Special Issue on Cryptography and Information Security

Lip Yee Por

Jing Yang

Chin Soon Ku

Chin Soon Ku

2 and

Abdullah Ayub Khan

Abdullah Ayub Khan

Faculty of Computer Science & Information Technology, Universiti Malaya, Kuala Lumpur 50603, Malaysia

Department of Computer Science, Universiti Tunku Abdul Rahman, Kampar 31900, Malaysia

Department of Computer Science and Information Technology, Benazir Bhutto Shaheed University Lyari, Karachi 75660, Pakistan

Author to whom correspondence should be addressed. Appl. Sci. 2023, 13(10), 6042; https://doi.org/10.3390/app13106042 Submission received: 28 April 2023 / Accepted: 10 May 2023 / Published: 15 May 2023 (This article belongs to the Special Issue Cryptography and Information Security)

In today’s increasingly connected world, the demand for secure computing and data protection is soaring [1]. To address this urgent need, our Special Issue presents cutting-edge research, innovative insights, and breakthrough developments in the fields of cryptography, information security, and related ICT security challenges.

This all-encompassing Special Issue delves into a wide array of crucial topics to provide an unparalleled understanding of the current state and future possibilities of digital security. Our comprehensive coverage includes state-of-the-art encryption algorithms and techniques, advanced secure communication protocols, blockchain technology, authentication and verification processes, and emerging threats to cybersecurity. Furthermore, the issue sheds light on ground-breaking methods to bolster security within the Internet of Things (IoT), an area of mounting concern due to the rapid proliferation of connected devices.

One of the most significant topics covered in this issue is encryption, a critical component in securing digital communication and protecting sensitive information [2]. We delve into the latest developments in symmetric and asymmetric encryption techniques, showcasing novel algorithms designed to ensure the confidentiality, integrity, and authenticity of digital data. Additionally, we examine post-quantum cryptography, a vital area of research in the face of the impending arrival of quantum computers.

Another vital aspect of our Special Issue is secure communication protocols. As cyber threats continue to evolve, we explore advances in network security, transport layer security, and end-to-end encryption. We also examine the challenges and opportunities presented by secure messaging applications and decentralized systems, such as blockchain technology.

Blockchain technology is transforming industries by enabling secure, transparent, and decentralized data storage and processing [3,4]. This Special Issue offers an in-depth analysis of cutting-edge blockchain applications, including smart contracts, decentralized finance, and digital identity management. We also investigate the potential of blockchain technology to enhance privacy and security in IoT environments.

Authentication and verification are fundamental components of digital security [3,5]. We delve into the latest advances in multi-factor authentication, biometrics, and digital signatures, highlighting how these technologies can be integrated to provide robust security solutions. Furthermore, we explore innovative approaches to user authentication, such as continuous and context-aware authentication methods that leverage machine learning and artificial intelligence.

Emerging threats to cybersecurity are a constant concern in the digital age [6]. Our Special Issue addresses this critical topic by examining new attack vectors, advanced persistent threats, and zero-day vulnerabilities. We also discuss the role of threat intelligence, vulnerability assessment, and incident response in detecting and mitigating cyber threats.

In this Special Issue, we also investigate the transformative potential of trailblazing technologies, such as ChatGPT, to revolutionize ICT technology. ChatGPT, an impressive large language model, can generate natural language responses and interact with humans in a conversational manner. This extraordinary technology is poised to reshape numerous telecommunications applications, encompassing chatbots, virtual assistants, and customer service automation.

Additionally, we eagerly welcome papers related to unexplored aspects of ICT security, providing a vital resource for professionals, researchers, and enthusiasts eager to navigate the intricate landscape of digital security. Our Special Issue also highlights the importance of interdisciplinary collaboration, bringing together experts from fields such as computer science, cryptography, engineering, and the social sciences to address the multi-faceted challenges of information security.

Embark on this exciting journey with us as we unveil this Special Issue, offering a comprehensive and insightful overview of the latest breakthroughs in cryptography and information security. Together, let us foster an informed, engaged community of experts and enthusiasts, ready to confront the ever-evolving world of information security and seize the abundant challenges and opportunities that await.

In conclusion, this ground-breaking Special Issue on “Cryptography and Information Security” seeks to empower readers by providing an unparalleled exploration of the digital security landscape. We aim to inspire collaboration and innovation among professionals, researchers, and enthusiasts from various fields, fostering a secure and resilient digital future for all.

Acknowledgments

Thank you to all of the authors and peer reviewers who contributed to the Special Issue on “Cryptography and Information Security”.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhang, X.; Shan, C.; Zou, Y. Multi-party Secure Comparison of Strings Based on Outsourced Computation. In Proceedings of the International Conference on Machine Learning for Cyber Security, Guangzhou, China, 2–4 December 2022. [Google Scholar] [CrossRef]
  2. Alexan, W.; Chen, Y.-L.; Por, L.Y.; Gabr, M. Hyperchaotic Maps and the Single Neuron Model: A Novel Framework for Chaos-Based Image Encryption. Symmetry 2023, 15 , 1081. [Google Scholar] [CrossRef]
  3. Wagan, A.A.; Khan, A.A.; Chen, Y.-L.; Yee, P.L.; Yang, J.; Laghari, A.A. Artificial Intelligence-Enabled Game-Based Learning and Quality of Experience: A Novel and Secure Framework (B-AIQoE). Sustainability 2023, 15 , 5362. [Google Scholar] [CrossRef]
  4. Meisami, S.; Meisami, S.; Yousefi, M.; Aref, M.R. Combining Blockchain and IOT for Decentralized Healthcare Data Management. Int. J. Cryptogr. Inf. Secur. 2023, 13 , 35–50. [Google Scholar] [CrossRef]
  5. Binbeshr, F.; Por, L.Y.; Kiah, M.L.M.; Zaidan, A.A.; Imam, M. Secure PIN-Entry Method Using One-Time PIN (OTP). IEEE Access 2023, 11 , 18121–18133. [Google Scholar] [CrossRef]
  6. Oruj, Z. Cyber Security: Contemporary Cyber Threats and National Strategies. Distance Educ. Ukr. Innov. Norm.-Leg. Pedagog. Asp. 2023, 1 , 100–116. [Google Scholar] [CrossRef]

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.


© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).

Share and Cite

MDPI and ACS Style

Por, L.Y.; Yang, J.; Ku, C.S.; Khan, A.A. Special Issue on Cryptography and Information Security. Appl. Sci. 2023, 13, 6042. https://doi.org/10.3390/app13106042

AMA Style

Por LY, Yang J, Ku CS, Khan AA. Special Issue on Cryptography and Information Security. Applied Sciences. 2023; 13(10):6042. https://doi.org/10.3390/app13106042

Chicago/Turabian Style

Por, Lip Yee, Jing Yang, Chin Soon Ku, and Abdullah Ayub Khan. 2023. "Special Issue on Cryptography and Information Security" Applied Sciences 13, no. 10: 6042. https://doi.org/10.3390/app13106042

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.