Quantum-Powered Cryptanalysis: Fraunhofer AISEC bridges the gap between algorithm research and hands-on tooling
BayQS pioneers quantum variants of classical cryptoanalysis that cover complete block and stream ciphers. The focus lies on provable polynomial speed-ups, letting threat analysts explore cipher structures that remain opaque to classical hardware. MQV’s (Munich Quantum Valley) QACI toolkit turns these ideas into practice. As highlight, a modular Correlation Extraction Algorithm – augmented by Quantum Amplitude Amplification – extracts exploitable biases with far fewer oracle calls. Custom, reversible two’s-complement and comparator circuits replace depth-heavy SDK gates, while an Exclusive-Product-of-Sums oracle keeps the design GPU-friendly. All circuits are validated on Qiskit-Aer with full GPU acceleration, enabling large-scale simulations today and seamless migration to real quantum devices tomorrow. Together, BayQS and QACI deliver a coherent workflow that lets industry and government quantify quantum risks early and harden their products long before fault-tolerant machines arrive.
BayQS – Bavarian Competence Center for Quantum Security and Data Science
Center of Post-Quantum Cryptography excellence
Quantum computing advancements pose a threat to today’s IT security as a whole. This is because the established cryptographic processes can be cracked by quantum computers. Fraunhofer AISEC is pooling its expertise in the future technology of post-quantum cryptography (PQC) via the Center of Post-Quantum Cryptography excellence. Our goal as a neutral and manufacturer-independent center is to support companies and public research institutions in the switch to quantum-resistant cryptographic processes. To do so, we offer individual consultation and support for migrating to architecture with a quantum-secure design. Compatibility with existing solutions and crypto agility play a key role in this. Other services offered by the Center of PQC excellence include security analyses for PQC implementations as well as an information portal for post-quantum cryptography.
Selected research projects:
- KBLS: In the KBLS (BOTAN cryptographic library: long-lasting security for IT applications and services) project, Fraunhofer AISEC has coordinated the development and implementation of reliable, user-friendly cryptographic processes, which cannot be broken by quantum computers.
- FLOQI: The FLOQI (Full-lifecycle post-quantum PKI) project has developed a PKI that is resistant to quantum computers.
- QuaSiModO (German website): The QuaSiModO (Quantum-Secure VPN Modules and Operation Modes) project has developed quantum-secure virtual private networks (VPNs) at layers 2 and 3 of the TCP/IP reference model and has advanced the standardization of the network protocols required on an international scale.
- Aquorypt (German website): The Aquorypt project has investigated the application and practical implementation of cryptographic processes that are resistant to quantum computers.
Center of post-quantum cryptography excellence
PoQsiKom: Security chip enables acknowledgement of safety systems of machine tools via the Internet
Advances in digitalization require new encryption technologies for industrial processes, which are becoming increasingly connected across international borders. One example is the acknowledgement of safety systems of machine tools via the Internet. Fraunhofer AISEC, Technical University of Munich, Siemens AG, and high-tech company TRUMPF have teamed up in a project called PoQsiKom to develop a way to securely release the protected areas of machine tools remotely. The new concept is based on a versatile chip with crypto-agile quantum security technology that will also stand up to future threats.
Industry 4.0: Security chip enables acknowledgement of safety systems of machine tools via the Internet - Fraunhofer AISEC
Advanced Cryptographic Primitives for Security and Privacy
Whereas common cryptographic applications like public key encryption and digital signatures have found viable post-quantum replacements based on a variety of assumptions, decades of research on RSA and elliptic curves have brought forth several algorithms with special properties, enabling advanced use cases. For instance, key blinding signature schemes allow to derive pseudonyms for one’s digital identity, so it becomes possible to sign and publish documents without leaking one's signing history. However, such features often rely on structural assumptions, like homomorphisms, which are hard to find and often a cause for vulnerabilities in post-quantum signature replacements. Our research focuses on removing such structural assumptions, providing conservative post-quantum alternatives.
Non-Homomorphic Key Blinding from Symmetric Primitives - Cryptology ePrint Archive
Serious Game: Charlie and the Quantum Factory
What makes quantum computers different from traditional computers? What are qubits? When do we talk about superposition? And to what temperature must quantum computer chips be cooled, in order to perform calculations? These and many other questions are explored through entertaining puzzles and mini-games in the web-based serious game »Charlie and the Quantum Factory«, developed by the AISEC-Learning Lab for Cybersecurity.
Charlie and the Quantum factory - Fraunhofer AISEC
QuantWorld: The fascinating world of second-generation quantum technologies
The QuantWorld project is a gateway to the fascinating world of second-generation quantum technologies. The project’s mission is to make knowledge about quantum technologies accessible and relevant to people from all walks of life introducing citizens to the fields of medicine, banking, and mobility.
QuantWorld