How can quantum computers be designed as mobile applications to serve defense with high performance? What standards need to be established in neural human-machine interaction so as not to jeopardize the integrity of the brain? And how can critical infrastructures be automatically protected against cyberattacks?
Start-ups, companies and research institutions are getting to the bottom of these and many other questions on our behalf. With the aim of providing groundbreaking answers that will determine Germany’s cyber security in ten to 15 years’ time. And thus the internal and external security of our country.
Filter the programs:
Side-Channel Resistant Post-Quantum Cryptology (SCA4PQC)
- Focus: Key technologies
- Status: Planned Program
Virtual information and partnering event on November 27, 2024, 2-4 p.m. Please register by November 20 using this form.Deadline for submission of presentation slides is November 25, 2024. The research program Side-Channel Analysis for Post-Quantum Cryptology (SCA4PQC) investigates countermeasures to side-channel attacks on asymmetric, cryptographic post-quantum methods. The aim is to (further) develop cryptosystems that […]
Forensic Digital Copies (FD)
- Focus: Secure Society
- Status: Planned Program
Background Until now, forensically relevant data has been generated in heterogeneous formats that are difficult to merge. As a result, it is only possible to compare individual pieces of information, e.g. time stamps or location data, with a great deal of additional effort. The calculation of new information, such as gait patterns, also requires heterogeneous […]
Holistic Evaluation of Generative Foundation Models in a Security Context (HEGEMON)
- Focus: Key technologies
- Status: Planned Program
Background Generative AI applications such as ChatGPT or Midjourney are currently attracting a great deal of attention. These models can be used in a wide range of application areas without any prior technical knowledge due to their ability to generate complex and multimodal outputs (e.g. text, image, audio, video) based on free inputs (prompts). The […]
Side-Channel Attacks with Quantum Sensing (SCA-QS)
- Focus: Key technologies
- Status: Project phase
Background Side-channel attacks (SCA) are generally attacks to extract otherwise hidden information, properties of program routines or reveal the physical implementation of cryptographic systems. Information such as passwords, encryption keys or other sensitive data on electronic chips can be uncovered by analyzing physical characteristics of the system such as power consumption, electromagnetic emissions or the […]
Creation of an overview and feasibility study for the Encrypted Computing Compass
- Focus: Secure Society
- Status: Planned Program
Here is a link in the text or teaser text, which could also be omitted if necessary. Maecenas tempus, tellus eget condimentum rhoncus sem quam semper libero, sit amet adipiscing sem neque sed ipsum. Nam quam nunc, blanditvel, luctus pulvinar, hendrerit id. Maecenas nec odio et ante tincidunt tempus. Donec vitae sapien ut libero.
Autonomous Intelligent Systems in a Swarm (HAL2025 ideas competition)
- Focus: Key technologies
- Status: Project phase
We are looking for ideas for the coming future From drones in the air to unmanned robotic systems on the ground – key technologies in this area will be highly relevant for Germany’s internal and external security in the future. That is why we were looking for disruptive ideas on the topic of “Autonomous Intelligent […]
Audio Forensics (AuFo)
- Focus: Secure Society
- Status: Planned Program
Background The transcription of linguistic data and the identification of speakers have been the subject of some research activity in the analysis of audio data. However, the evaluation of meta-information that can be extracted from acoustic signals in addition to spoken language is still a largely unexplored field. In particular, it is not currently known […]
Future Alternative Messaging and Data Transmission in Difficult Conditions – Faraday’s Cage (ZANDER-F)
- Focus: Secure systems
- Status: Planned Program
Background The ZANDER program addresses the critical need to enable communication and imaging in environments where conventional methods fail. A key scenario is communication within teams on a container ship, where the massive steel structure hinders signal transmission. Equally important is imaging for underground structures such as tunnels, where the layers of earth make visual […]
TEST4 Framework for cybersecurity in BCI applications
- Focus: Secure Society
- Status: Planned Program
TEST3 Framework for cybersecurity in BCI applications
- Focus: Secure Society
- Status: Planned Program
TEST2 Framework for cybersecurity in BCI applications
- Focus: Secure systems
- Status: Planned Program
TEST1 Framework for cybersecurity in BCI applications
- Focus: Secure systems
- Status: Finalised
Framework for cybersecurity in BCI applications
- Focus: Key technologies
- Status: Planned Program
Safe neural human-machine interaction
- Focus: Secure Society
Harm Caused by Cybercrime (SCK)
- Focus: Secure Society
- Status: Project phase
Background The increasing connectivity of society offers many advantages, but this also increases the risk of being affected by cybercrime. Despite this rising threat, it is currently only possible to estimate the extent of the harm caused by cybercrime, as there is no model that allows for a holistic measurement of both material and non-material […]
Alternative Computing Architectures (ARA)
- Focus: Secure systems
- Status: Project phase
Background Alternative computing architectures refer to computing architectures that go beyond the current architecture of binary logic on semiconductor chips. This includes logical models such as analogue computing, ternary computing, symbolic computing or reservoir computing. It also includes physical implementations such as optical computing, DNA computing, physarum computing (mushrooms), neuromorphic computing or orgonoid intelligence. Quantum […]
Critical Infrastructure Protection (HSK)
- Focus: Secure systems
- Status: Project phase
Existential Risks from Cyber and Information Space – High Security in Security-Critical and Defense-Relevant Scenarios (HSK) Background IT infrastructures are of critical importance to society today. The currently discussed draft of the new KRITIS umbrella law emphasizes the relevance of critical infrastructures in cyber and information space. Targeted attacks on these structures pose a potential […]
Digital Authentication Using Novel Biometric Methods (AuBi)
- Focus: Secure Society
- Status: Project phase
Background Digital identities are indispensable: whether for online banking or for digital federal applications. Secure authentication is also necessary to make various types of applications securely usable for the user. In this call for proposals, three novel forms of biometric authentication are to be researched and the requirements for their encryption developed. Zielstellung Biometrics This […]
Encrypted Computing – Analysis & Processing of Encrypted Data (EC2)
- Focus: Key technologies
- Status: Finalised
Background Established cryptographic procedures enable protection against unauthorised access to sensitive data during communication with other parties (data in transit) and during the storage of this data (data at rest). However, it is not possible to process data directly in an encrypted state using conventional methods. This is contrasted by newer cryptographic concepts such as […]
Ecosystem Formally Verifiable IT – Provable Cybersecurity (EVIT)
- Focus: Secure systems
- Status: Project phase
Background As IT systems become increasingly complex, they also become more vulnerable to security-critical errors. Many of the most dangerous vulnerabilities in IT systems stem from a few fundamental issues. Conventional programming and testing methods can help avoid and identify many errors in hardware and software, but they are not foolproof. This is where formal […]
Forensics of Intelligent Systems (FIS)
- Focus: Secure Society
- Status: Project phase
Background IT forensics describes the securing and analyzing of criminally relevant data from IT systems using scientific methods. Strictly methodical data analysis is used to prove facts in court. Digital forensics also plays a decisive role in the application context of artificial intelligence, as AI systems are often used in companies as well as in […]
Brain-Computer Interfaces (BCI): Safe Neural Human-Machine Interaction
- Focus: Secure Society
- Status: Project phase
Background The program “Safe Neural Human-Machine Interaction” takes brain-computer interfaces (BCIs) to a new level of safety. BCIs are revolutionary technologies that make it possible to read electrical signals from the brain and use them to control external devices. For example, paraplegics can learn to control a robotic arm with their thoughts. However, many neurotechnologies […]
Robust and Secure Machine Learning for Security and Defense-Relevant Systems (RSML)
- Focus: Key technologies
- Status: Project phase
Background Neural artificial intelligence algorithms (e.g. deep learning) are increasingly used in applications by internal and external security organisations, for example in the context of drone-based reconnaissance, disinformation detection and tactical situational awareness applications. At the same time, there is a growing awareness of specific vulnerabilities that are specific to machine learning (ML) and emerge […]
Mobile Quantum Computer – Quantum Processors for Mobile Use in Defense and Security Applications
- Focus: Key technologies
- Status: Project phase
Background Quantum computers are expected to revolutionize computing in the foreseeable future, as they could solve many problems faster than a conventional computer can. This is made possible by quantum mechanical properties and effects, e.g. entanglement and interference. This results in enormous application potential, from machine learning to simulations of very complex systems. However, many […]
Future Cybercrime (ZCK)
- Focus: Secure Society
- Status: Project phase
A country’s cultural and structural conditions can influence the development of crime, and cybercrime is no exception. These include, for example, cyber hygiene, victimization, fear of cybercrime and the acceptance of new technologies. Constant technological change precipitates a dynamic development of crime, however stable factors also need to be identified. Future Cybercrime I(Pattern Recognition and […]