{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T13:20:35Z","timestamp":1770816035417,"version":"3.50.1"},"reference-count":50,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T00:00:00Z","timestamp":1770681600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2154507"],"award-info":[{"award-number":["CNS-2154507"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["OAC-2139358"],"award-info":[{"award-number":["OAC-2139358"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2201465"],"award-info":[{"award-number":["CNS-2201465"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Indistinguishability is a fundamental principle of cryptographic security, crucial for securing data transmitted between Internet of Things (IoT) devices. This principle ensures that an attacker cannot distinguish between the encrypted data, also known as ciphertext, and random data or the ciphertexts of two messages encrypted with the same key. This research investigates the ability of machine learning (ML) to assess the indistinguishability property in encryption systems, with a focus on lightweight ciphers. As our first case study, we consider the SPECK32\/64 and SIMON32\/64 lightweight block ciphers, designed for IoT devices operating under significant energy constraints. In this research, we introduce MIND-Crypt (a Machine-learning-based framework for assessing the INDistinguishability of Cryptographic algorithms), a novel ML-based framework designed to assess the cryptographic indistinguishability of lightweight block ciphers, specifically the SPECK32\/64 and SIMON32\/64 encryption algorithms in CBC, CFB, OFB, and CTR modes, under Known Plaintext Attacks (KPAs). Our approach involves training ML models using ciphertexts from two plaintext messages encrypted with the same key to determine whether ML algorithms can identify meaningful cryptographic patterns or leakage. Our experiments show that modern ML techniques consistently achieve accuracy equivalent to random guessing, indicating that no statistically exploitable patterns exist in the ciphertexts generated by the considered lightweight block ciphers. Although some models exhibit mode-dependent bias (e.g., collapsing to a single-class prediction in CBC and CFB), their overall accuracy remains at random guessing levels, reinforcing that no meaningful distinguishing patterns are learned. Furthermore, we demonstrate that, when ML algorithms are trained on all possible combinations of ciphertexts for given plaintext messages, their behavior reflects memorization rather than generalization to unseen ciphertexts. Collectively, these findings suggest that existing block ciphers have secure cryptographic designs against ML-based indistinguishability assessments, reinforcing their security even under round-reduced conditions.<\/jats:p>","DOI":"10.3390\/cryptography10010009","type":"journal-article","created":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T09:16:08Z","timestamp":1770801368000},"page":"9","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["MIND-Crypt: A Machine Learning Framework for Assessing the Indistinguishability of Lightweight Block Ciphers Across Multiple Modes of Operation"],"prefix":"10.3390","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7581-9104","authenticated-orcid":false,"given":"Jimmy","family":"Dani","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Texas A&M University, College Station, TX 77843, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3916-0939","authenticated-orcid":false,"given":"Kalyan","family":"Nakka","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Texas A&M University, College Station, TX 77843, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6083-104X","authenticated-orcid":false,"given":"Nitesh","family":"Saxena","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Texas A&M University, College Station, TX 77843, USA"}]}],"member":"1968","published-online":{"date-parts":[[2026,2,10]]},"reference":[{"key":"ref_1","unstructured":"(2026, February 03). State of IoT 2024: Number of Connected IoT Devices Growing 13% to 18.8 Billion Globally. Available online: https:\/\/iot-analytics.com\/number-connected-iot-devices\/."},{"key":"ref_2","unstructured":"(2024, August 15). The Software Strategies Blog. Cisco Internet of Things (IoT) Study, 2024. Available online: https:\/\/softwarestrategiesblog.com\/tag\/cisco-internet-of-things-iot-study\/#:~:text=The%20global%20Internet%20of%20Things,B%20in%20global%20IoT%20spending."},{"key":"ref_3","unstructured":"Statista (2024, August 15). Internet of Things (IoT)\u2014Statistics & Facts, 2024. Available online: https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/."},{"key":"ref_4","unstructured":"(2026, February 03). The Future of IoT Development: Trends and Predictions for 2025. Available online: https:\/\/imaginovation.net\/blog\/iot-development-trends-predictions\/."},{"key":"ref_5","unstructured":"(2026, February 03). Internet of Things|TechCrunch\u2014Techcrunch.com. Available online: https:\/\/techcrunch.com\/tag\/internet-of-things\/."},{"key":"ref_6","unstructured":"Appel, M., Bossert, A., Cooper, S., Ku\u00dfmaul, T., L\u00f6ffler, J., Pauer, C., and Wiesmaier, A. (2016). Block ciphers for the iot\u2013simon, speck, katan, led, tea, present, and sea compared. Proc. Appel Block CF, 1\u201337."},{"key":"ref_7","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., and Wingers, L. (2026, February 03). SIMON and SPECK: Block Ciphers for the Internet of Things. Cryptology ePrint Archive, Paper 2015\/585, 2015. Available online: https:\/\/eprint.iacr.org\/2015\/585."},{"key":"ref_8","unstructured":"Zhou, Y., and Feng, D. (2026, February 03). Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing. Cryptology ePrint Archive, Paper 2005\/388. Available online: https:\/\/eprint.iacr.org\/2005\/388."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Randolph, M., and Diehl, W. (2020). Power side-channel attack analysis: A review of 20 years of study for the layman. Cryptography, 4.","DOI":"10.3390\/cryptography4020015"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Quisquater, J.J., Deswarte, Y., Meadows, C., and Gollmann, D. (1998). Side channel cryptanalysis of product ciphers. Proceedings of the Computer Security\u2014ESORICS 98, Springer.","DOI":"10.1007\/BFb0055851"},{"key":"ref_11","unstructured":"Phan, R.C.W., and Yen, S.M. (2006). Amplifying side-channel attacks with techniques from block cipher cryptanalysis. Proceedings of the Smart Card Research and Advanced Applications: 7th IFIP WG 8.8\/11.2 International Conference, CARDIS 2006, Tarragona, Spain, 19\u201321 April 2006, Springer. Proceedings 7."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Dutertre, J.M., Fournier, J.J., Mirbaha, A.P., Naccache, D., Rigaud, J.B., Robisson, B., and Tria, A. (2011, January 6\u20138). Review of fault injection mechanisms and consequences on countermeasures design. Proceedings of the 2011 6th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS), Athens, Greece.","DOI":"10.1109\/DTIS.2011.5941421"},{"key":"ref_13","unstructured":"Clark, J.A., and Jacob, J.L. (2002). Fault injection and a timing channel on an analysis technique. Proceedings of the Advances in Cryptology\u2014EUROCRYPT 2002: International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, 28 April\u20132 May 2002, Springer. Proceedings 21."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"3056","DOI":"10.1109\/JPROC.2012.2188769","article-title":"Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures","volume":"100","author":"Barenghi","year":"2012","journal-title":"Proc. IEEE"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s13389-023-00324-2","article-title":"Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit","volume":"14","author":"Shao","year":"2023","journal-title":"J. Cryptogr. Eng."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Al-Sabaawi, A. (2021, January 25\u201327). Cryptanalysis of Classic Ciphers: Methods Implementation Survey. Proceedings of the 2021 International Conference on Intelligent Technologies (CONIT), Hubli, India.","DOI":"10.1109\/CONIT51480.2021.9498530"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Lone, P.N., Singh, D., Stoffov\u00e1, V., Mishra, D.C., Mir, U.H., and Kumar, N. (2022). Cryptanalysis and improved image encryption scheme using elliptic curve and affine hill cipher. Mathematics, 10.","DOI":"10.3390\/math10203878"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Xiao, Y., Hao, Q., and Yao, D.D. (2019, January 18\u201320). Neural cryptanalysis: Metrics, methodology, and applications in CPS ciphers. Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing (DSC), Hangzhou, China.","DOI":"10.1109\/DSC47296.2019.8937659"},{"key":"ref_19","unstructured":"Gohr, A. (2026, February 03). Brute Force Cryptanalysis. Cryptology ePrint Archive, Paper 2022\/053, 2022. Available online: https:\/\/eprint.iacr.org\/2022\/053."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Sikdar, S., and Kule, M. (2022). Recent Trends in Cryptanalysis Techniques: A Review. Proceedings of the International Conference on Frontiers in Computing and Systems, Springer.","DOI":"10.1007\/978-981-99-2680-0_19"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Verma, R., Dhanda, N., and Nagar, V. (2022). Enhancing security with in-depth analysis of brute-force attack on secure hashing algorithms. Proceedings of Trends in Electronics and Health Informatics: TEHI 2021, Springer.","DOI":"10.1007\/978-981-16-8826-3_44"},{"key":"ref_22","unstructured":"Mok, C.J., and Chuah, C.W. (2019). An Intelligence Brute Force Attack on RSA Cryptosystem. Commun. Comput. Appl. Math., 1."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Gohr, A. (2019). Improving Attacks on Round-Reduced Speck32\/64 Using Deep Learning. Proceedings of the Advances in Cryptology\u2014CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA,  18\u201322 August 2019, Springer. Proceedings, Part II.","DOI":"10.1007\/978-3-030-26951-7_6"},{"key":"ref_24","unstructured":"Benamira, A., Gerault, D., Peyrin, T., and Tan, Q.Q. (2026, February 03). A Deeper Look at Machine Learning-Based Cryptanalysis. Cryptology ePrint Archive, Paper 2021\/287, 2021. Available online: https:\/\/eprint.iacr.org\/2021\/287."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Dani, J., Nakka, K., and Saxena, N. (2025, January 26\u201328). A Machine Learning-Based Framework for Assessing Cryptographic Indistinguishability of Lightweight Block Ciphers. Proceedings of the 2025 22nd Annual International Conference on Privacy, Security, and Trust (PST), Los Alamitos, CA, USA.","DOI":"10.1109\/PST65910.2025.11268861"},{"key":"ref_26","unstructured":"(2026, February 03). Mind Crypt. Available online: https:\/\/sites.google.com\/view\/mind-crypt."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., and Wingers, L. (2015, January 7\u201311). The SIMON and SPECK lightweight block ciphers. Proceedings of the 52nd Annual Design Automation Conference, San Francisco, CA, USA.","DOI":"10.1145\/2744769.2747946"},{"key":"ref_28","unstructured":"LeCun, Y., and Bengio, Y. (1998). Convolutional networks for images, speech, and time series. The Handbook of Brain Theory and Neural Networks, MIT Press."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long Short-Term Memory","volume":"9","author":"Hochreiter","year":"1997","journal-title":"Neural Comput."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Graves, A., Fern\u00e1ndez, S., and Schmidhuber, J. (2005). Bidirectional LSTM networks for improved phoneme classification and recognition. Proceedings of the International Conference on Artificial Neural Networks, Warsaw, Poland, 11\u201315 September 2005, Springer.","DOI":"10.1007\/11550907_126"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"107450","DOI":"10.1016\/j.measurement.2019.107450","article-title":"Robust detection for network intrusion of industrial IoT based on multi-CNN fusion","volume":"154","author":"Li","year":"2020","journal-title":"Measurement"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"46673","DOI":"10.1109\/ACCESS.2025.3551152","article-title":"A Deep Learning-Based Ensemble Framework for Robust Android Malware Detection","volume":"13","author":"Nethala","year":"2025","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., and Sun, J. (2016, January 27\u201330). Deep Residual Learning for Image Recognition. Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"121912","DOI":"10.1016\/j.eswa.2023.121912","article-title":"Deep residual convolutional neural Network: An efficient technique for intrusion detection system","volume":"238","author":"Brahmaiah","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Abbas, A., Pano, V., Mainland, G., and Dandekar, K.R. (December, January 28). Radio Modulation Classification Using Deep Residual Neural Networks. Proceedings of the MILCOM 2022\u20142022 IEEE Military Communications Conference (MILCOM), Rockville, MD, USA.","DOI":"10.1109\/MILCOM55135.2022.10017640"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Shu, Y., Qin, R., He, Y., Li, Y., Jiang, R., and Wu, Z. (2022, January 18\u201320). Deep Residual Neural Networks with Attention Mechanism for Spatial Image Steganalysis. Proceedings of the 2022 IEEE 24th International Conference on High Performance Computing & Communications; 8th International Conference on Data Science & Systems; 20th International Conference on Smart City; 8th International Conference on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC\/DSS\/SmartCity\/DependSys), Hainan, China.","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys57074.2022.00260"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., and Wojna, Z. (2016, January 27\u201330). Rethinking the Inception Architecture for Computer Vision. Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref_38","unstructured":"(2026, February 03). Simon\u2014Speck Ciphers. Available online: https:\/\/github.com\/inmcm\/Simon_Speck_Ciphers."},{"key":"ref_39","unstructured":"Abadi, M., Barham, P., Chen, J., Chen, Z., Davis, A., Dean, J., Devin, M., Ghemawat, S., Irving, G., and Isard, M. (2016, January 2\u20134). TensorFlow: A System for Large-Scale Machine Learning. Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), Savannah, GA, USA."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Akiba, T., Sano, S., Yanase, T., Ohta, T., and Koyama, M. (2019, January 4\u20138). Optuna: A Next-generation Hyperparameter Optimization Framework. Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Anchorage, AK, USA.","DOI":"10.1145\/3292500.3330701"},{"key":"ref_41","unstructured":"Bergstra, J., Bardenet, R., Bengio, Y., and K\u00e9gl, B. (2011, January 12\u201315). Algorithms for hyper-parameter optimization. Proceedings of the 25th International Conference on Neural Information Processing Systems, Granada, Spain."},{"key":"ref_42","first-page":"401","article-title":"An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers","volume":"2012","author":"Albrecht","year":"2012","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_43","first-page":"320","article-title":"Improved Differential Cryptanalysis of Round-Reduced Speck","volume":"2014","author":"Dinur","year":"2014","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Blondeau, C., and G\u00e9rard, B. (2011). Multiple Differential Cryptanalysis: Theory and Practice. Proceedings of the Fast Software Encryption Workshop, Lyngby, Denmark, 13\u201316 February 2011, Springer.","DOI":"10.1007\/978-3-642-21702-9_3"},{"key":"ref_45","unstructured":"Ashur, T., and Bodden, D. (2016, January 19\u201320). Linear cryptanalysis of reduced-round speck. Proceedings of the 37th WIC Symposium on Information Theory in the Benelux (SITB 2016) and 6th Joint WIC\/IEEE Symposium on Information Theory and Signal Processing in the Benelux, Louvain-la-Neuve, Belgium."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Velichkov, V., and Corre, Y.L. (2016). Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck. Proceedings of the Fast Software Encryption Workshop, Bochum, Germany, 20\u201323 March 2016, Springer.","DOI":"10.1007\/978-3-662-52993-5_15"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Abed, F., List, E., Lucks, S., and Wenzel, J. (2014). Differential Cryptanalysis of Round-Reduced Simon and Speck. Proceedings of the Fast Software Encryption Workshop, London, UK, 3\u20135 March 2014, Springer.","DOI":"10.1007\/978-3-662-46706-0_27"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1016\/j.ijleo.2018.04.068","article-title":"Cryptanalysis of multimedia encryption using elliptic curve cryptography","volume":"168","author":"Khoirom","year":"2018","journal-title":"Optik"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Mehmood, Z., Sultan, A., Khan, F., and Tahir, S. (2023, January 15\u201316). Machine Learning Based Encrypted Content Type Identification. Proceedings of the 2023 International Conference on Communication Technologies (ComTech), Rawalpindi, Pakistan.","DOI":"10.1109\/ComTech57708.2023.10164955"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"032015","DOI":"10.1088\/1742-6596\/1168\/3\/032015","article-title":"Block ciphers classification based on random forest","volume":"1168","author":"Hu","year":"2019","journal-title":"J. Phys. Conf. Ser."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/10\/1\/9\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T10:07:55Z","timestamp":1770804475000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/10\/1\/9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,10]]},"references-count":50,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,2]]}},"alternative-id":["cryptography10010009"],"URL":"https:\/\/doi.org\/10.3390\/cryptography10010009","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,10]]}}}