Secure Infrastructure

Security for future-oriented infrastructures

The research group Secure Infrastructure at Fraunhofer AISEC conducts research on applied cryptography and the impact of artificial intelligence on secure infrastructures. The research focus lies on the Internet of Things, post-quantum security and anonymization networks. Furthermore we are pioneers in the field of post-quantum security for virtual private networks.

We collaborate with companies from the high-security industry and providers or operators of critical infrastructures.

Cybersecurity Learning Lab

The learning lab in Weiden is one of the few research facilities in the field of IT security in the northern Upper Palatinate and offers an extended IT security lab in modern premises directly in the eHouse at the campus of the East Bavarian Technical University Amberg-Weiden (OTH AW). The laboratory is specially designed for the analysis of IT systems in the context of pentests.

Furthermore, dedicated training courses in the field of IT security can be held at the location in the so-called cybersecurity learning lab: Training participants can put the training content into practice using various exercises in the 90 m² training area.

For further information please visit our German website.

Offerings

Our goal is to work closely with our customers and partners to systematically improve the ability to assess the security of systems and products to evaluate system reliability, design systems securely, and sustainably maintain security throughout the lifecycle.

Evaluate security     

  • Evaluation of security concepts and architectures
  • Accompanying Common Criteria evaluations
  • Penetration testing of IT components and networks

Design security

  • Investigation and design of secure network protocols
  • Security protocols for the Internet of Things
  • Post-quantum security in computer networks

Maintain security

  • Intrusion detection and intrusion prevention
  • Live testing of cryptographic methods

Expertise

Security analysis

The department Secure Infrastructure has extensive expertise in the field of security analysis. This applies both practically in the form of penetration tests for corporate networks and software products as well as conceptually in the form of semi-formal analyses. The latter include in particular the creation and verification of security concepts. This can be based on different security standards, which are relevant for security certifications, for example. Extensive expertise in supporting Common Criteria evaluations is also available.

Applied cryptography

In the area of applied cryptography, we have extensive expertise in the secure application of cryptographic methods. In particular, we are able to put novel post-quantum protocols into practice in order to meet relevant regulatory requirements of national security authorities.

 

Selected Projects

 

Center of post-quantum cryptography excellence

Fraunhofer AISEC is pooling its expertise in the future technology of post-quantum cryptography (PQC) via the Center of post-quantum cryptography excellence. Our goal as a neutral and manufacturer-independent center is to support companies and public research institutions in the switch to quantum-resistant cryptographic process.

 

Roadmap for Zero Trust in the Bavarian public authority network

On behalf of the Bavarian State Office for Information Security (LSI), Fraunhofer AISEC conducted a study on the implementation of a so-called Zero Trust architecture in the Bavarian government network. 

 

Cryptography Library Botan

In the "Cryptography Library Botan: Durable Security for IT Applications and Services" (KBLS), Fraunhofer AISEC is coordinating the development and implementation of reliable and user-friendly cryptographic methods that cannot be broken even by quantum computers. 

Innovation Center Weiden

The Innovation Center Weiden researches the use of Artificial Intelligence for securing infrastructures.

Publications

2024

  • Tobias J. Bauer, Andreas Aßmuth: »Securing Confidential Data For Distributed Software Development Teams: Encrypted Container File«. In: International Journal On Advances in Security, vol. 17, no. 1 and 2 (2024), pp. 11–28. arXiv: 2407.09142 [cs.CR].
  • Pitpimon Choorod, Tobias J. Bauer, Andreas Aßmuth: »Distinguishing Tor From Other Encrypted Network Traffic Through Character Analysis«. In: Proceedings of the 15th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2024), Venice, Italy (May 2024), pp. 8–12. arXiv: 2405.09412 [cs.CR].
  • Christian Näther, Daniel Herzinger, Stefan-Lukas Gazdag, Jan-Philipp Steghöfer, Simon Daum, Daniel Loebenberger: Migrating Software Systems towards Post-Quantum-Cryptography – A Systematic Literature Review. 2024. arXiv: 2404.12854 [cs.CR].