{"id":"https://openalex.org/W7128594591","doi":"https://doi.org/10.3390/cryptography10010009","title":"MIND-Crypt: A Machine Learning Framework for Assessing the Indistinguishability of Lightweight Block Ciphers Across Multiple Modes of Operation","display_name":"MIND-Crypt: A Machine Learning Framework for Assessing the Indistinguishability of Lightweight Block Ciphers Across Multiple Modes of Operation","publication_year":2026,"publication_date":"2026-02-10","ids":{"openalex":"https://openalex.org/W7128594591","doi":"https://doi.org/10.3390/cryptography10010009"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography10010009","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10010009","pdf_url":"https://www.mdpi.com/2410-387X/10/1/9/pdf?version=1770717655","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/10/1/9/pdf?version=1770717655","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070459927","display_name":"Jimmy Dani","orcid":"https://orcid.org/0000-0002-7581-9104"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jimmy Dani","raw_affiliation_strings":["Department of Computer Science and Engineering, Texas A&M University, College Station, TX 77843, USA"],"raw_orcid":"https://orcid.org/0000-0002-7581-9104","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Texas A&M University, College Station, TX 77843, USA","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5098970411","display_name":"Kalyan Nakka","orcid":null},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kalyan Nakka","raw_affiliation_strings":["Department of Computer Science and Engineering, Texas A&M University, College Station, TX 77843, USA"],"raw_orcid":"https://orcid.org/0000-0002-3916-0939","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Texas A&M University, College Station, TX 77843, USA","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059730489","display_name":"Nitesh Saxena","orcid":"https://orcid.org/0000-0001-6083-104X"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nitesh Saxena","raw_affiliation_strings":["Department of Computer Science and Engineering, Texas A&M University, College Station, TX 77843, USA"],"raw_orcid":"https://orcid.org/0000-0001-6083-104X","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Texas A&M University, College Station, TX 77843, USA","institution_ids":["https://openalex.org/I91045830"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5070459927"],"corresponding_institution_ids":["https://openalex.org/I91045830"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25796776,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":"1","first_page":"9","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.8313000202178955,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.8313000202178955,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.052000001072883606,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.03530000150203705,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7339000105857849},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7193999886512756},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.703000009059906},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.621999979019165},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.6039999723434448},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.5375000238418579},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.48890000581741333}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7339000105857849},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7193999886512756},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.703000009059906},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6718000173568726},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.621999979019165},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.6039999723434448},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5559999942779541},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.5375000238418579},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48890000581741333},{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.4336000084877014},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.39149999618530273},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.36250001192092896},{"id":"https://openalex.org/C60448319","wikidata":"https://www.wikidata.org/wiki/Q154021","display_name":"Block cipher mode of operation","level":2,"score":0.3231000006198883},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3156000077724457},{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.2770000100135803},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.27619999647140503},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2757999897003174},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.2583000063896179},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.25209999084472656}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography10010009","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10010009","pdf_url":"https://www.mdpi.com/2410-387X/10/1/9/pdf?version=1770717655","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9db2f1a81da0491d81de48b6ea10554b","is_oa":false,"landing_page_url":"https://doaj.org/article/9db2f1a81da0491d81de48b6ea10554b","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 10, Iss 1, p 9 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography10010009","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10010009","pdf_url":"https://www.mdpi.com/2410-387X/10/1/9/pdf?version=1770717655","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1504610626","display_name":"Collaborative Research: SaTC: CORE: Medium: Bubble Aid: Assistive AI to Improve the Robustness and Security of Reading Hand-Marked Ballots","funder_award_id":"2154507","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4131819877","display_name":null,"funder_award_id":"2201465","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G424997876","display_name":null,"funder_award_id":"OAC-2139358","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7846119105","display_name":null,"funder_award_id":"CNS-2201465","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8256247773","display_name":null,"funder_award_id":"CNS-2154507","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8377161673","display_name":null,"funder_award_id":"2139358","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7128594591.pdf","grobid_xml":"https://content.openalex.org/works/W7128594591.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W158754850","https://openalex.org/W1566256432","https://openalex.org/W1846045953","https://openalex.org/W1937380053","https://openalex.org/W1988958837","https://openalex.org/W2064675550","https://openalex.org/W2085992264","https://openalex.org/W2087928947","https://openalex.org/W2183341477","https://openalex.org/W2194775991","https://openalex.org/W2477751631","https://openalex.org/W2799847377","https://openalex.org/W2922412026","https://openalex.org/W2949676527","https://openalex.org/W2969001071","https://openalex.org/W2998202868","https://openalex.org/W2998722477","https://openalex.org/W3026248346","https://openalex.org/W3192692153","https://openalex.org/W4226466313","https://openalex.org/W4306835869","https://openalex.org/W4320031225","https://openalex.org/W4361732743","https://openalex.org/W4379107693","https://openalex.org/W4383110287","https://openalex.org/W4385434343","https://openalex.org/W4387335033","https://openalex.org/W4408399697","https://openalex.org/W4416961946"],"related_works":[],"abstract_inverted_index":{"Indistinguishability":[0],"is":[1],"a":[2,67,111,213],"fundamental":[3],"principle":[4,20],"of":[5,15,41,54,108,121,249],"cryptographic":[6,119,169,275],"security,":[7],"crucial":[8],"for":[9,87,104,251],"securing":[10],"data":[11,37],"transmitted":[12],"between":[13,27],"Internet":[14],"Things":[16],"(IoT)":[17],"devices.":[18],"This":[19,49],"ensures":[21],"that":[22,176,188,229,269],"an":[23],"attacker":[24],"cannot":[25],"distinguish":[26],"the":[28,39,46,52,60,79,106,118,126,158,195,199],"encrypted":[29,44,156],"data,":[30],"also":[31],"known":[32],"as":[33],"ciphertext,":[34],"and":[35,81,128,136,218],"random":[36,185,225],"or":[38,171],"ciphertexts":[40,151,196,250],"two":[42,153],"messages":[43,155],"with":[45,66,157],"same":[47,159],"key.":[48],"research":[50],"investigates":[51],"ability":[53],"machine":[55],"learning":[56],"(ML)":[57],"to":[58,116,161,184,212,262],"assess":[59,117],"indistinguishability":[61,120,279],"property":[62],"in":[63,132,194,216],"encryption":[64,130],"systems,":[65],"focus":[68],"on":[69,245],"lightweight":[70,83,122,201],"ciphers.":[71,203],"As":[72],"our":[73],"first":[74],"case":[75],"study,":[76],"we":[77,98,237],"consider":[78],"SPECK32/64":[80,127],"SIMON32/64":[82,129],"block":[84,123,202,271],"ciphers,":[85,124],"designed":[86,115],"IoT":[88],"devices":[89],"operating":[90],"under":[91,139,285],"significant":[92],"energy":[93],"constraints.":[94],"In":[95],"this":[96],"research,":[97],"introduce":[99],"MIND-Crypt":[100],"(a":[101],"Machine-learning-based":[102],"framework":[103,114],"assessing":[105],"INDistinguishability":[107],"Cryptographic":[109],"algorithms),":[110],"novel":[112],"ML-based":[113,278],"specifically":[125],"algorithms":[131,165,242],"CBC,":[133],"CFB,":[134],"OFB,":[135],"CTR":[137],"modes,":[138],"Known":[140],"Plaintext":[141],"Attacks":[142],"(KPAs).":[143],"Our":[144,173],"approach":[145],"involves":[146],"training":[147],"ML":[148,164,178,241],"models":[149,206],"using":[150],"from":[152],"plaintext":[154,253],"key":[160],"determine":[162],"whether":[163],"can":[166],"identify":[167],"meaningful":[168,231],"patterns":[170,192,233],"leakage.":[172],"experiments":[174],"show":[175],"modern":[177],"techniques":[179],"consistently":[180],"achieve":[181],"accuracy":[182,222],"equivalent":[183],"guessing,":[186],"indicating":[187],"no":[189,230],"statistically":[190],"exploitable":[191],"exist":[193],"generated":[197],"by":[198],"considered":[200],"Although":[204],"some":[205],"exhibit":[207],"mode-dependent":[208],"bias":[209],"(e.g.,":[210],"collapsing":[211],"single-class":[214],"prediction":[215],"CBC":[217],"CFB),":[219],"their":[220,255,282],"overall":[221],"remains":[223],"at":[224],"guessing":[226],"levels,":[227],"reinforcing":[228,281],"distinguishing":[232],"are":[234,243],"learned.":[235],"Furthermore,":[236],"demonstrate":[238],"that,":[239],"when":[240],"trained":[244],"all":[246],"possible":[247],"combinations":[248],"given":[252],"messages,":[254],"behavior":[256],"reflects":[257],"memorization":[258],"rather":[259],"than":[260],"generalization":[261],"unseen":[263],"ciphertexts.":[264],"Collectively,":[265],"these":[266],"findings":[267],"suggest":[268],"existing":[270],"ciphers":[272],"have":[273],"secure":[274],"designs":[276],"against":[277],"assessments,":[280],"security":[283],"even":[284],"round-reduced":[286],"conditions.":[287]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-02-11T00:00:00"}
