Cryptography in Network Security

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: 15 February 2025 | Viewed by 3835

Special Issue Editors


E-Mail Website
Guest Editor
School of Computing, University of North Florida, Jacksonville, FL 32224, USA
Interests: computer security; energy-aware computing; algorithms
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, 100876, China
Interests: controller area networks; learning (artificial intelligence); security of data; vehicular ad hoc networks; Internet of Things; computer network security; convolutional neural nets; crack detection

Special Issue Information

Dear Colleagues,

Cryptography is the basic theory of network security and mainly provides security services such as confidentiality, integrity, and availability for information systems.

In actual cryptographic applications, common problems include key leaks, implementation loopholes in cryptographic algorithms and protocols, and privacy leaks. Particulrly in new environments such as the Internet of Things, the Industrial Internet, and the Internet of Vehicles, special research is needed to adapt the theory and technology of cryptography.

In this context, this  Special Issue on “Cryptography in Network Security” invites the submission of both original research articles and reviews. Research areas may include (but are not limited to) the following topics:

  • cryptographic algorithm design
  • applied cryptography
  • cryptographic protocol analysis
  • homomorphic cryptography
  • emerging cryptographic techniques
  • quantum cryptography
  • vulnerability mining and exploitation in cryptography applications
  • authentication and biometric security/privacy
  • blockchain security/privacy
  • Internet of Things, the Industrial Internet, and the Internet of Vehicles security/privacy
  • distributed security and consensus protocols
  • security/privacy of systems based on ML and AI

We look forward to receiving your contributions.

Dr. Swapnoneel Roy
Dr. Guosheng Xu
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptographic algorithm
  • applied cryptography
  • cryptographic protocol analysis
  • privacy

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

21 pages, 510 KiB  
Article
Differential–Linear Approximations of CHAM
by Dongyoung Roh
Electronics 2024, 13(16), 3141; https://doi.org/10.3390/electronics13163141 - 8 Aug 2024
Viewed by 740
Abstract
CHAM is a family of lightweight block ciphers designed for resource-constrained environments like IoT devices and embedded systems, which require low power consumption and high performance. Despite numerous cryptanalytic evaluations, the security of CHAM remains robust. Differential–linear cryptanalysis, a method that combines two [...] Read more.
CHAM is a family of lightweight block ciphers designed for resource-constrained environments like IoT devices and embedded systems, which require low power consumption and high performance. Despite numerous cryptanalytic evaluations, the security of CHAM remains robust. Differential–linear cryptanalysis, a method that combines two of the strongest attack methods on block ciphers—differential cryptanalysis and linear cryptanalysis—has been successfully applied to many block ciphers. This study introduces the first concrete differential–linear approximations of CHAM, marking a significant advancement in the cryptanalysis of this cipher family. Utilizing a Boolean satisfiability problem framework, we present a 46-round differential–linear approximation of CHAM-64/128 with a correlation of 231.08 and a 58-round approximation for CHAM-128/128 and CHAM-128/256 with correlations of 258.86 and 259.08, respectively. These findings significantly exceed the designers’ expectations for differential–linear approximations using CHAM. Furthermore, the 46-round differential–linear approximation of CHAM-64/128 is the best distinguisher of CHAM-64/128 to date in a single-key attack model. Notably, our findings do not threaten the security of CHAM but provide deeper insights into its cryptanalytic resistance. Full article
(This article belongs to the Special Issue Cryptography in Network Security)
Show Figures

Figure 1

15 pages, 364 KiB  
Article
Improving Data Utility in Privacy-Preserving Location Data Collection via Adaptive Grid Partitioning
by Jongwook Kim
Electronics 2024, 13(15), 3073; https://doi.org/10.3390/electronics13153073 - 3 Aug 2024
Viewed by 611
Abstract
The widespread availability of GPS-enabled devices and advances in positioning technologies have significantly facilitated collecting user location data, making it an invaluable asset across various industries. As a result, there is an increasing demand for the collection and sharing of these data. Given [...] Read more.
The widespread availability of GPS-enabled devices and advances in positioning technologies have significantly facilitated collecting user location data, making it an invaluable asset across various industries. As a result, there is an increasing demand for the collection and sharing of these data. Given the sensitive nature of user location information, considerable efforts have been made to ensure privacy, with differential privacy (DP)-based schemes emerging as the most preferred approach. However, these methods typically represent user locations on uniformly partitioned grids, which often do not accurately reflect the true distribution of users within a space. Therefore, in this paper, we introduce a novel method that adaptively adjusts the grid in real-time during data collection, thereby representing users on these dynamically partitioned grids to enhance the utility of the collected data. Specifically, our method directly captures user distribution during the data collection process, eliminating the need to rely on pre-existing user distribution data. Experimental results with real datasets show that the proposed scheme significantly enhances the utility of the collected location data compared to the existing method. Full article
(This article belongs to the Special Issue Cryptography in Network Security)
Show Figures

Figure 1

14 pages, 553 KiB  
Article
Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks
by Yijing Li, Ran Bi, Nan Jiang, Fengqiu Li, Mingsi Wang and Xiangping Jing
Electronics 2024, 13(12), 2372; https://doi.org/10.3390/electronics13122372 - 17 Jun 2024
Cited by 1 | Viewed by 867
Abstract
With the rapid development of wireless communication technology, positioning technology, and modern smart devices, Internet of Vehicles (IoVs) smart vehicles have brought great convenience to human production and life. Meanwhile, privacy and security issues are becoming extremely serious, with serious consequences if sensitive [...] Read more.
With the rapid development of wireless communication technology, positioning technology, and modern smart devices, Internet of Vehicles (IoVs) smart vehicles have brought great convenience to human production and life. Meanwhile, privacy and security issues are becoming extremely serious, with serious consequences if sensitive data such as vehicle location and trip patterns are leaked. This paper focuses on the demands for vehicular network security, especially privacy protection and existing privacy-protection techniques, including common cryptography methods and cryptography-based advanced technologies. At the same time, this paper also analyzes the advantages and challenges of these technologies in protecting privacy and network security in the Internet of Vehicles, such as the challenges of computational resource requirements and security efficiency in the implementation process, as well as the complexity of realizing effective privacy protection in the interactions among different entities. Finally, this paper envisions the development of privacy-preserving application scenarios and the prospects for crypotography-based privacy-preserving technologies. Full article
(This article belongs to the Special Issue Cryptography in Network Security)
Show Figures

Figure 1

20 pages, 991 KiB  
Article
A Drone-Assisted Anonymous Authentication and Key Agreement Protocol with Access Control for Accident Rescue in the Internet of Vehicles
by Jihu Zheng, Haixin Duan, Chenyu Wang, Qiang Cao, Guoai Xu and Rui Fang
Electronics 2024, 13(10), 1939; https://doi.org/10.3390/electronics13101939 - 15 May 2024
Cited by 1 | Viewed by 1090
Abstract
The drone-assisted Internet of Vehicles (DIoV) displays great potential in the punctual provision of rescue services without geographical limitations. To ensure data security in accident response and rescue services, authentication schemes with access control are employed. These schemes ensure that only specific rescue [...] Read more.
The drone-assisted Internet of Vehicles (DIoV) displays great potential in the punctual provision of rescue services without geographical limitations. To ensure data security in accident response and rescue services, authentication schemes with access control are employed. These schemes ensure that only specific rescue vehicle operators acting within a valid period can achieve mutual authentication from a designated processor, while access for mismatched, revoked, or expired users is denied. However, the current alternatives fail to ensure session key forward secrecy, entities’ mutual authentication, and user anonymity, thereby compromising users’ privacy and the security of communications. Moreover, executing too many time-consuming operations on vehicles’ resource-constrained devices inevitably degrades the performance of the authentication protocol. Balancing security and performance in the design of an authentication protocol with access control presents a significant challenge. To address this, a more efficient and robust authentication with access control has been designed. The proposed protocol ensures user anonymity through dynamic pseudonym allocation, achieves forward secrecy by excluding the long-term key from session key generation, and obtains mutual authentication by verifying the integrity of the messages exchanged. According to the security and performance analysis, it is demonstrated that the proposal is a robust, efficient, and cost-effective solution. In particular, the proposal can reduce the computational overhead by 66% compared to recent alternatives. Full article
(This article belongs to the Special Issue Cryptography in Network Security)
Show Figures

Figure 1

Back to TopTop