{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T17:10:39Z","timestamp":1769101839264,"version":"3.49.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:00:00Z","timestamp":1769040000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:00:00Z","timestamp":1769040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Partial neural distinguishers limit the available ciphertext bit combinations in differential neural cryptanalysis. When the training data size and the number of bits are not appropriately selected, label collisions can occur, which adversely affects key recovery efficiency. This paper conducts an analysis to investigate the correlation between the number of bits and the data size, aiming to address the aforementioned issue. It develops a strategy to control collisions and mitigate the impact of these collisions on model performance. A Collision-Aware Key Recovery (CAKR) framework is proposed tailored for high-collision data based on this strategy. This framework leverages the distribution characteristics of labels, eliminating the need for training neural distinguishers and significantly reducing both time and resource consumption. Experimental results show that the CAKR framework reduces the key recovery time by 96.8%, 95.5%, and 91.0% for the Speck32\/64, Speck64\/96, and Speck96\/128, respectively. Additionally, a bit search algorithm is proposed that incorporates a differential evolution strategy and uses the non-uniformity of the ciphertext difference distribution among positive samples as the fitness criterion. Frequent calls to the neural distinguisher are avoided by our method, reducing the search time from 3.286\u00a0h to 7.464\u00a0s for 8-bit combinations in Speck32\/64. The CAKR framework also offers a quantum version that theoretically further reduces time complexity.<\/jats:p>","DOI":"10.1186\/s42400-025-00402-4","type":"journal-article","created":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T01:02:00Z","timestamp":1769043720000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cakr: a collision-aware cryptanalysis scheme for lightweight block ciphers"],"prefix":"10.1186","volume":"9","author":[{"given":"Siqi","family":"Zhu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4832-4499","authenticated-orcid":false,"given":"Lang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ruihan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Zhiwen","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Yemao","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,22]]},"reference":[{"issue":"5","key":"402_CR1","doi-asserted-by":"publisher","first-page":"3831","DOI":"10.1016\/j.aej.2021.09.013","volume":"61","author":"MF Ahmad","year":"2022","unstructured":"Ahmad MF, Isa NAM, Lim WH, Ang KM (2022) Differential evolution: a recent review based on state-of-the-art works. Alex Eng J 61(5):3831\u20133872","journal-title":"Alex Eng J"},{"issue":"1","key":"402_CR2","doi-asserted-by":"publisher","first-page":"2350017","DOI":"10.1142\/S0218126623500172","volume":"32","author":"M Al-Moselly","year":"2023","unstructured":"Al-Moselly M, Al-Haj A (2023) High-performance hardware implementation of the katan lightweight cryptographic cipher. J Circuits Syst Comput 32(1):2350017\u20131235001726","journal-title":"J Circuits Syst Comput"},{"key":"402_CR3","first-page":"141","volume-title":"Machine learning-assisted differential distinguishers for lightweight ciphers","author":"A Baksi","year":"2022","unstructured":"Baksi A (2022) Machine learning-assisted differential distinguishers for lightweight ciphers. Springer, Singapore, pp 141\u2013162"},{"key":"402_CR4","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-031-22963-3_11","volume-title":"Advances in cryptology - ASIACRYPT 2022","author":"Z Bao","year":"2022","unstructured":"Bao Z, Guo J, Liu M, Ma L, Tu Y (2022) Enhancing differential-neural cryptanalysis. Advances in cryptology - ASIACRYPT 2022. Springer, Cham, pp 318\u2013347"},{"key":"402_CR5","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1007\/978-3-030-77870-5_28","volume-title":"Advances in cryptology - EUROCRYPT 2021","author":"A Benamira","year":"2021","unstructured":"Benamira A, G\u00e9rault D, Peyrin T, Tan QQ (2021) A deeper look at machine learning-based cryptanalysis. Advances in cryptology - EUROCRYPT 2021. Springer, Cham, pp 805\u2013835"},{"key":"402_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117215","volume":"203","author":"J Bogatinovski","year":"2022","unstructured":"Bogatinovski J, Todorovski L, Dzeroski S, Kocev D (2022) Comprehensive comparative study of multi-label classification methods. Expert Syst Appl 203:117215","journal-title":"Expert Syst Appl"},{"issue":"6","key":"402_CR7","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1093\/comjnl\/bxac019","volume":"66","author":"Y Chen","year":"2023","unstructured":"Chen Y, Shen Y, Yu H, Yuan S (2023) A new neural distinguisher considering features derived from multiple ciphertext pairs. Comput J 66(6):1419\u20131433","journal-title":"Comput J"},{"issue":"10","key":"402_CR8","doi-asserted-by":"publisher","first-page":"2480","DOI":"10.1093\/comjnl\/bxac099","volume":"66","author":"Y Chen","year":"2023","unstructured":"Chen Y, Shen Y, Yu H (2023) Neural-aided statistical attack for cryptanalysis. Comput J 66(10):2480\u20132498","journal-title":"Comput J"},{"issue":"1","key":"402_CR9","first-page":"168","volume":"10","author":"Y Chen","year":"2023","unstructured":"Chen Y, Shen Y, Yu H (2023) Analysis and improvements of deep learning-based key recovery attack. J Cryptol Res 10(1):168","journal-title":"J Cryptol Res"},{"key":"402_CR10","unstructured":"Chen H, Wang J, Shah A, Tao R, Wei H, Xie X, Sugiyama M, Raj B (2024) Understanding and mitigating the label noise in pre-training on downstream tasks. In: The twelfth international conference on learning representations, ICLR 2024, Vienna, Austria, May 7\u201311, 2024"},{"key":"402_CR11","first-page":"123","volume-title":"Foundations and practice of security - 15th","author":"A Ebrahimi","year":"2022","unstructured":"Ebrahimi A, Regazzoni F, Palmieri P (2022) Reducing the cost of machine learning differential attacks using bit selection and a partial ml-distinguisher. Foundations and practice of security - 15th. Springer, Cham, pp 123\u2013141"},{"key":"402_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2019.103183","volume":"278","author":"D G\u00e9rault","year":"2020","unstructured":"G\u00e9rault D, Lafourcade P, Minier M, Solnon C (2020) Computing AES related-key differential characteristics with constraint programming. Artif. Intell. 278:103183","journal-title":"Artif. Intell."},{"key":"402_CR13","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-030-26951-7_6","volume-title":"Advances in cryptology - CRYPTO 2019","author":"A Gohr","year":"2019","unstructured":"Gohr A (2019) Improving attacks on round-reduced speck32\/64 using deep learning. Advances in cryptology - CRYPTO 2019. Springer, Cham, pp 150\u2013179"},{"key":"402_CR14","unstructured":"Gohr A, Leander G, Neumann P (2022) An assessment of differential-neural distinguishers. Cryptology ePrint Archive, Paper 2022\/1521. https:\/\/eprint.iacr.org\/2022\/1521"},{"issue":"1","key":"402_CR15","first-page":"9288229","volume":"2021","author":"Z Hou","year":"2021","unstructured":"Hou Z, Ren J, Chen S (2021) Improve neural distinguishers of simon and speck. Security Commun Netw 2021(1):9288229","journal-title":"Security Commun Netw"},{"issue":"6","key":"402_CR16","first-page":"6960","volume":"36","author":"Y Huang","year":"2022","unstructured":"Huang Y, Bai B, Zhao S, Bai K, Wang F (2022) Uncertainty-aware learning against label noise on imbalanced datasets. Proc AAAI Conf Artif Intell 36(6):6960\u20136969","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"402_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2020.101759","volume":"65","author":"D Karimi","year":"2020","unstructured":"Karimi D, Dou H, Warfield SK, Gholipour A (2020) Deep learning with noisy labels: exploring techniques and remedies in medical image analysis. Med Image Anal 65:101759","journal-title":"Med Image Anal"},{"key":"402_CR18","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-662-47989-6_8","volume-title":"Advances in cryptology - CRYPTO 2015","author":"S K\u00f6lbl","year":"2015","unstructured":"K\u00f6lbl S, Leander G, Tiessen T (2015) Observations on the simon block cipher family. In: Gennaro R, Robshaw M (eds) Advances in cryptology - CRYPTO 2015. Springer, Berlin, Heidelberg, pp 161\u2013185"},{"key":"402_CR19","volume":"74","author":"J Liu","year":"2023","unstructured":"Liu J, Ren J, Chen S, Li M (2023) Improved neural distinguishers with multi-round and multi-splicing construction. J Inf Secur Appl 74:103461","journal-title":"J Inf Secur Appl"},{"issue":"1","key":"402_CR20","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1186\/s42400-023-00176-7","volume":"6","author":"J Liu","year":"2023","unstructured":"Liu J, Ren J, Chen S (2023) A deep learning aided differential distinguisher improvement framework with more lightweight and universality. Cybersecur 6(1):47","journal-title":"Cybersecur"},{"issue":"4","key":"402_CR21","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1049\/ise2.12061","volume":"16","author":"J Lu","year":"2022","unstructured":"Lu J, Liu Y, Ashur T, Sun B, Li C (2022) Improved rotational-xor cryptanalysis of simon-like block ciphers. IET Inf Secur 16(4):282\u2013300","journal-title":"IET Inf Secur"},{"issue":"2","key":"402_CR22","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1093\/comjnl\/bxac195","volume":"67","author":"J Lu","year":"2024","unstructured":"Lu J, Liu G, Sun B, Li C, Liu L (2024) Improved (related-key) differential-based neural distinguishers for simon and simeck block ciphers. Comput J 67(2):537\u2013547","journal-title":"Comput J"},{"key":"402_CR23","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-031-47372-2_5","volume-title":"Advances in computing","author":"I Mart\u00ednez","year":"2024","unstructured":"Mart\u00ednez I, L\u00f3pez V, Rambaut D, Obando G, Gauthier-Uma\u00f1a V, P\u00e9rez JF (2024) Recent advances in machine learning for differential cryptanalysis. Advances in computing. Springer, Cham, pp 45\u201356"},{"key":"402_CR24","first-page":"57","volume-title":"Information security and cryptology","author":"N Mouha","year":"2011","unstructured":"Mouha N, Wang Q, Gu D, Preneel B (2011) Differential and linear cryptanalysis using mixed-integer linear programming. Information security and cryptology. Springer, Berlin, Heidelberg, pp 57\u201376"},{"issue":"3","key":"402_CR25","first-page":"110","volume":"3","author":"Q Sun","year":"2021","unstructured":"Sun Q et al (2021) The probability principle of the birthday paradox and extended applications. Front Soc Sci Technol 3(3):110\u2013112","journal-title":"Front Soc Sci Technol"},{"issue":"2","key":"402_CR26","first-page":"600","volume":"15","author":"W Tian","year":"2021","unstructured":"Tian W, Hu B (2021) Deep learning assisted differential cryptanalysis for the lightweight cipher simon. KSII Trans Internet Inf Syst 15(2):600\u2013616","journal-title":"KSII Trans Internet Inf Syst"},{"issue":"12","key":"402_CR27","doi-asserted-by":"publisher","first-page":"6994","DOI":"10.3390\/app13126994","volume":"13","author":"X Yue","year":"2023","unstructured":"Yue X, Wu W (2023) Improved neural differential distinguisher model for lightweight cipher speck. Appl Sci 13(12):6994","journal-title":"Appl Sci"},{"issue":"6","key":"402_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-023-3261-z","volume":"17","author":"L Zhang","year":"2023","unstructured":"Zhang L, Lu J, Wang Z, Li C (2023) Improved differential-neural cryptanalysis for round-reduced simeck32\/64. Front Comput Sci 17(6):176817","journal-title":"Front Comput Sci"},{"issue":"6","key":"402_CR29","doi-asserted-by":"publisher","first-page":"2101","DOI":"10.1007\/s11128-015-0983-3","volume":"14","author":"Q Zhou","year":"2015","unstructured":"Zhou Q, Lu S, Zhang Z, Sun J (2015) Quantum differential cryptanalysis. Quantum Inf Process 14(6):2101\u20132109","journal-title":"Quantum Inf Process"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00402-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00402-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00402-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T01:02:02Z","timestamp":1769043722000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s42400-025-00402-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,22]]},"references-count":29,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["402"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00402-4","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,22]]},"assertion":[{"value":"7 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"16"}}