DisCoBoard
An AI Dashboard Helping Youth Uncover Online Disinformation
Start: 11/2020
End: 10/2023
Currently employed cryptographical schemes that secure our everyday IT systems are probably unbreakable with current computer technology. This, however, no longer applies to quantum computers. Cleverly designed quantum computing algorithms can theoretically break these schemes. Therefore, it is crucial to develop new cryptographic schemes that may resist quantum computers.
The German banking industry is heavily reliant upon cryptography. An obvious question is therefore: What requirements does the application landscape of the German banking industry impose on cryptography and which PQC schemes meet these requirements? We attempt to answer this question while generalizing our findings for other industry branches.
We analyze vulnerable IT system processes and components in order to develop proper countermeasures and adaptations. Finally, we develop a migration concept with concrete steps and publish our results such that they can be used in current standardization projects.
In this research focus, the FZI investigates and conveys innovative concepts, methods for protecting IT systems, and legal framework conditions to enable secure digitalization.
Funding notice:
The QuantumLeap project is funded by the Federal Ministry for Economic Affairs and Climate Action (BMWK).
Project partners:
An AI Dashboard Helping Youth Uncover Online Disinformation
Research Projects Back to the overview AMAZING Automated Modelling, Analysis and State Estimation via Intelligent Network Algorithms and Graph Methods Start: 10.2024 End: 09.2027 The energy transition presents electricity grid…
The FZI develops ROS driver for Universal Robots
German-Israeli Research Initiative on Digital Democracy
Artificial Intelligence in Traffic Systems
Supercomputing Platform for Highly Automated Vehicles
Cybersecurity for SMEs
Data management repository for care-supporting AI applications
Innovation with Cybersecurity for SMEs in Baden-Württemberg
Hardening of embedded RISC-V software by means of code transformations