Secure Infrastructure

Security for future-oriented infrastructures

The research group Secure Infrastructure at Fraunhofer AISEC conducts research on applied cryptography and the impact of artificial intelligence on secure infrastructures. The research focus lies on the Internet of Things, post-quantum security and anonymization networks. Furthermore we are pioneers in the field of post-quantum security for virtual private networks.

We collaborate with companies from the high-security industry and providers or operators of critical infrastructures.

Cybersecurity Learning Lab

The learning lab in Weiden is one of the few research facilities in the field of IT security in the northern Upper Palatinate and offers an extended IT security lab in modern premises directly in the eHouse at the campus of the East Bavarian Technical University Amberg-Weiden (OTH AW). The laboratory is specially designed for the analysis of IT systems in the context of pentests.

Furthermore, dedicated training courses in the field of IT security can be held at the location in the so-called cybersecurity learning lab: Training participants can put the training content into practice using various exercises in the 90 m² training area.

For further information please visit our German website.


Our goal is to work closely with our customers and partners to systematically improve the ability to assess the security of systems and products to evaluate system reliability, design systems securely, and sustainably maintain security throughout the lifecycle.

Evaluate security     

  • Evaluation of security concepts and architectures
  • Accompanying Common Criteria evaluations
  • Penetration testing of IT components and networks

Design security

  • Investigation and design of secure network protocols
  • Security protocols for the Internet of Things
  • Post-quantum security in computer networks

Maintain security

  • Intrusion detection and intrusion prevention
  • Live testing of cryptographic methods


Security analysis

The department Secure Infrastructure has extensive expertise in the field of security analysis. This applies both practically in the form of penetration tests for corporate networks and software products as well as conceptually in the form of semi-formal analyses. The latter include in particular the creation and verification of security concepts. This can be based on different security standards, which are relevant for security certifications, for example. Extensive expertise in supporting Common Criteria evaluations is also available.

Applied cryptography

In the area of applied cryptography, we have extensive expertise in the secure application of cryptographic methods. In particular, we are able to put novel post-quantum protocols into practice in order to meet relevant regulatory requirements of national security authorities.


Selected Projects




The goal of the QuaSiModO project is to develop post-quantum secure VPN modules and operation modes, taking into account the latest international research results.

Innovation Center Weiden

The Innovation Center Weiden researches the use of Artificial Intelligence for securing infrastructures.


  • Tobias Hemmert, Mandred Lochter, Daniel Loebenberger, Marian Margraf, Stephanie Reinhardt, and Georg Sigl. “Quantencomputerresistente Kryptografie: Aktuelle Aktivitäten und Fragestellungen”. In: Deutschland. Digital. Sicher. 30 Jahre BSI. SecuMedia Verlag, 2021, pp. 367–381. ISBN: 978-3-922746-83-6.

  • Johannes vom Dorp, Joachim von zur Gathen, Daniel Loebenberger, Jan Lür, and Simon Schneider. “Comparative analysis of random generators”. In: Algorithmic Combinatorics – Enumerative Combi-natorics, Special Functions and Computer Algebra. Ed. by Veronika Pillwein and Carsten Schneider. Springer International Publishing, Dec. 2020, pp. 181–196. URL:
  • Joo Cho, Stefan-Lukas Gazdag, Alexander von Gernler, Helmut Grießer, Sophia Grundner-Culemann, Tobias Guggemos, Tobias Heider, and Daniel Loebenberger. “Towards Quantum-resistant Virtual Private Networks”. In: 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019. Ed. by Marcel Selhorst, Daniel Loebenberger, and Michael Nüsken. Gesellschaft für Informatik e.V. / FG KRYPTO, 2019. DOI:10.18420/cdm-2019-31-22. URL:
  • Tilo Fischer, Hendrik Linka, Michael Rademacher, Karl Jonas, and Daniel Loebenberger.  “Analyzingpower consumption of TLS ciphers on an ESP32”. In: 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019. Ed. by Franziskus Kiefer and Daniel Loebenberger. Gesellschaft für Informatik e.V. / FGKRYPTO, 2019. DOI:10.18420/cdm-2019-30-04. URL:
  • Stefan-Lukas Gazdag and Daniel Loebenberger. “Post-Quantum Software Updates: A case studyon Code Signing with Hash-based Signatures”. In: INFORMATIK 2019: Konferenzbeiträge der 49.Jahrestagung der Gesellschaft für Informatik. Ed. by Klaus David, Kurt Geihs, Martin Lange, andGerd Stumme. Vol. P-294. Lecture Notes in Informatics. Bonn: Köllen Druck+Verlag GmbH, 2019,pp. 459–472. ISBN: 978-3-88579-688-6. URL:

  • Tilo Fischer. “Testing Cryptographically Secure Pseudo Random Number Generators with Artificial Neural Networks”. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). TrustCom ’18. Newark, New Jersey: IEEE, 2018, pp. 1214–1223. DOI: 10.1109/TrustCom/BigDataSE.2018.00168.