Skip to main content

Cybersecurity and Authentication (CA)

Development of OrganoBait synthetic bait, the NSF-Supported projected from Kepley BioSystems to provide an ocean-restorative alternative bait product

Technology topic

Cybersecurity and Authentication (CA)

The Cybersecurity and Authentication topic focuses on innovations related to the security and integrity of data and data processing and the authentication of people and devices. These subtopic areas are meant to serve as examples; all proposals with technical innovation and significant commercial potential are welcome, regardless of the specific area of focus of the project.

Sub-Topics

CA1. Computation on Encrypted Data
CA2. Cryptography, including Post-quantum Cryptography
CA3. Data Privacy and Integrity
CA4. Device Authentication
CA5. Encryption, including Homomorphic Encryption
CA6. Network and Device Security
CA7. Personal Authentication
CA8. Secure and Trusted Computing
CA9. Secure Machine-to-Machine Communication
CA10. Security of Cloud and High Performance Computing (HPC) Platforms
CA11. Other Cybersecurity and Authentication Technologies





Application process for Cybersecurity and Authentication (CA) funding

Eligibility for Cybersecurity and Authentication (CA) funding +
  • Your company must be a small business (fewer than 500 employees) located in the United States.
  • At least 50% of your company’s equity must be owned by U.S. citizens or permanent residents. NSF does not fund companies that are majority-owned by multiple venture capital firms, private equity firms, or hedge funds, to participate in SBIR and STTR.
  • All funded work, including work done by consultants and contractors, needs to take place in the United States.
  • The project’s principal investigator (tech lead) must be legally employed at least 20 hours a week by the company seeking funding. The principal investigator doesn’t need any advanced degrees.
  • The principal investigator needs to commit to at least one month (173 hours) of work on a funded project per six months of project duration.

Evaluation Criteria: What We Look for When Evaluating Cybersecurity and Authentication (CA) proposals +

Take our project assessment to see if your work might be a good fit for NSF funding.

Return to all topics

More featured companies