{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:39:07Z","timestamp":1760146747995,"version":"build-2065373602"},"reference-count":24,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>This study presents a robust version of Light Cipher Block (LCB) by addressing the vulnerabilities identified in previous versions. The vulnerabilities in LCB, including a linear S-Box, improper bit shuffling, and subkey reusability, were thoroughly examined. To overcome these weaknesses, a modified version called Secure LCB is introduced, incorporating changes to the P-Box and key generation algorithm. Motivated by Gohr\u2019s work at CRYPTO\u201919, this paper investigates the use of a neural distinguisher built upon a 1-dimensional convolutional neural network (1-d CNN). The deep learning model is tasked with identifying ciphertexts that have a specific, controlled difference in their inputs, as opposed to those with random input differences. The evaluation of the proposed Secure LCB using the neural distinguisher suggests that the modifications made to LCB have effectively enhanced its resistance against the neural distinguisher\u2019s classification. This highlights the importance of addressing vulnerabilities in cryptographic systems and showcases the potential of machine learning techniques in cryptanalysis.<\/jats:p>","DOI":"10.3390\/cryptography8040055","type":"journal-article","created":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T04:04:04Z","timestamp":1733198644000},"page":"55","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Improving the Security of the LCB Block Cipher Against Deep Learning-Based Attacks"],"prefix":"10.3390","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-1629-4156","authenticated-orcid":false,"given":"Indrakanti","family":"Aishwarya","sequence":"first","affiliation":[{"name":"TIFAC-CORE in Cyber Security, Amrita School of Engineering, Coimbatore 641112, Amrita Vishwa Vidyapeetham, India"}]},{"given":"Lakshmy","family":"Koduvayur Viswanathan","sequence":"additional","affiliation":[{"name":"TIFAC-CORE in Cyber Security, Amrita School of Engineering, Coimbatore 641112, Amrita Vishwa Vidyapeetham, India"}]},{"given":"Chungath","family":"Srinivasan","sequence":"additional","affiliation":[{"name":"TIFAC-CORE in Cyber Security, Amrita School of Engineering, Coimbatore 641112, Amrita Vishwa Vidyapeetham, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7489-2721","authenticated-orcid":false,"given":"Girish","family":"Mishra","sequence":"additional","affiliation":[{"name":"DRDO, Scientific Analysis Group, New Delhi 110054, India"}]},{"given":"Saibal K.","family":"Pal","sequence":"additional","affiliation":[{"name":"DRDO, Scientific Analysis Group, New Delhi 110054, India"}]},{"given":"M.","family":"Sethumadhavan","sequence":"additional","affiliation":[{"name":"TIFAC-CORE in Cyber Security, Amrita School of Engineering, Coimbatore 641112, Amrita Vishwa Vidyapeetham, India"}]}],"member":"1968","published-online":{"date-parts":[[2024,12,2]]},"reference":[{"key":"ref_1","first-page":"5861","article-title":"LESCA: Lightweight Encryption Scheme for Critical Applications in Internet of Things","volume":"10","author":"Noura","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Bhargavi, K.V.L., Srinivasan, C., and Lakshmy, K.V. (2021, January 12\u201315). Panther: A sponge based lightweight authenticated encryption scheme. Proceedings of the Cryptology\u2013INDOCRYPT 2021: 22nd International Conference on Cryptology in India, Jaipur, India.","DOI":"10.1007\/978-3-030-92518-5_3"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s13389-017-0160-y","article-title":"A review of lightweight block ciphers","volume":"8","author":"Hatzivasilis","year":"2018","journal-title":"J. Cryptogr. Eng."},{"key":"ref_4","first-page":"103531","article-title":"On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and SLIM","volume":"76","author":"Teng","year":"2023","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"3192","DOI":"10.1109\/JSYST.2022.3227951","article-title":"IVLBC: An Involutive Lightweight Block Cipher for Internet of Things","volume":"17","author":"Huang","year":"2022","journal-title":"IEEE Syst. J."},{"key":"ref_6","first-page":"4122","article-title":"LCB: Light Cipher Block An Ultrafast Lightweight Block Cipher For Resource Constrained IOT Security Applications","volume":"15","author":"Roy","year":"2021","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"193","DOI":"10.46586\/tosc.v2019.i2.193-217","article-title":"Reconstructing an S-box from its Difference Distribution Table","volume":"2019","author":"Dunkelman","year":"2019","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"e15257","DOI":"10.1016\/j.heliyon.2023.e15257","article-title":"On the resistance of new lightweight block ciphers against differential cryptanalysis","volume":"9","author":"Chan","year":"2023","journal-title":"Heliyon"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Imran, I.I. (2023, January 7\u20138). CNN-RNN Deep Learning Networks for Pattern Recognition Problems. Proceedings of the 2023 International Conference on Business Analytics for Technology and Security (ICBATS), Dubai, United Arab Emirates.","DOI":"10.1109\/ICBATS57792.2023.10111363"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"5574862","DOI":"10.1049\/2024\/5574862","article-title":"Automatic search of differential characteristics and improved differential cryptanalysis for PRINCE, QARMA, and MANTIS","volume":"2024","author":"Cui","year":"2024","journal-title":"IET Inf. Secur."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1186\/s42400-024-00220-0","article-title":"Revisiting the shuffle of generalized Feistel structure","volume":"7","author":"Chen","year":"2024","journal-title":"Cybersecurity"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Menezes, A.J., and Vanstone, S.A. (1991). Differential Cryptanalysis of DES-like Cryptosystems. Advances in Cryptology-CRYPTO\u2019 90, Springer.","DOI":"10.1007\/3-540-38424-3"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Cheng, H., and Ding, Q. (2012). Overview of the Block Cipher. Proceedings of the 2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control, Harbin, China, 8\u201310 December 2012, IEEE.","DOI":"10.1109\/IMCCC.2012.379"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Chakraborty, M., Chakrabarti, S., and Balas, V.E. (2020). Study on S-box Properties of Convolution Coder. Proceedings of International Ethical Hacking Conference 2019, Springer.","DOI":"10.1007\/978-981-15-0361-0"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Paillier, P., and Verbauwhede, I. (2007). PRESENT: An Ultra-Lightweight Block Cipher. Cryptographic Hardware and Embedded Systems\u2013CHES 2007, Springer.","DOI":"10.1007\/978-3-540-74735-2"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Ravi, V., Alazab, M., Soman, K.P., Srinivasan, S., Venkatraman, S., Pham, V., and Ketha, S. (2021). Deep Learning for Cyber Security Applications: A Comprehensive Survey. TechRxiv.","DOI":"10.36227\/techrxiv.16748161"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Benamira, A., Gerault, D., Peyrin, T., and Tan, Q.Q. (2021). A Deeper Look at Machine Learning-Based Cryptanalysis. Advances in Cryptology\u2014 EUROCRYPT 2021, Springer.","DOI":"10.1007\/978-3-030-77870-5_28"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Rajakumar, V., Lakshmy, K.V., and Srinivasan, C. (2023, January 8\u20139). Deep Learning Based Cryptanalysis on SLIM Cipher. Proceedings of the 2023 3rd International Conference on Innovative Sustainable Computational Technologies (CISCT), Dehradun, India.","DOI":"10.1109\/CISCT57197.2023.10351339"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Zeiler, M.D., Taylor, G.W., and Fergus, R. (2011, January 6\u201313). Adaptive deconvolutional networks for mid and high level feature learning. Proceedings of the 2011 International Conference on Computer Vision, Barcelona, Spain.","DOI":"10.1109\/ICCV.2011.6126474"},{"key":"ref_20","unstructured":"Chen, Y., and Yu, H. (2021). Bridging Machine Learning and Cryptanalysis via EDLCT. Cryptol. Eprint Arch., Available online: https:\/\/eprint.iacr.org\/2021\/705."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Gohr, A. (2019). Improving Attacks on Round-Reduced Speck32\/64 Using Deep Learning. Advances in Cryptology\u2014CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, 18\u201322 August 2019, Proceedings, Part II, Springer.","DOI":"10.1007\/978-3-030-26951-7_6"},{"key":"ref_22","first-page":"3","article-title":"A Cipher-Agnostic Neural Training Pipeline with Automated Finding of Good Input Differences","volume":"3","author":"Bellini","year":"2022","journal-title":"Cryptol. Eprint Arch."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Bassham, L.E., Rukhin, A.L., Soto, J., Nechvatal, J.R., Smid, M.E., Barker, E.B., Leigh, S.D., Levenson, M., Vangel, M., and Banks, D.L. (2010). SP 800-22 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications.","DOI":"10.6028\/NIST.SP.800-22r1a"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"384","DOI":"10.47839\/ijc.20.3.2284","article-title":"On the Statistical Analysis of ZUC, Espresso and Grain v1","volume":"20","author":"Shrivastava","year":"2021","journal-title":"Int. J. Comput."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/8\/4\/55\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T16:44:50Z","timestamp":1760114690000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/8\/4\/55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":24,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["cryptography8040055"],"URL":"https:\/\/doi.org\/10.3390\/cryptography8040055","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2024,12,2]]}}}