Quantum Security and Cyber Resilience

Strategic Research Fields and Competence Areas

Bundled within the Centre for Applied and Integrated Security (CAIS), interdisciplinary team of experienced scientists and research engineers work passionately in solving real-world challenges and application-oriented excellence in research.  The competencies and research areas at CAIS centre are focused on Quantum Technology and Quantum Security related topics:

  • Quantum Cryptanalysis
  • Quantum Key Distribution (QKD)
  • Post Quantum Cryptography (PQC)
  • Secure and Trusted Quantum Systems
  • Quantum Resilience and Readiness

Once quantum technologies and applications become generally available and mature, there will be attacks and threats on a wider scale on quantum-enhanced and enabled systems with potential harm to the society and can lead to substantial socio-economic impact.  The early involvement of various stakeholders ensures that the implemented security measures can be used by everyone.

Our research draws on experience from numerous research and development projects: Quantum computer-resistant algorithms ensure future proof cryptographic systems. Modern cryptographic processes and protocols guarantee that all requirements regarding information security and data protection are implemented properly.

Quantum-Enhanced Cryptoanalysis

  • New algorithms and approaches for Quantum-enhanced Cryptoanalysis in the NISQ era
  • Combined Quantum-enhanced Side Channel Analysis

Quantum-Safe Communication Networks

  • Quantum Key Distribution Network Security 
  • Key Management, Application Integration, and Testbed Deployments
  • Quantum Security and Quantum Hacking, Evaluation and Hardening
  • Supporting Standardization, Deployment and Certification

Post Quantum Cryptography

  • Quantum-Resistant Algorithms
  • Ressource-efficient Hardware and Software
  • Vulneability, Security Evaluation and Investigation of Countermeasures 
  • Software Primitives and Library for High Assurance Applications

Secure Hardware and Trusted Systems

  • Risks and Attacks on Quantum Components and Quantum System Architectures
  • Security and Trust for Quantum-enhanced Systems: Hardware and Software Co-Design and Development
  • OpenRisc Architecture Design and Development in FPGA and ASICs

Quantum Resilience, Readiness & Preparedness

What is the Quantum Threat? What is Cryptoagility? And Why should You care?  

How Can Fraunhofer Help To Become Quantum Ready?

  • Identification of Opportunities and Risks for Quantum Technology Integration and Deployment
  • Hybrid QKD & PQC in Practice
  • Feasibility Studies and Applied R&D
  • Security Test and Evaluation
  • Support Standardization Efforts


Security and Resilience of Satellite Systems

  • Investigation of Satellite QKD System and Network Security
  • Vulnerability analysis and protection

Research and Competence Areas

Post-Quantum Cryptography

The focus of our research is centered around Post-Quantum Cryptography (PQC) design, development, security analysis of quantum computer resistant methods, investigations regarding the applicability and optimizations for devices with limited resources as well as the migration of existing systems. We are exploring the applicability and optimization of PQC on embedded devices with limited resources, as well as the challenges involved in migrating existing systems. 

We investigate the design and development of resource-efficient crypto accelerators in both hardware and software domains. The objective is to create building blocks for cryptographic solutions that can withstand attacks from powerful quantum computers, each addressing different ressource and security requirements and categorized into encryption, signature schemes, key exchange, and hashing algorithms, each addressing different security requirements.

The research encompasses various aspects such as loosely coupled and integrated architectures in OpenRISC hardware, security and sidechannel analysis of quantum computer-resistant methods, investigations into vulnerabilities, and the development of countermeasures. 

The research on PQC involves a comprehensive investigation of lattice-based, code-based, isogeny ECC, and hash-based PQC primitives, which are prominent categories within the field. These primitives offer unique mathematical foundations and cryptographic properties that make them potential candidates for secure post-quantum cryptographic systems. By studying and analyzing these primitives, researchers aim to understand their strengths, weaknesses, and performance characteristics, paving the way for the development of robust and efficient quantum resistant solutions. 

Quantum Key Distribution Networks

Quantum Communication has a great mid-term and long-term potential for value addition and is able to secure transactions, keep the transmission, protection and long-term storage of sensitive data and ensure the digital sovereignty of sensitive information. Significant progress has been made in Quantum Communication and Quantum Key Distribution (QKD) in both, terrestrial communication and space-based communication.

We work with a particular attention to the vulnerability surface and quantum attacks on QKD, as well as classic attacks that could arise on the cryptographic primitives, protocols, tamper protection of the entire systems. Evaluation of new attack methods and vulnerabilities will also help to harmonize and standardize security evaluation and assessment requirements for quantum technologies.

Hardware Security and Trusted Systems

Hardware security focuses on attacks on and protection measures in integrated circuits, microchips, as well as modules of several microchips on circuit boards. The main tasks are divided into the defense against attackers with physical access to their targets and the provision of a basic hardware security layer on which further protective mechanisms, e.g., for the protection of operating systems, can be built.

The focus is on security evaluation in the lab, on securing and integrating microcontrollers and secure elements, tampering protection, and on the reliable use of system-on-chips and FPGAs. In this context, research is conducted and published in areas of side-channel analysis of cryptographic implementations, fault attacks, hardware penetration testing, physical-unclonable functions (PUF), and the use of machine learning. The results extend the state of the art in evaluation and protection measures. This distinctive spectrum of expertise and the many years of experience, as well as the corresponding equipment landscape with tooling in the laboratory, allow complex systems to be examined for vulnerabilities and individual security solutions to be designed.

Secure and Trusted Quantum Systems

Like in classic systems, quantum technologies and its active usage are intertwined with security and resilience. This will raise many open technical and legal questions on availability, robustness, reliability and trust and its implications as well. To tackle these challenges, Fraunhofer works on building up capabilities in quantum research and development secure and trusted quantum systems.

Selected Solutions & Activities

Quantum Readiness

Are You Quantum Ready Yet?

Fraunhofer Singapore will start an industry survey on Cryptography and the impact of Quantum-Computing on organizational prepardness. 


Crypto library for long-lasting security


As part of the BSI project, an open-source, secure, clear, controllable and well-documented C++ cryptographic library was developed in the form of BOTAN, which is suitable for as many deployment scenarios as possible and can also be used in applications with increased security requirements. Fraunhofer integrates several post-quantum algorithms to the library.


Quantum-Safe Networking

Quantum-Safe IPsec-Module and VPN

  • Scrutinizing the use of quantum-safe algorithms in VPN and key exchange protocols such as IKEv2 for IPsec and MKA/PACE for MACsec.
  • An implementation of schemes in established VPN software suites.



National Quantum-Safe Network

The National Quantum-Safe Network (NQSN) establishes a nationwide platform and a field-deployed testbed for a systematic construction of quantum-safe communication technologies, by evaluating its security and demonstrating the integration of quantum-safe applications, best practices, and use cases.


Hybrid PKI


The objective of the full-lifecycle post-quantum PKI (FLOQI) project is to develop a PKI that is resistant to quantum computers. This needs to be compatible with current cryptographic processes. To this end, post-quantum processes are implemented on a variety of platforms, as well as being tested in three demonstrators.


Fraunhofer AISEC

Quantum-Safeness for Industry 4.0

In the project "Post-Quantum-Safe Communication for Industry 4.0 (PoQsiKom)", Fraunhofer AISEC, TUM, Siemens and TRUMPF are jointly developing a new type of hardware trust anchor for operating technology and edge devices.


Hardware Security and Side Channel Resistance


This research project is investigating the application and practical implementation of cryptographic processes that are resistant to quantum computers.


Testing, Evaluation, Hardening

Hardware Security and Side Channel Resistance

Our Security Lab offers a broad spectrum of hardware security analyses: from offensive security analysis of embedded systems to highly specialized attacks on security implementations.


Blog Article / 17.6.2023

A (somewhat) gentle introduction to lattice-based post-quantum cryptography

  • Read More (cybersecurity.blog.aisec.fraunhofer.de)


Post-Quantum Secure Boot

Quantum-safe boot protocol is fundamental to ensuring the integrity of the trusted computing base of a secure system.


White Paper

Sovereignity in Information Technology

Security, Safety, and Fair Market Access by Openess and Control of the Supply Chain

Our Services and Offers

We work closely with our customers and partners in order to systematically assess and improve the security of both, systems and products, to evaluate their reliability, to design them securely, and to sustainably ensure their security throughout the entire life cycle.

Evaluate security      

  • Evaluation of business an technology risks in accordance with a variety of assessment criteria as well as best practice standards
  • Quantum readiness checks and quantum risk audits for our customer and clients
  • Conducting threat and risk analyses of quantum systems and quantum-safe security communication services and solutions
  • Analysis of cryptographic methods in classic and quantum communication
  • Analysis and development of quantum-enabled technologies, like quantum random number generators, quantum key distribution (QKD) modules, quantum communication network infrastractures, security and trust of quantum and classical components

Design security 

  • Support regarding information security and data protection during development
  • Development of cryptographic-, IT security- and data protection concepts
  • Development of secure system architectures
  • Development of solutions regarding usability, data privacy and security
  • Secure software development
  • Inclusion of the latest technologies, e.g., hybrid QKD and PQC approaches
  • Quantum computer resistant cryptography, and cryptographic agility 

Maintain security   

  • Risk management and vulnerability management
  • Support in conducting security audits
  • Training in the areas of quantum communication technologies and post-quantum cryptography, quantum risk awareness.

Learn more about Fraunhofer Portfolio in Germany


Fraunhofer Singapore Meetup Group

Fraunhofer Singapore occasionally organizes and hosts Meetups and workshops with the local AI and cybersecuirty community. Join our community and get involved!


Follow Our Academic Publications and Scientific Articles

All scientific publications can be found in the Fraunhofer Publica database. We also publish occasionaly mainstream scientific articles on Medium.

Many of them can be viewed in full text as well as downloaded.

Cybersecurity made by Fraunhofer

Cybersecurity Training Lab

Find out more about our goals, recipe for success and the concept of the Lab with its cybersecurity trainings in our flyer.

Cybersecurity trends by Fraunhofer

"Sometimes people just aren’t aware of the problem"- Find out more about the trends in the field of cyber security in the following document. Join us on our way toward a secure digital future!  

IT security research projects

Fraunhofer researchers are working on tomorrow's security technologies. Find out more about the the hardware and software Fraunhofer specialists have created.

Cyberkicker - or beating computer viruses at the football table

How does football help with IT security awareness? Find out in this article of Research News.