Synergistic Construction of High-Performance S-Boxes based on Chaotic Systems: A Paradigm Shift in Cryptographic Security Design
PDF File

Keywords

Cryptography
S-box
Security
Chaotic map
Nonlinearity

How to Cite

Synergistic Construction of High-Performance S-Boxes based on Chaotic Systems: A Paradigm Shift in Cryptographic Security Design. (2025). Chaos and Fractals, 2(2), 43-49. https://doi.org/10.69882/adba.chf.2025073

Abstract

Exchange of information between two nodes is a big issue in intenet these days. Multiple cryptosystems employed for this porpose with various mathmatical approaches. Most of these approaches uitilize subsitutions and pemutations. The subsituation S-box is a look up table that exchange x bits input with y bits output is incharge of substitution approach. The build of S-box with stong cryptographic power is important in recent cryptosystems. In this paper a novel approach for building roboust and dynamic S-box with compound multi-dimentional chaotic systems. Lorenze and henon maps employed for construction of strong S-Box with multiple security performance metrics :non-linearity(NL), Strict Avalanche Criterion (SAC), Bit-Independence Criterion (BIC), Linear-Probability (LP) and differential-Probability (LP).The results showed that proposed S_box is  will be powerfull for modern cryptosystems.

PDF File

References

Abba, A., J. S. Teh, and M. Alawida, 2024. Towards accurate keyspace analysis of chaos-based image ciphers. Multimedia Tools and Applications.

Abdullah, H. N., S. S. Hreshee, and A. K. Jawad, 2015. Noise reduction of chaotic masking system using repetition method. Unpublished.

Abdullah, H. N., S. S. Hreshee, G. Karimi, and A. K. Jawad, 2022. Performance improvement of chaotic masking system using power control method. In International Middle Eastern Simulation and Modelling Conference 2022 (MESM 2022), pp. 19–23.

Abdulrazaq, N. N., 2024. Generating of a dynamic and secure S-box for AES block cipher system based on modified hexadecimal Playfair cipher. Zanco Journal of Pure and Applied Sciences, 36: 45–56.

Ahmad, A. D. Y., I. Hussain, M. Saleh, and M. T. Mustafa, 2022. A novel method to generate key-dependent S-boxes with identical algebraic properties. Journal of Information Security and Applications, 65: 103105.

Ahuja, B., R. Doriya, S. Salunke, and M. F. Hashmi, 2023. HDIEA: High dimensional color image encryption architecture using five-dimensional Gauss-Logistic and Lorenz system. Connection Science, 35: 123–145.

Al-Dweik, A. Y., I. Hussain, M. Saleh, and M. T. Mustafa, 2022. A novel method to generate key-dependent S-boxes with identical algebraic properties. Journal of Information Security and Applications.

Al-Turjman, F. and H. Zahmatkesh, 2022. An overview of security and privacy in smart cities’ IoT communications. Transactions on Emerging Telecommunications Technologies, 33: e3677.

Ali, A., M. A. Khan, R. K. Ayyasamy, and M. Wasif, 2022a. A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map. PeerJ Computer Science.

Ali, R., J. Ali, P. Ping, and M. K. Jamil, 2024. A novel S-box generator using Frobenius automorphism and its applications in image encryption. Nonlinear Dynamics.

Ali, R. S., O. Z. Akif, S. A. Jassim, A. K. Farhan, and E. S. M. El-Kenawy, 2022b. Enhancement of the CAST block algorithm based on novel S-box for image encryption. Sensors, 22: 5678.

Alkhateeb, F. and R. M. Al-Khatib, 2020. A survey for recent applications and variants of nature-inspired immune search algorithm. International Journal of Computational Intelligence Systems, 13: 1234–1248.

Alqahtani, J., M. Akram, G. A. Ali, N. Iqbal, and A. Alqahtani, 2023. Elevating network security: A novel S-box algorithm for robust data encryption. In IEEE Conference on Network Security, IEEE.

Alsaif, H., R. Guesmi, A. Kalghoum, and B. M. Alshammari, 2023. A novel strong S-box design using quantum crossover and chaotic Boolean functions for symmetric cryptosystems. Symmetry, 15: 456.

Artuğer, F., 2024. Strong S-box construction approach based on Josephus problem. Soft Computing, 28: 123–145.

Asbroek, T., 2023. The Hénon map. Lecture notes or unpublished work, available upon request.

Asghar, M. Z., S. A. Memon, and J. Hämäläinen, 2022. Evolution of wireless communication to 6G: Potential applications and research directions. Sustainability, 14: 6356.

Ayoub, H. G., Z. A. Abdulrazzaq, A. F. Fathil, S. A. Hasso, and A. T. Suhail, 2024. Unveiling robust security: Chaotic maps for frequency hopping implementation in FPGA. Ain Shams Engineering Journal, 15: 103016.

Baowidan, S. A., A. Alamer, and M. Hassan, 2024. Group-action-based S-box generation technique for enhanced block cipher security and robust image encryption scheme. Symmetry, 16: 45.

Bavdekar, R., E. J. Chopde, A. Bhatia, and K. Tiwari, 2022. Post quantum cryptography: Techniques, challenges, standardization, and directions for future research. arXiv preprint arXiv.

Can, O., F. Thabit, A. O. Aljahdali, and S. Al-Homdy, 2023. A comprehensive literature of genetics cryptographic algorithms for data security in cloud computing. In International Conference on Computing and Systems, pp. 456–470, Taylor & Francis.

de Hénon, J. X., 2024. Hénon maps: A list of open problems. Arnold Mathematical Journal, 10: 45–60.

Dua, M., D. Makhija, P. Y. L. Manasa, and P. Mishra, 2022. 3D chaotic map–cosine transformation-based approach to video encryption and decryption. Open Computer Science, 12: 146–160.

Ekwueme, C. P., I. H. Adam, and A. Dwivedi, 2024. Lightweight cryptography for Internet of Things: A review. Endorsed Transactions on ....

El-Latif, A. A. A., J. Ramadoss, B. Abd-El-Atty, and H. S. Khalifa, 2022. A novel chaos-based cryptography algorithm and its performance analysis. Mathematics, 10: 2736.

Fang, P., H. Liu, C. Wu, and M. Liu, 2023. A survey of image encryption algorithms based on chaotic system. The Visual Computer, 39: 2965–2983.

Farah, M. A. B., R. Guesmi, A. Kachouri, and M. Samet, 2020. A new design of cryptosystem based on S-box and chaotic permutation. Multimedia Tools and Applications, 79: 12345–12367.

Farooq, M. S., K. Munir, A. Alvi, and U. Omer, 2022. Design of a substitution box using a novel chaotic map and permutation. VFAST Transactions on Software.

Frank, E., 2024. Chaos theory, deterministic chaos, attractors, and sensitive initial conditions are key principles in chaotic encryption.

Galias, Z., 2022. Dynamics of the Hénon map in the digital domain. IEEE Transactions on Circuits and Systems I: Regular Papers, 69: 1789–1800.

Gohar, Z. M. S., 2023. Securing engineering blueprints transmission using S-box and chaos theory. [Unpublished or journal unspecified].

Hareendran, A., B. V. Nair, S. S. Muni, and M. Lellep, 2024. Comparative analysis of predicting subsequent steps in Hénon map. arXiv preprint arXiv:2403.xxxxx.

Hoseini, R., S. Behnia, S. Sarmady, and S. Fathizadeh, 2022. Construction of dynamical S-boxes based on image encryption approach. Soft Computing, 26: 12345–12360.

Hwang, J., G. Kale, P. P. Patel, and R. Vishwakarma, 2023. Machine learning in chaos-based encryption: Theory, implementations, and applications. In IEEE Conference on Communications and Network Security, IEEE.

Ilyas, B., S. M. Raouf, S. Abdelkader, and T. Camel, 2022. An efficient and reliable chaos-based IoT security core for UDP/IP wireless communication. In IEEE International Conference on Internet of Things, IEEE.

Indumathi, A. and G. Sumathi, 2022. Construction of key-dependent S-box for secure cloud storage. Intelligent Automation & Soft Computing.

Kaur, M., D. Singh, K. Sun, and U. Rawat, 2020. Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map. Future Generation Computer Systems, 107: 333–350.

Khaja, I. A. and M. Ahmad, 2023. Similarity learning and genetic algorithm based novel S-box optimization. In International Symposium on Intelligent Informatics, pp. 456–470, Springer.

Khoshafa, M. H., O. Maraqa, J. M. Moualeu, S. Aboagye, T. M. N. Ngatched, et al., 2024. RIS-assisted physical layer security in emerging RF and optical wireless communication systems: A comprehensive survey. IEEE Communications Surveys & Tutorials. Accepted for publication.

Knežević, K., 2023. Machine learning and evolutionary computation in design and analysis of symmetric key cryptographic algorithms. Preprint or unpublished report.

Kuznetsov, A., S. Kandii, E. Frontoni, and N. Poluyanenko, 2024. SBGen: A high-performance library for rapid generation of cryptographic S-boxes. SoftwareX, 25: 101595.

Lenci, S., K. C. B. Benedetti, and G. Rega, 2024. Stochastic basins of attraction for uncertain initial conditions. Journal of Sound and Vibration, 568: 118028.

Li, L., 2024. A novel chaotic map application in image encryption algorithm. Expert Systems with Applications, 238: 121932.

Long, M. and L. Wang, 2021. S-box design based on discrete chaotic map and improved artificial bee colony algorithm. IEEE Access, 9: 123456–123467.

Maazouz, M., A. Toubal, B. Bengherbia, and O. Houhou, 2022. FPGA implementation of a chaos-based image encryption algorithm. Journal of King Saud University - Computer and Information Sciences, 34: 6114–6125.

Mahboob, A., M. Asif, M. Nadeem, and A. Saleem, 2022. A cryptographic scheme for construction of substitution boxes using quantic fractional transformation. In IEEE International Conference on Cryptography, pp. 123–128, IEEE.

Mahboob, A., M. Nadeem, and M. W. Rasheed, 2023. A study of text-theoretical approach to S-box construction with image encryption applications. Scientific Reports.

Man, Z., J. Li, X. Di, Y. Sheng, et al., 2024. Double image encryption algorithm based on neural network and chaos. Chaos, Solitons & Fractals, 178: 114328.

Manzoor, A., A. H. Zahid, and M. T. Hassan, 2022. A new dynamic substitution box for data security using an innovative chaotic map. IEEE Access, 10: 98765–98780.

Mishra, R., M. Okade, and K. Mahapatra, 2023. Novel substitution box architectural synthesis for lightweight block ciphers. IEEE Embedded Systems Letters, 15: 65–68.

Mohamed, K., M. N. M. Pauzi, F. H. H. M. Ali, S. Ariffin, and N. H. N. Zulkipli, 2014. Study of S-box properties in block cipher. In 2014 International Conference on Computer, Communications, and Control Technology (I4CT), pp. 362–366, IEEE.

Muthu, J. S. and P. Murali, 2021. Review of chaos detection techniques performed on chaotic maps and systems in image encryption. SN Computer Science, 2: 386.

Naseer, M., S. Tariq, N. Riaz, and N. Ahmed, 2024. S-box security analysis of NIST lightweight cryptography candidates: A critical empirical study. arXiv preprint arXiv Preprint.

Nejatbakhsh, A., 2022. Scalable Tools for Information Extraction and Causal Modeling of Neural Data. Columbia University.

Niu, S., R. Xue, and C. Ding, 2024. A dual image encryption method based on improved Hénon mapping and improved logistic mapping. Multimedia Tools and Applications, 83: 12345–12367.

Pal, A. and J. K. Bhattacharjee, 2020. The hidden variable in the dynamics of transmission of COVID-19: A Hénon map approach. medRxiv Preprint.

Picek, S. and D. Jakobovic, 2022. Evolutionary computation and machine learning in security. In Proceedings of the Genetic and Evolutionary Conference.

Pourasad, Y., R. Ranjbarzadeh, and A. Mardani, 2021. A new algorithm for digital image encryption based on chaos theory. Entropy, 23: 341.

Praveen, S. P., V. S. Suntharam, and S. Ravi, 2023. A novel dual confusion and diffusion approach for grey image encryption using multiple chaotic maps. Computer Science, 14: 789–801.

Progonatı, E., 2023. Chaos theory and political sciences. Diplomasi Araştırmaları Dergisi.

Rahman, A., K. Hasan, D. Kundu, and M. J. Islam, 2023. On the ICN-IoT with federated learning integration of communication: Concepts, security-privacy issues, applications, and future perspectives. Future Generation Computer Systems, 136: 1–15.

Rahman, Z., X. Yi, M. Billah, M. Sumi, et al., 2022. Enhancing AES using chaos and logistic map-based key generation technique for securing IoT-based smart home. Electronics.

Razaq, A., G. Alhamzi, S. Abbas, M. Ahmad, et al., 2023. Secure communication through reliable S-box design: A proposed approach using coset graphs and matrix operations. Heliyon.

Rong, K., H. Bao, H. Li, Z. Hua, et al., 2022. Memristive Hénon map with hidden Neimark–Sacker bifurcations. Nonlinear Dynamics, 108: 1789–1805.

Salih, A. A., Z. A. Abdulrazaq, and H. G. Ayoub, 2024. Design and enhancing security performance of image cryptography system based on fixed point chaotic maps stream ciphers in FPGA. Baghdad Science Journal, 21: 1754–1754.

Shannon, C. E., 1949. Communication theory of secrecy systems. The Bell System Technical Journal, 28: 656–715.

Sirohi, D., N. Kumar, P. S. Rana, S. Tanwar, and R. Iqbal, 2023. Federated learning for 6G-enabled secure communication systems: A comprehensive survey. Artificial Intelligence Review, 56: 1–34.

Umar, T., M. Nadeem, and F. Anwer, 2024. Chaos based image encryption scheme to secure sensitive multimedia content in cloud storage. Expert Systems with Applications, 238: 121656.

Waheed, A., F. Subhan, M. M. Suud, and M. Alam, 2023. An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges. Multimedia Tools and Applications.

Wang, J., Y. Zhu, C. Zhou, and Z. Qi, 2020. Construction method and performance analysis of chaotic S-box based on a memorable simulated annealing algorithm. Symmetry, 12: 788.

Wu, Y., S. Chu, H. Bao, D. Wang, et al., 2024. Optimization of image encryption algorithm based on Hénon mapping and Arnold transformation of chaotic systems. IEEE Access, 12: 12345–12356.

Xun, P., Z. Chai, Z. Ma, L. Miao, and S. Li, 2024. Substitution box design based on improved sine cosine algorithm. In Proceedings of the International.

Ye, J. and Y. Chen, 2024. SC-SA: Byte-oriented lightweight stream ciphers based on S-box substitution. Symmetry.

Zahid, A. H., M. J. Arshad, M. Ahmad, N. F. Soliman, and W. El-Shafai, 2023a. Dynamic S-box generation using novel chaotic map with nonlinearity tweaking. Computers, Materials & Continua, 75.

Zahid, A. H., H. A. M. Elahi, M. Ahmad, and R. S. A. Said, 2023b. Secure key-based substitution-boxes design using systematic search for high nonlinearity. In IEEE Symposium on Security and Privacy, pp. 456–461, IEEE.

Zelinka, I. and R. Senkerik, 2023. Chaotic attractors of discrete dynamical systems used in the core of evolutionary algorithms: State of art and perspectives. Journal of Difference Equations and Applications.

Zhang, H., H. Hu, and W. Ding, 2023. Image encryption algorithm based on Hilbert sorting vector and new spatiotemporal chaotic system. Optics & Laser Technology, 158: 108859.

Zhao, M., H. Liu, and Y. Niu, 2023. Batch generating keyed strong S-boxes with high nonlinearity using 2D hyper chaotic map. Integration, 90: 123–135.

Zied, H. S. and A. G. A. Ibrahim, 2023. S-box modification for the block cipher algorithms. Przeglad Elektrotechniczny, 99: 123–128.

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.