Security and Communication Networks

Machine Learning and Applied Cryptography


Publishing date
01 Jan 2021
Status
Published
Submission deadline
04 Sep 2020

Lead Editor

1La Trobe University, Melbourne, Australia

2Qatar University, Doha, Qatar

3Georgia Gwinnett College, Lawrenceville, USA

4HITEC University, Taxila, Pakistan

5King Khalid University, Abha, Saudi Arabia


Machine Learning and Applied Cryptography

Description

Machine Learning (ML) and cryptography have many things in common; the amount of data to be handled and large search spaces for instance. The application of ML in cryptography is not new, but with over 3 quintillion bytes of data being generated every day, it is now more relevant to apply ML techniques in cryptography than ever before.

ML generally automates analytical model building to continuously learn and adapt to the large amount of data being fed as input. ML techniques can be used to indicate the relationship between the input and output data created by cryptosystems. ML techniques such as Boosting and Mutual Learning can be used to create the private cryptographic key over the public and insecure channel. Methods such as Naive Bayesian, support vector machine, and AdaBoost, which come under the category of classification, can be used to classify the encrypted traffic and objects into steganograms used in steganography. Besides the application in cryptography, which is an art of creating secure systems for encrypting/decrypting confidential data, the ML techniques can also be applied in cryptanalysis, which is an art of breaking cryptosystems to perform certain side-channel attacks.

The aim of this Special Issue is to create a volume of recent works on advances in all aspects of ML applications in cryptosystems and cryptanalysis. Both original research articles, and review articles discussing the current state of the art, are welcomed.

Potential topics include but are not limited to the following:

  • Machine learning to analyze cryptosystems
  • Machine learning to perform cryptanalysis
  • Machine learning based intrusion detection
  • Deep learning for security and privacy
  • Data mining for authentication
  • End-to-end system security models
  • Machine learning based key exchange framework
  • Machine learning based threat and attack model generation
  • Nonlinear aspects of cryptosystems
  • Adversarial machine learning for data security

Articles

  • Special Issue
  • - Volume 2020
  • - Article ID 8886877
  • - Review Article

Multicriteria Decision and Machine Learning Algorithms for Component Security Evaluation: Library-Based Overview

Jibin Zhang | Shah Nazir | ... | Abdullah Alharbi
  • Special Issue
  • - Volume 2020
  • - Article ID 8829595
  • - Research Article

Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method

Xucheng Huang | Shah Nazir
  • Special Issue
  • - Volume 2020
  • - Article ID 8863345
  • - Research Article

Secure Framework Enhancing AES Algorithm in Cloud Computing

Ijaz Ahmad Awan | Muhammad Shiraz | ... | Allah Ditta
  • Special Issue
  • - Volume 2020
  • - Article ID 8863617
  • - Research Article

Android Malware Detection Based on a Hybrid Deep Learning Model

Tianliang Lu | Yanhui Du | ... | Xirui Wang
  • Special Issue
  • - Volume 2020
  • - Article ID 8830903
  • - Research Article

Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication

Zhiwei Gu | Shah Nazir | ... | Sulaiman Khan
  • Special Issue
  • - Volume 2020
  • - Article ID 8865474
  • - Research Article

A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning

Nadiya El Kamel | Mohamed Eddabbah | ... | Raja Touahni
  • Special Issue
  • - Volume 2020
  • - Article ID 8824659
  • - Research Article

Preprocessing Method for Encrypted Traffic Based on Semisupervised Clustering

Rongfeng Zheng | Jiayong Liu | ... | Shan Liao
  • Special Issue
  • - Volume 2020
  • - Article ID 8830683
  • - Review Article

A Systematic Literature Review on Using Machine Learning Algorithms for Software Requirements Identification on Stack Overflow

Arshad Ahmad | Chong Feng | ... | Adnan Tahir
  • Special Issue
  • - Volume 2020
  • - Article ID 3701067
  • - Research Article

Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers

Jaewoo So
  • Special Issue
  • - Volume 2020
  • - Article ID 8873639
  • - Research Article

Spam Detection Approach for Secure Mobile Message Communication Using Machine Learning Algorithms

Luo GuangJun | Shah Nazir | ... | Amin Ul Haq
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.