Next Article in Journal
Research on a Class of Set-Valued Vector Equilibrium Problems and a Class of Mixed Variational Problems
Previous Article in Journal
Modified Chi-Squared Goodness-of-Fit Tests for Continuous Right-Skewed Response Generalized Linear Models
Previous Article in Special Issue
Variable-Step Semi-Implicit Solver with Adjustable Symmetry and Its Application for Chaos-Based Communication
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Editorial

Advances in Mathematical Cryptography and Information Security Toward Industry 5.0

by
Cheng-Chi Lee
1,2,*,
Dinh-Thuan Do
3 and
Agbotiname Lucky Imoize
4,*
1
Department of Library and Information Science, Fu Jen Catholic University, New Taipei City 242062, Taiwan
2
Department of Computer Science and Information Engineering, Asia University, Taichung 411743, Taiwan
3
Brenton School of Engineering, University of Mount Union, Alliance, OH 44601-3993, USA
4
Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka, Lagos 100213, Nigeria
*
Authors to whom correspondence should be addressed.
Mathematics 2025, 13(16), 2660; https://doi.org/10.3390/math13162660
Submission received: 29 July 2025 / Accepted: 15 August 2025 / Published: 19 August 2025

1. Introduction

Industry 5.0 builds on the success of Industry 4.0, envisioning human-centricity, sustainability, and resilience in manufacturing [1,2,3]. Modern industrial systems comprise complex networks and systems that integrate information technology, e.g., massive Internet of Things (IoT) devices, and interconnected industrial processes, which require robust security frameworks to ensure the security and privacy of sensitive user data [4]. As industrial systems architecture grows, the security landscape becomes more complex and the need to protect security-critical systems and infrastructure from unauthorized access becomes imperative. However, due to the proliferation of dense IoT devices operating on open wireless channels, designing a secure user authentication scheme in such a complex environment to achieve the desired forward secrecy poses several challenges that must be proactively addressed. Existing security authentication schemes do not adequately address the prevailing security issues in complex industrial systems, particularly considering the vast number of resource-limited sensor nodes that play active roles in such dynamic systems [5]. Additionally, traditional security architectures have not provided the desired forward secrecy, partly due to the enormous overhead costs and significant computational complexity.
Sensitive user data of all parties in the information security ecosystem need to be adequately secured from a multitude of sophisticated adversaries that proliferate cyberspace and industrial settings [6]. Consequently, it becomes expedient to authenticate and secure sensitive user information that is transmitted via these sensor nodes from potential intruders [7,8]. To achieve this objective, suitable authentication protocols and session keys are necessary to grant access only to authorized users of the system. In recent times, mathematical cryptography has been exploited to provide robust security authentication for complex systems, including industrial and manufacturing systems in Industry 5.0. Effectively, cryptography relies on mathematics and logic to design strong and robust security schemes. Modern cryptography and information security emphasize the mathematics behind the theory of these cryptosystems; their evolving integration in practical designs to provide adequate and provable security to authorized users of these systems is gaining widespread popularity in the research community.
This Special Issue presents original contributions focusing on the design and development of advanced mathematical cryptographic schemes for information security in relation to Industry 5.0. The following topics are covered: variable-step semi-implicit solvers with adjustable symmetry and their application in chaos-based communication, a blockchain-assisted secure and lightweight authentication scheme for multi-server internet of drones environments, an improved network intrusion detection technique using the feature engineering approach with boosting classifiers, a secure authentication scheme with local differential privacy in edge intelligence-enabled vehicular ad hoc networks, covert communication for dual images with two-tier bits flipping, design of a secure and privacy-preserving data sharing scheme based on key aggregation and private set intersection in a medical information system, mathematical model of the process of data transmission over the radio channel of cyber-physical systems, a reliable and privacy-preserving vehicular energy trading scheme using decentralized identifiers, embedding secret data in a vector quantization codebook using a novel thresholding scheme, and efficient parallel secure outsourcing of modular exponentiation to the cloud for IoT applications. This Special Issue features important techniques that can drive interesting results along with defined cutting-edge research, leading to the development of advanced mathematical cryptography and information security systems in support of the envisioned Industry 5.0.

2. Contributions

This Special Issue presents ten research papers from leading authors on this trending research topic. The contributions are outlined as follows.
First, Rybin et al. proposed a variable-step semi-implicit solver with adjustable symmetry and its application for chaos-based communication (Contribution 1). The work focuses on a variable-step, modified composite diagonal version of the existing solver, featuring a stable and simple Hairer step size controller. In particular, the authors demonstrated that the proposed method alters the dynamics of the solution by adjusting the symmetry coefficient, thereby fine-tuning the dynamics of the obtained discrete model with no influence from the appropriate step size. Furthermore, the authors constructed a direct chaotic communication system based on the Sprott Case S chaotic oscillator, demonstrating high values in the most prominent Lyapunov exponent. For the modulation parameter, the tolerance parameter of the step size controller is used to insert a message into the chaotic time series. In general, the main results show that the proposed modulation scheme exhibits competitive robustness to noise and return map attacks compared to modulation methods based on fixed-step solvers.
Secondly, Ju et al. (Contribution 2) studied a blockchain-assisted, secure, and lightweight authentication scheme for multi-server Internet of drones environments. The protocol provides robust security measures against threats and achieves a low computational and communication overhead. For validation processes, formal methods such as the Real-Or-Random (RoR) model and Burrow–Abadi–Needham (BAN) logic were employed. In comparison with existing security schemes, the proposed protocol demonstrates high levels of efficiency and robustness, making it suitable for resource-limited IoT applications.
The work by Rai et al. (Contribution 3) presented a network-assisted intrusion detection system that employs feature engineering and machine learning models. A transmission control protocol/internet protocol (TCP/IP)-based dataset from various protocols was used in the study. Several preprocessing techniques were employed to improve the quality of the dataset. Based on the preprocessed dataset, models were developed and their prediction accuracy was assessed using feature engineering. Overall, the trained model demonstrates robust effectiveness and accuracy in detecting network intrusions, positioning it well for real-time use.
Kwon et al. (Contribution 4) introduced an authentication scheme for privacy preservation in edge intelligence-enabled vehicular ad hoc networks. Specifically, the scheme utilizes fuzzy extractors, elliptic curve cryptography, and physical unclonable function technology to create a secure communication channel. Additionally, local differential privacy and symmetric key encryption were used to ensure the confidentiality of the data upload process. Security verification and validation processes were carried out and the computation and communication efficiency of the proposed scheme were evaluated relative to the existing schemes, leveraging the multi-precision integer and rational arithmetic cryptographic library software development kit.
Contribution 5 focuses on covert communication for dual images with two-tier bit flipping. Specifically, Xu et al. propose an innovative one-to-two data hiding scheme that employs a two-tier bit-flipping strategy to embed sensitive data in dual images. This produces two stego images, which are transmitted to two distinct recipients and can only be extracted when both recipients maintain mutual trust, thereby ensuring the security of the stego images. The results show that the proposed scheme produces a high visual quality and achieves an excellent data payload compared to the preliminary schemes.
The work of Oh et al. considered a secure and privacy-preserving data sharing scheme, guaranteeing data confidentiality and privacy (Contribution 6). Key aggregate encryption and private set intersection techniques were employed, enabling secure data sharing and offering the protection of sensitive user data. Additionally, informal and formal security analyses, leveraging the Burrow–Abadi–Needham logic and Scyther, were conducted to show the scheme’s resilience against potential adversarial attacks. Furthermore, the execution time for cryptographic operations was implemented using a multi-precision integer and a rational arithmetic cryptographic library, followed by a comparative analysis with related schemes.
Makhmudov et al. presented a modified mathematical model for evaluating the quality of mobile radio channels in the context of cyber-physical systems (Contribution 7). By conceptualizing the radio channel as a stochastic network, the authors were able to derive useful metrics, including the equivalent function, mathematical expectation, variance, and the time distribution function of the implemented processes. This is achieved by employing the Gamma distribution for the initial distribution functions of random variables, thereby achieving analytical precision.
Kim et al. recommended a reliable and privacy-preserving vehicular energy trading scheme that uses a decentralized identifier technology (Contribution 8). In the design, only users who complete successful energy trading are authorized to manage complete transaction information. The work employs both informal and formal security analyses to verify the proposed scheme and demonstrate its performance compared to its counterparts.
In Contribution 9, Lin et al. examined a data hiding scheme for vector quantization (VQ) codebooks, enabling a sender to perform an Exclusive OR (XOR) operation on most of the pixel values in a codebook and then apply a threshold to control data embedding. During this process, the generated auxiliary information is embedded alongside secret data in the index reordering phase. In this case, the recipient can extract the data and reconstruct the VQ-compressed image using the reverse process once the stego codebook and the reordered index table are received. The proposed scheme shows a superior embedding capacity when compared to state-of-the-art schemes.
Lastly, Rath et al. (Contribution 10) presented an efficient parallel secure outsourcing of modular exponentiation to the cloud for IoT applications. The work proposes a robust solution that strengthens the Rivest–Shamir–Adleman (RSA) algorithm and mitigates the flaws identified in existing schemes. The results indicate that the scheme is resilient against existing lattice-based attacks and provides a more secure and efficient method for IoT devices to utilize the capabilities of third-party servers while ensuring data integrity and confidentiality.

3. Conclusions and Future Scope

This Special Issue presents recent advances in the design and development of advanced mathematical cryptographic schemes for information security in relation to Industry 5.0. Specifically, the Special Issue features original contributions from academics and industry experts tailored to addressing critical security issues envisioned in Industry 5.0. These contributions will facilitate innovative research in mathematical cryptography and information security, aiming to enhance the security of Industry 5.0 systems and applications for a smart society.

Funding

This work received no external funding.

Acknowledgments

We would like to thank all the authors and anonymous reviewers for their valuable collaboration and contributions to this Special Issue.

Conflicts of Interest

The authors declare no conflicts of interest.

List of Contributions

  • Rybin, V.; Babkin, I.; Bobrova, Y.; Galchenko, M.; Mikhailov, A.; Karimov, T. Variable-Step Semi-Implicit Solver with Adjustable Symmetry and Its Application for Chaos-Based Communication. Mathematics 2025, 13, 1229. https://doi.org/10.3390/math13081229.
  • Ju, S.; Park, H.; Son, S.; Kim, H.; Park, Y.; Park, Y. Blockchain-Assisted Secure and Lightweight Authentication Scheme for Multi-Server Internet of Drones Environments. Mathematics 2024, 12, 3965. https://doi.org/10.3390/math12243965.
  • Rai, H.M.; Yoo, J.; Agarwal, S. The Improved Network Intrusion Detection Techniques Using the Feature Engineering Approach with Boosting Classifiers. Mathematics 2024, 12, 3909. https://doi.org/10.3390/math12243909.
  • Kwon, D.; Son, S.; Park, K.; Park, Y. A Secure Authentication Scheme with Local Differential Privacy in Edge Intelligence-Enabled VANET. Mathematics 2024, 12, 2383. https://doi.org/10.3390/math12152383.
  • Xu, S.; Liu, J.-C.; Chang, C.-C.; Chang, C.-C. Covert Communication for Dual Images with Two-Tier Bits Flipping. Mathematics 2024, 12, 2219. https://doi.org/10.3390/math12142219.
  • Oh, J.; Son, S.; Kwon, D.; Kim, M.; Park, Y.; Park, Y. Design of Secure and Privacy-Preserving Data Sharing Scheme Based on Key Aggregation and Private Set Intersection in Medical Information System. Mathematics 2024, 12, 1717. https://doi.org/10.3390/math12111717.
  • Makhmudov, F.; Privalov, A.; Privalov, A.; Kazakevich, E.; Bekbaev, G.; Boldinov, A.; Kim, K.H.; Im-Cho, Y. Mathematical Model of the Process of Data Transmission over the Radio Channel of Cyber-Physical Systems. Mathematics 2024, 12, 1452. https://doi.org/10.3390/math12101452.
  • Kim, M.; Park, K.; Park, Y. A Reliable and Privacy-Preserving Vehicular Energy Trading Scheme Using Decentralized Identifiers. Mathematics 2024, 12, 1450. https://doi.org/10.3390/math12101450.
  • Lin, Y.; Liu, J.-C.; Chang, C.-C.; Chang, C.-C. Embedding Secret Data in a Vector Quantization Codebook Using a Novel Thresholding Scheme. Mathematics 2024, 12, 1332. https://doi.org/10.3390/math12091332.
  • Rath, S.; Ramalingam, J.; Lee, C.-C. On Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications. Mathematics 2024, 12, 713. https://doi.org/10.3390/math12050713.

References

  1. Tallat, R.; Hawbani, A.; Wang, X.; Al-Dubai, A.; Zhao, L.; Liu, Z.; Min, G.; Zomaya, A.Y.; Alsamhi, S.H. Navigating Industry 5.0: A Survey of Key Enabling Technologies, Trends, Challenges, and Opportunities. IEEE Commun. Surv. Tutor. 2024, 26, 1080–1126. [Google Scholar] [CrossRef]
  2. Sharma, M.; Tomar, A.; Hazra, A. Edge Computing for Industry 5.0: Fundamental, Applications, and Research Challenges. IEEE Internet Things J. 2024, 11, 19070–19093. [Google Scholar] [CrossRef]
  3. Xu, X.; Lu, Y.; Vogel-Heuser, B.; Wang, L. Industry 4.0 and Industry 5.0—Inception, conception and perception. J. Manuf. Syst. 2021, 61, 530–535. [Google Scholar] [CrossRef]
  4. Aleisa, M.A. Enhancing Security in CPS Industry 5.0 using Lightweight MobileNetV3 with Adaptive Optimization Technique. Sci. Rep. 2025, 15, 18677. [Google Scholar] [CrossRef] [PubMed]
  5. Ajani, T.S.; Imoize, A.L.; Atayero, A.A. An Overview of Machine Learning within Embedded and Mobile Devices–Optimizations and Applications. Sensors 2021, 21, 4412. [Google Scholar] [CrossRef] [PubMed]
  6. Rani, S.; Srivastava, G. Secure hierarchical fog computing-based architecture for industry 5.0 using an attribute-based encryption scheme. Expert Syst. Appl. 2024, 235, 121180. [Google Scholar] [CrossRef]
  7. Ramachandran, K.K.; Nagarjuna, B.; Akram, S.V.; Bhalani, J.; Raju, A.M.; Ponnusamy, R. Innovative Cyber Security Solutions Built on Blockchain Technology for Industrial 5.0 Applications. In Proceedings of the 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), Greater Noida, India, 27–29 January 2023; pp. 643–650. [Google Scholar] [CrossRef]
  8. Shaikh, Z.A.; Hajjej, F.; Uslu, Y.D.; Yüksel, S.; Dınçer, H.; Alroobaea, R.; Baqasah, A.M.; Chinta, U. A new trend in cryptographic information security for industry 5.0: A systematic review. IEEE Access 2024, 12, 7156–7169. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Lee, C.-C.; Do, D.-T.; Imoize, A.L. Advances in Mathematical Cryptography and Information Security Toward Industry 5.0. Mathematics 2025, 13, 2660. https://doi.org/10.3390/math13162660

AMA Style

Lee C-C, Do D-T, Imoize AL. Advances in Mathematical Cryptography and Information Security Toward Industry 5.0. Mathematics. 2025; 13(16):2660. https://doi.org/10.3390/math13162660

Chicago/Turabian Style

Lee, Cheng-Chi, Dinh-Thuan Do, and Agbotiname Lucky Imoize. 2025. "Advances in Mathematical Cryptography and Information Security Toward Industry 5.0" Mathematics 13, no. 16: 2660. https://doi.org/10.3390/math13162660

APA Style

Lee, C.-C., Do, D.-T., & Imoize, A. L. (2025). Advances in Mathematical Cryptography and Information Security Toward Industry 5.0. Mathematics, 13(16), 2660. https://doi.org/10.3390/math13162660

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop