“…A proposed encryption scheme's security and safety are evaluated using well established techniques including statistical, linear, differential, or brute force attacks [12,13]. Here, we conduct rigorous tests to demonstrate the security of the proposed optimized Speck encryption.…”