SR 4.1 requires the IACS to protect the confidentiality of information at rest and in transit as required to meet the target Security Level (SL-T).
Transit protection: All data transported via paramant is encrypted client-side before transmission using ML-KEM-768 (post-quantum key encapsulation per NIST FIPS 203) combined with ECDH X25519. Decryption requires the receiver’s private key, which never leaves the receiver’s device. The relay never holds a decryption key.
No data at rest: Paramant stores no payload on disk. Files reside in RAM only and are deleted upon first download (burn-on-read). The concept of “data at rest” is structurally eliminated for transit events. An attacker who gains access to the relay server finds no stored data.
Ciphertext padding: All transfers are padded to a fixed 5 MB block, preventing traffic analysis based on file size — relevant for SCADA environments where message patterns carry operational meaning.
SR 4.1 requires confidentiality at rest and in transit — paramant delivers post-quantum encryption in transit with no “at rest” state to protect.