Studies
The following cases were publshed or instructed by the BSI:
Bild |
+title |
+date |
---|---|---|
![]() |
Analysis of Random Number Generation in Browsers The study initiated by the BSI on random number generation in web browsers describes and analyses the random number generators used by the Firefox, Chromium and Safari (assuming Safari uses the Corecrypto library) browsers for cryptographic applications. Among other things, good random numbers are a prerequisite for establishing secure connections on the Internet. |
07.05.2025 |
![]() |
Quantum Machine Learning The BSI has already comprehensively analysed the state of QML research and technology in two projects and examined it from the perspective of IT security. The content and results of both projects are presented below in ascending order of topicality. |
20.03.2025 |
![]() |
5G Risk Analysis Several studies on risks and threats in 5G mobile networks were conducted by BSI in cooperation with technical experts in mobile network security as part of the project "5G risk analysis". With these studies, the basis for the definition of critical components and requirements for regulation of 5G/6G networks is expanded and awareness for security in mobile networks is raised |
07.03.2025 |
![]() |
Security Evaluation of Hardware Design Synthesis |
06.11.2024 |
![]() |
A Study of Mechanisms for End-to-End Verifiable Online Voting |
25.10.2024 |
![]() |
Cyber Startup Landscape - Bay Area The past decade has led to considerable growth of the cybersecurity sector and, as a result, to a dynamic environment for startups. New trends, innovations and technologies in the area of cybersecurity and the corresponding key technologies will therefore have a significant impact on the future. For this reason, the Federal Office for Information Security (BSI) and the Agentur für Innovation in der Cybersicherheit GmbH “Innovation for Cybersecurity” (Cyberagentur) publish this Cyber Startup Landscape of the Bay Area to provide an overview of the most relevant startups, technologies, and trends in cybersecurity. |
16.09.2024 |
![]() |
MANO risk analysis in 5G The study aims to product-independently describe and analyze MANO so that specific certification requirements can be created based on the results of the study. |
24.05.2024 |
![]() |
Analysis of Hardware Manipulations in Distributed Manufacturing Processes IHP GmbH has authored a study on behalf of the BSI, which depicts possible leverage points in the production chain of complex IT systems that an attacker can exploit, e.g. the insertion of Hardware Trojans. |
15.05.2024 |
![]() |
Use of Artificial Intelligence in Medical Diagnostic and Prognosis Systems In project 540 "Use of Artificial Intelligence in Medical Diagnostic and Prognosis Systems", a prototypical development of test criteria and testing methods for AI methods in the field of ECG diagnostics was conducted. |
18.03.2024 |
![]() |
Laser Fault Injection Attack on the eXtended Merkle Signature Scheme Since the need for post-quantum cryptography emerged the interest in hash-based signatures (HBS) has significantly increased. Since their standardization especially stateful HBS like XMSS have been deployed in several products ranging from embedded devices up to servers. |
05.03.2024 |