on September 26th (Thursday) about how I would like to learn more about post quantum cryptographic communication and how I can become quantum safe.
  2. @todd-weaver responds and asks how many users and devices I am inquiring about.
  3. Then I wrote this slightly truncated email body:

That was the end of the conversation since last Thursday. I can also provide a subjective conclusion based on this timeline if desired.

1 Like

What Purism is doing: making noise to get attention of possible Government clients, I’m saying this only half-jokingly…

4 Likes

Yeah, i just remember the last time the marketing team went unchecked and… yeah I’d rather not see them head back down that path while still recovering from the damage to their reputation caused by overzealous marketing.

3 Likes

A PQ-algorithm needs to be NIST-approved, yes, but it also needs to be approved by one or more parties who are independent of the US government. (I understand obviously why the author is focused on NIST-approved. I am speaking here for my own benefit.)

2 Likes