Applications of Cryptography Theory in Network Security

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "Mathematics and Computer Science".

Deadline for manuscript submissions: 28 February 2025 | Viewed by 671

Special Issue Editors


E-Mail Website
Guest Editor
Faculty of Science and Technology, Isabel I University, 09003 Burgos, Spain
Interests: cryptology; computer systems cybersecurity; systems and network security; cryptography; IoT security; randomness in cryptography
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Faculty of Science and Technology, Isabel I University, 09003 Burgos, Spain
Interests: machine learning; cryptography; evolutionary algorithms; computer systems cybersecurity; intelligent systems and Internet of Things

Special Issue Information

Dear Colleagues,

Cryptography plays a essential role in ensuring the security of networks by providing various mechanisms to protect data confidentiality, integrity, authentication, and non-repudiation. The persistently increasing tendency of ever-more-sophisticated cyberattacks and global cyberterrorism makes it critical for any organization and nation to protect its networks and critical infrastructures. Cryptographic protocols provide the necessary tools to address various security concerns and establish trust in networked environments.

This Special Issue aims to explore recent advances in the use of cryptography in network security protocols. It includes the use of new cryptographic algorithms resistant to quantum computing and the necessity of implementing crypto-agility to keep these protocols secure.

Specific topics of interest include, but are not limited to, the following:

  • Cryptographic secure protocols.
  • Quantum-resistant cryptographic techniques.
  • Crypto-agility in network security.
  • Communication technology and protocol security.
  • Authentication protocols.
  • Key distribution and management.
  • Real-time cryptography applications.
  • Cryptography and cybersecurity.
  • Industrial network security.
  • Security and privacy for cloud and edge computing.
  • Machine learning and deep learning application to cybersecurity.

We look forward to receiving your contributions.

Dr. Amalia Beatriz Orúe López
Dr. Víctor Martínez-Martínez
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptographic secure protocols
  • quantum resistant cryptographic techniques
  • crypto-agility in network security
  • communication technology and protocol security
  • authentication protocols
  • key distribution and management
  • real-time cryptography applications
  • cryptography and cybersecurity
  • industrial network security
  • security and privacy for cloud and edge computing
  • machine learning and deep learning application to cybersecurity

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

21 pages, 1523 KiB  
Article
A Certificate-Less Distributed Key Management Scheme for Space Networks
by Changyuan Luo and Ling Sun
Mathematics 2024, 12(19), 3126; https://doi.org/10.3390/math12193126 - 6 Oct 2024
Viewed by 465
Abstract
The specificity and complexity of space networks render the traditional key management mechanism no longer applicable. The certificate-less-based distributed spatial network key management scheme proposed in this paper combines the characteristics of space networks, solving the problems regarding the difficulty of implementing centralized [...] Read more.
The specificity and complexity of space networks render the traditional key management mechanism no longer applicable. The certificate-less-based distributed spatial network key management scheme proposed in this paper combines the characteristics of space networks, solving the problems regarding the difficulty of implementing centralized key management in space networks and the excessive overhead required for maintaining public key certificates by constructing a distributed key generation center and establishing strategies such as private key updates, master key component updates, and session key negotiation. This method also avoids the key escrow problem inherent in existing identity-based key management schemes. This scheme provides the DPKG construction method for space networks; designs the update strategy for the DPKG node’s master key sharing, providing a specific update algorithm; introduces the batch private key update mechanism; and uses the mapping function to evenly distribute the node’s update requests throughout the update time period, avoiding the problem of overly concentrated update requests. After analysis and simulation verification, it was proven that the scheme can meet the necessary security requirements, offering good stability and scalability. Full article
(This article belongs to the Special Issue Applications of Cryptography Theory in Network Security)
Show Figures

Figure 1

Back to TopTop