Advances in Symmetric Cryptography and Data Integrity

A special issue of Cryptography (ISSN 2410-387X).

Deadline for manuscript submissions: 20 May 2025 | Viewed by 1414

Special Issue Editors

Facultad de Ciencias Económicas y Empresariales, Universidad Panamericana, Álvaro del Portillo 49, Zapopan 45010, Mexico
Interests: operations research; applied maths; financial time series; adaptive systems; risk
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Facultad de Ciencias Económicas y Empresariales, Universidad Panamericana, Álvaro del Portillo 49, Zapopan 45010, Jalisco, Mexico
Interests: applied math; entropy; heuristics; operations research; security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Software Engineering and Artificial Intelligence (DISIA), Faculty of Computer Science and Engineering, Office 431, Universidad Complutense de Madrid (UCM), 28040 Madrid, Spain
Interests: computer security; cyber security; privacy; information security; cryptography; intrusion detection; malware; trust; anonymity
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Symmetric cryptography refers to the set of methods that allow secure communication between parties provided they have previously exchanged the corresponding key, which we will call a symmetric key. Symmetry refers to the fact that the parties have the same key for both encryption and decryption. This type of cryptography is classified into three families: block cipher, stream cipher, and hash function cryptography. This Special Issue of Cryptography is dedicated to exploring recent advances in this area, including cutting-edge cryptographic techniques and other methods for preserving data confidentiality and integrity.

Specific topics of interest include, but are not limited to:

  • Authentication;
  • Post-quantum cryptography;
  • Symmetric cryptography;
  • Homomorphic cryptography;
  • Identity-based cryptography;
  • Cryptanalysis;
  • Cryptanalysis of block ciphers;
  • Cryptographic protocols;
  • Cryptographic key distribution and management;
  • Secure multiparty computation;
  • Steganography;
  • Steganalysis;
  • Code theory in cryptography;
  • Computational mathematics and cryptography;
  • Cryptographic randomness;
  • Design of symmetric encryption algorithms;
  • Side-channel attacks;
  • Blockchain and its applications;
  • AI applications in cryptography (metaheuristics, neural networks, etc.).

Dr. Omar Rojas
Dr. Guillermo Sosa
Dr. Luis Javier García Villalba
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Cryptography is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • symmetric cryptography
  • cryptanalysis
  • steganalysis
  • authentication
  • code theory

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

17 pages, 338 KiB  
Article
New Weak Keys with Parity Patterns in the RC4 Stream Cipher
by Evaristo José Madarro-Capó, Carlos Miguel Legón-Pérez , Guillermo Sosa-Gómez and Omar Rojas
Cryptography 2024, 8(4), 54; https://doi.org/10.3390/cryptography8040054 - 27 Nov 2024
Viewed by 657
Abstract
The RC4 cryptographic algorithm is the most extensively studied stream cipher of the past two decades. This extensive research has resulted in numerous publications, many of which identify various vulnerabilities. Although these vulnerabilities do not preclude the correct use of the algorithm, they [...] Read more.
The RC4 cryptographic algorithm is the most extensively studied stream cipher of the past two decades. This extensive research has resulted in numerous publications, many of which identify various vulnerabilities. Although these vulnerabilities do not preclude the correct use of the algorithm, they complicate its practical implementation. In this paper, we present a novel weakness in the RC4 cipher. Our findings indicate that, for input keys exhibiting certain patterns, the parity of the values in the output permutation of the KSA can be determined with high probability from the parity of its position in the output permutation. Furthermore, the use of keys with these specific patterns leads to noticeable distortions in several bytes of the RC4 output. Full article
(This article belongs to the Special Issue Advances in Symmetric Cryptography and Data Integrity)
Show Figures

Figure 1

Back to TopTop