«to Polynom

Polynom Products

$0

Free Download

Community

Polynom Community Edition is designed for individuals, small groups, and communities wanting to control their data. Self-host your content, secure your communications, and protect your privacy.

What's Included in Community:

  • PQC DMs + Chat / VOIP / File Rooms
  • Quantum-Resistant E2E Encryption
  • PQC Graphatar™ Identities
  • PQC Social Encryption™
  • Permaban + Whitelist/Blacklist
  • SQLite Database + Client Database Encryption
  • Role-based Access Control
  • Public/Private & Trusted/Untrusted Setups
  • CNSA Suite 1.0 Compliance
  • E-Mail Support
  • Community - Download Now

    *Terms apply, read more

    $ XXX

    Custom Pricing

    Enterprise

    Purpose-built for companies that need security and compliance solutions, the Polynom Enterprise platform offers a variety of features to meet the needs of businesses of all sizes.

    Everything in Professional, plus:

  • Custom Graphatars™
  • Configurable Custom PQC Algorithms
  • Custom PQC Collaboration Rooms
  • Custom Client & Server Database Encryption
  • Custom SQLite Database Support
  • Custom Server Badge
  • Multi-Sig Announcement Rooms
  • CNSA Suite 2.0 Compliance
  • Audit Logs
  • Support Agent
  • Enterprise - Contact Sales

    Detailed Breakdown

     

    Features

  • PQC Graphatar™ Identities?

    Cryptographically derived avatars, uniquely generated from your keypair. The use of cryptographically derived avatars provides an additional layer of security for Polynom users. By analyzing the hash and identifier of a Graphatar, it is possible to verify the authenticity of a user's identity and to detect potential threats.

    » Learn More

  • PQC End-to-End Encryption
  • PQC Social Encryption™?

    SE is a "rolling cipher" algorithm, meaning that each entropy line is derived from a separate source and is compounded into the final result, an AES-256 shared key. This final AES-256-bit key is used for E2EE, encrypting all content between parties using AES-256-bit GCM mode. SE keys are identified across the network using a SHA-512 hash derived from an HMAC (hash-based message authentication code). This hash allows parties involved to know which SE key to use for the decryption of content without revealing any of the entropic data and other secrets used to derive the SE keys.

    For example, Alice asks Bob if he still has that picture they took last year on holiday. Bob says he does. Then Alice asks if Bob remembers the name of her favorite restaurant. Fortunately for Bob, he does. They both add these items they have/know to Polynom's Social Encryption engine and now they can share fully encrypted messages unique to them alone.

    » Learn More

  • PQC Direct Messages
  • PQC Text/Chat Rooms
  • PQC File Rooms
  • PQC VoIP Rooms
  • PQC SocEnc™ Rooms?

    Social Encryption™ ("SE") is a quantum-resistant technology that allows 1:n people to communicate with end-to-end encryption (E2EE) across a network without manually exchanging keys. It does this by replacing network key exchanges with a symmetric key exchange from already known sources of entropy that can be acquired from anything, including passphrases, contents of files/images, or any offline/online source of data. By using shared experiences and knowledge, there is no need to perform traditional network handshakes to exchange shared keys. This symmetric key exchange leaves no network trace, i.e., the network does not know that any data has been exchanged when multiple parties communicate securely in an E2EE fashion.

    » Learn More

  • Permaban Users
  • Client Database Encryption
  • Role-Based Access Control
  • Advanced Whitelist/Blacklist
  • Trusted/Untrusted Server
  • Server SQLite Database
  • Public/Private Channels
  • Public/Private Server
  • Quantum Rooms™?

    Quantum Rooms™ are rooms only for individuals who share a common SE key. Just like the principles of Quantum Entanglement, the content within Quantum Rooms only exists as long as 1:n individuals view it. For this reason, Quantum Rooms are both temporal and ephemeral. The moment the last user leaves the Quantum Room, the content is permanently deleted, and the room ceases to exist. Quantum Rooms merge disappearing content and private rooms without manually inviting users and managing authorization.

    » Learn More

  • Announcement Rooms?

    Announcement Rooms are phishing resistant rooms that allow only whitelisted users and/or roles to broadcast messages. In the future, we have plans to integrate multi-sig messages and other verification methods to ensure users can validate any and all messages, even from devices that may have been compromised.

    » Learn More

  • PQC Hybrid Rooms?

    Hybrid rooms allow users to merge different room types into one. For example, merging a text and voip room into one consolidated interface. Current functionality will support only text and voip to be merged, but in the future, Polynom will support merging any room types. You can create announcement + file rooms, poll + call rooms, blog + paywall landing pages, and more.

    » Learn More

  • Server Database Encryption
  • MariaDB Server
  • HiPS Technology™?

    Hiding-in-Plain Sight™ technology allows Polynom to operate securely (i.e., equivalent to a Type 1 Cryptographic device) on compromised networks, servers, and/or in hostile countries. Polynom achieves this by using various techniques to disguise its traffic and make it difficult to block or intercept. In addition to the techniques described above, Polynom uses various other techniques to protect its traffic, including PQC CRYSTALS Kyber-1024 exchanges resulting in AES 256-bit keys. These techniques make Polynom one of the most secure communications platforms available.

    » Learn More

  • Server Badges
  • CNSA Suite Compliance?

    Polynom uses the very latest and strongest encryption recommended by NIST and the US NSA's Commercial National Security Algorithm (CNSA) Suite.

    For further information, see: The Commercial National Security Algorithm Suite 2.0 FAQ.

    Polynom deploys:

    CRYSTALS-Dilithium (NIST Level V) (CNSA2.0)
    CRYSTALS-Kyber (NIST Level V) (CNSA2.0)
    Secure Hash Algorithm SHA512 (CNSA2.0)
    AES 256 GCM (CNSA2.0)
    Leighton-Micali Signature (LMS) (CNSA2.0)
    ED25519 ECDSA (CNSA1.0)
    X25519 ECDH (CNSA1.0)

    » Learn More

  • Audit Logs
  • Support
  • Community

    Free to Use

  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • 1.0
  • -
  • E-Mail
  • Learn More

    Enterprise

    Fully Custom

  • Custom
  • Custom
  • Custom
  • Custom
  • Custom
  • Custom
  • Custom
  • Custom
  • Custom
  • Custom
  • Custom
  • Custom Badge
  • 2.0
  • YES
  • Custom
  • Contact Sales

    TRY POLYNOM FOR FREE

    Our CaaS and PQC Solutions in Action

    Windows

    Windows 10+ compatible

  • Client SHA-512:F4680864668B0A8694D3A90CE347CA469D513B637EF09DB3543A787EF994C6189EEB5B59689BA57A6A184D03FA101372D79F217715BD22E8F3ACC55DD8FA94DF
  • Server SHA-512:C9FB737050028D6C14128A7750FF5B88E2789ADC646DA81A9D2A1811D18A152FB6E9E01F413823D7B73467F6F514EBFCD8163CB299BACCBF43A989D4B0B9FE02
  • Android

    Android 9+ compatible

    Linux

    Debian 12+ compatible

  • Client SHA-512:87E4831E0795D9CED76345696E9A356438A521727D3EEC287F0EE920931EAF30B5B317A68DDB9E2248BF31623F5A48A835F3166F144FF1E6EF8CCDDAF83412E5
  • Server SHA-512:0874224093C58FF689804E271AD1EDF173613B4CAE11EA6780FDE2EA0F29976D0DCBF7404381B8BA21157B3F473F05B29B52E805AA32806B9DC949E820991BCC
  • iOS

    iOS 12+ compatible

    macOS

    macOS 14+ compatible

  • Client SHA-512:820B91E23F892F95F7381A6CE2B7193E25C062D7376A45A72850BD954E13634BE7DD9E6A2C703A699444649A01703241C3CB261802239C0D1200D3998C958DFF