Topic Editors

School of Innovation, Design and Engineering (IDT), Mälardalen University, Box 883, 721 23 Västerås, Sweden
Technology Higher School Essaouira, Cadi Ayyad University, Essaouira 40000, Morocco

Cybersecurity Symmetry: Encryption, AI, and Attack Patterns

Abstract submission deadline
31 January 2027
Manuscript submission deadline
31 March 2027
Viewed by
271

Topic Information

Dear Colleagues,

Cybersecurity currently exists in a dynamic state of symmetry, where both attackers and defenders leverage similar technologies—particularly encryption and artificial intelligence (AI)—in a constant strategic tug-of-war. Encryption remains a foundational tool for securing data, but emerging threats like quantum computing and AI-generated attack patterns challenge its integrity. AI plays a dual role—enhancing defense through automated threat detection and prediction, while also enabling sophisticated attacks such as data poisoning and zero-day exploit discovery. The concept of symmetry is further explored in mirrored tactics used by ethical hackers and malicious actors, raising ethical questions about autonomous defensive systems. Although there is a theoretical balance, in practice, cybersecurity often remains asymmetric, with attackers holding the advantage of surprise and agility. Future solutions may rely on privacy-preserving technologies like homomorphic encryption and more resilient AI models to restore equilibrium in the digital battlefield.

Prof. Dr. Mobyen Uddin Ahmed
Dr. Azidine Guezzaz
Topic Editors

Keywords

  • artificial intelligence (AI)
  • encryption
  • attack patterns
  • defensive AI
  • data poisoning
  • zero-day exploits
  • neural cryptography
  • threat detection
  • adversarial machine learning
  • cyber threat intelligence
  • cyber offense–defense symmetry
  • machine learning security
  • AI-driven attacks

Participating Journals

Journal Name Impact Factor CiteScore Launched Year First Decision (median) APC
AI
ai
5.0 6.9 2020 20.7 Days CHF 1600 Submit
Future Internet
futureinternet
3.6 8.3 2009 17 Days CHF 1600 Submit
Micromachines
micromachines
3.0 6.0 2010 17.2 Days CHF 2100 Submit
Symmetry
symmetry
2.2 5.3 2009 17.1 Days CHF 2400 Submit
Cryptography
cryptography
2.1 5.0 2017 23.1 Days CHF 1800 Submit

Preprints.org is a multidisciplinary platform offering a preprint service designed to facilitate the early sharing of your research. It supports and empowers your research journey from the very beginning.

MDPI Topics is collaborating with Preprints.org and has established a direct connection between MDPI journals and the platform. Authors are encouraged to take advantage of this opportunity by posting their preprints at Preprints.org prior to publication:

  1. Share your research immediately: disseminate your ideas prior to publication and establish priority for your work.
  2. Safeguard your intellectual contribution: Protect your ideas with a time-stamped preprint that serves as proof of your research timeline.
  3. Boost visibility and impact: Increase the reach and influence of your research by making it accessible to a global audience.
  4. Gain early feedback: Receive valuable input and insights from peers before submitting to a journal.
  5. Ensure broad indexing: Web of Science (Preprint Citation Index), Google Scholar, Crossref, SHARE, PrePubMed, Scilit and Europe PMC.

Published Papers (1 paper)

Order results
Result details
Journals
Select all
Export citation of selected articles as:
32 pages, 1170 KB  
Article
Formal Analysis of EAP-TLS Protocol Based on Logic of Events
by Meihua Xiao, Weili Cheng, Hongming Fan, Huaibin Shao, Zehuan Li and Yingqiang Zhong
Symmetry 2025, 17(9), 1456; https://doi.org/10.3390/sym17091456 - 4 Sep 2025
Abstract
The Extensible Authentication Protocol–Transport Layer Security (EAP-TLS) is a critical authentication protocol for wireless networks and secure IoT communications. However, it faces significant challenges from man-in-the-middle attacks, including message tampering, replay, and certificate forgery. Although model checking techniques have been applied to verify [...] Read more.
The Extensible Authentication Protocol–Transport Layer Security (EAP-TLS) is a critical authentication protocol for wireless networks and secure IoT communications. However, it faces significant challenges from man-in-the-middle attacks, including message tampering, replay, and certificate forgery. Although model checking techniques have been applied to verify its security properties, the complexity of the EAP-TLS handshake often prevents accurate formal modeling; existing studies rarely assess the communication overhead of protocol enhancements. Moreover, traditional Logic of Events Theory (LoET) struggles to handle transport-layer protocols like EAP-TLS due to their intricate interaction processes. This study proposes a novel formal analysis approach, extending LoET by expanding five event classes, formulating corresponding rules, and introducing new axioms. Formal verification reveals attack paths involving plaintext theft, message tampering, and entity impersonation. The research proposes an enhanced strategy to mitigate these vulnerabilities through hash merging, encryption, and signature methods, alongside analyzing their communication costs to ensure feasibility. Using the extended LoET, the improved protocol is rigorously proven to satisfy strong authentication, thereby enhancing practical security. The proposed method achieves a time complexity of O(n2) and demonstrates superior performance in resisting state explosion compared with related approaches, thus establishing a more efficient and robust framework for EAP-TLS security analysis. Full article
Show Figures

Figure 1

Back to TopTop