Figures
Abstract
A close study about the varied anatomies of the S-Box algorithms published in the literature indicates that no attempt has been made using the notion of 3D. To cement the more cryptographic security, this research article ventures to present a novel S-Box algorithm exploiting the notion of 3D. First of all, the algorithm initializes a 3D scrambled S-Box with the value of -1. After that, a 1D array is initialized with all the numbers of the potential S-Box. Now, the values placed in the 1D array are inserted randomly to the different cells of the 3D scrambled S-Box until all the numbers from the 1D array are not shifted. The way, the S-Box has been developed bears an ample promise to raise the inherent non-linearity of the required S-Box which, in turn, equips the S-Box to defy the potential cryptanalytic threats from the hackers and other adversaries. Lorenz chaotic system has been employed to produce streams of random numbers. Through rigorous analysis and experimentation, we demonstrate the efficacy of our approach in enhancing cryptographic security, offering robust protection against various cyber threats. Our research contributes to the advancement of S-Box design methodologies, providing a promising avenue for strengthening encryption algorithms in contemporary cryptographic systems. Potential real-world applications include secure communications in IoT devices, encryption in smart grid infrastructures, and data protection in medical imaging systems.
Citation: Ahmad Khan N, Banga A, Ghazal TM, Alabdullah B, Iqbal N, Alshamayleh A, et al. (2025) Unveiling a novel S-Box strategy: The dynamic 3D scrambling approach. PLoS One 20(9): e0329024. https://doi.org/10.1371/journal.pone.0329024
Editor: Agbotiname Lucky Imoize, University of Lagos Faculty of Engineering, NIGERIA
Received: January 30, 2025; Accepted: July 9, 2025; Published: September 2, 2025
Copyright: © 2025 Ahmad Khan et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: All relevant data are within the paper.
Funding: The author(s) received no specific funding for this work.
Competing interests: The authors have declared that no competing interests exist.
1 Introduction
In the realm of modern cryptography, design and implementation of robust encryption algorithms play a pivotal role in ensuring the security and confidentiality of sensitive information transmitted over digital networks. Cryptographers have shown growing interest in the critical issue of security, as evidenced by recent studies [1–7]. One fundamental component of many encryption schemes is the substitution box (S-Box), which is responsible for introducing nonlinear transformations to plaintext data, thereby enhancing the resistance of cryptographic systems against various attacks. The effectiveness of an S-Box hinges on its ability to introduce confusion and diffusion, two essential properties that thwart cryptanalysis attempts.
Traditionally, S-Boxes have been constructed using mathematical permutations and substitutions, with a focus on achieving high non-linearity and resistance against differential and linear cryptanalysis. However, as cryptographic standards evolve and computational capabilities advance, the need for more sophisticated and resilient S-Box designs becomes increasingly apparent. In the recent decade, cryptography experts have investigated many novel approaches for the construction of S-Boxes. These approaches span chaos theory [8], abstract algebra [9], Latin square [10] and even games [11]. Following are the few areas where S-Boxes are often embedded to boost the security measures.
- Block ciphers: S-Boxes have assumed much importance during the development of block ciphers. In these ciphers, they cause non-linearity, confusion and diffusion thus enhancing the security for the varied products. These boxes work on some fixed-size blocks of plaintext and render the corresponding ciphertext blocks with the equal size. Many block cipher algorithms have been developed in the past like DES, AES, Blowfish etc [12].
- Stream ciphers: Stream ciphers are an other security paradigm where the intrinsic potential of non-linearity being contained by the S-Boxes is exploited to encrypt or decrypt data streams continuously, bit by bit or byte by byte. Such ciphers are often deployed where data needs to be sent in some real time scenario like streaming, internet telephony of wireless communication [13].
- Cryptographic hash functions: This is yet another area where S-Boxes are deployed frequently. Cryptographic hash functions are part of many critical security products like digital signatures, password storage, and data integrity verification [14]. These functions fundamentally inject non-linearity and increase the avalanche effect, ensuring that small changes in input result in significant changes in the output hash value.
- Message Authentication Codes (MACs): S-Boxes are also used in MAC algorithms to guarantee integrity and authenticity assurances for transmitted messages [15]. Besides, they are used to create a fixed-size tag from the message and a secret key. This tag is later on verified by the recipient using the same key.
- Public key cryptography: Although S-Boxes are not as prevalent in public key cryptography compared to its symmetric key counterpart, they are still employed in certain asymmetric encryption or signature schemes to boost security effects [22].
- Digital signatures: S-Boxes may play an important role while imparting security in the process of digital signatures. For instance, they may be used as a security component in the signing process in order to introduce non-linearity and randomness. In this way, it would become computationally infeasible for the hacker to forge a signature without having a knowledge of the secret key [17].
- Secure multi-party computation: A secure multi-party computation is an another area where the inherent potential of S-Box may be tapped [18]. Its deployment will ensure confidentiality and privacy when multiple parties compute some function jointly over their inputs while ensuring secrecy from each other.
- Quantum cryptography: In emerging domain of quantum cryptography, these S-Boxes hold potential for their applications. For instance, their deployment can enhance the security of quantum key distribution (QKD) protocols. These protocols utilize the principles of quantum mechanics to secure communication channels against eavesdropping and ensure the integrity of transmitted quantum information. S-Boxes may be employed to introduce non-linearity and confusion in quantum cryptographic schemes, contributing to the overall security of quantum communication networks [19].
In the last two decades, many S-Box algorithms have been developed. For instance, the work [20] wrote a novel algorithm to design 8 × 8 S-Boxes employing the constructs of discrete-space chaotic map and cuckoo search (CS) algorithm. The reported approach employed a 1D discrete-space chaotic map along with enormous key space for designing the required S-Boxes. By exploiting the inherent potential of improved artificial bee colony algorithm and discrete chaotic map, the study [21] designed chaotic S-Boxes. The peculiar modus operandi of the stated S-Box works like this. Firstly, the required S-Box was initialized through the opposition-based optimization. Secondly, in order to optimize the population, algorithm of transposition artificial bee colony (dual) was utilized. Besides, the Gaussian swap was engaged to cement the optimum efficiency. It is to be noted that opposition-based optimization performed self-learning for obtaining the better population. This happened due to the involvement of Gaussian mutation operator. The performance evaluation demonstrated that the suggested S-Box scheme rendered better results based on the varied evaluation metrics like bijection, strict avalanche criterion (SAC), non-linearity, bit independence criterion (BIC), I / O XOR distribution and linear approximation probability (LP).
In this article, we present a pioneering method for constructing a novel S-Box algorithm that harnesses the power of dynamic and unpredictable processes to enhance cryptographic security. Our approach leverages the principles of chaos theory and 3D scrambled approach to generate S-Boxes with superior non-linearity, confusion, and diffusion properties. By incorporating elements of randomness and unpredictability into the S-Box generation process, we aim to fortify encryption algorithms against emerging threats in the digital landscape.
The remainder of this article is organized as follows: in Sect 2, we provide an overview of the fundamental principles of S-Box design and the importance of non-linearity and diffusion in cryptographic systems. In Sect 3, we describe the Lorenz chaotic system which produces the stream of random numbers to carry out the logic of the suggested S-Box algorithm. Sect 4 presents our proposed methodology for generating novel S-Box algorithm based on chaotic system and the 3D scrambled approach. In Sect 5, we evaluate the performance and security of our approach through rigorous testing and analysis. A thorough discussion along with a comparison with other relevant studies has been made in the Sect 6. Conclusion and potential avenues for future exploration are addressed in the Sects 7 and 8.
2 Related work
A study of literature review about the security reveals that many S-Boxes have been developed in the past to impart security to the different products. For instance, the work [22] developed randomized S-Boxes which utilizes random-restart hill-climbing algorithm. Moreover, the reported work optimizes the inherent non-linearity of Boolean function with bijectivity constraints. One of the salient features of this new algorithm is that it reduced the computational overhead in a dramatic fashion. Apart from that, this algorithm struck a proper equilibrium among the three design principles of S-Boxes, i.e., speed of construction, dynamicity and cryptographic strength.
In an other study [23], a work has been presented for both the S-Box and the permutation box (P-Box). These twin purposes have been realized through the fusion of inversion map and symmetric group on Galois field. The reported method rendered a lot of non-linear substitution permutation boxes which of course, are furnished with the properties of diffusion as well as confusion. Apart from that, in the study [24], the notion of Rabinovich-Fabrikant (RF) system of coupled ordinary differential equations has been exploited for the construction of S-Box. As the modus operandi of the work, first of all, by sparking the said system of differential equations, random integers have been spawned. After that, these integers values have been scrambled to get the highly nonlinear chaotic S-Box. One of the main benefits of the designed algorithm is that, a just slight tempering in the initial values of the parameters of RF system can deliver an array of different cryptographically strong S-Boxes. Additionally, varied statistical and algebraic analyses have been carried out to gauge the performance of the novel S-Boxes. The authors of the reported work contend that the analyses contain very bright statistics which bear much importance of its potential applications in the domain of secure communications.
By synergizing the constructs of modular operations and heuristic evolution strategy, the work [25] came up with a novel algorithm for generating dynamic S-Boxes with high non-linearity. Besides, according to the contention of the authors of the reported work, plethora of robust S-Boxes can be developed just by a slight altering in the initial values of the proposed method. As the given algorithm was simulated, a specimen S-Box was generated. Moreover, its performance was evaluated against the state of the art benchmarks and criteria like bit independence criterion, differential uniformity, strict avalanche criterion, non-linearity, linear probability, and fixed points etc. Additionally, the S-Box was also employed in the encryption of digital images to demonstrate its significance in the real world problems. By spawning the pseudo-random sequences using the Gaussian distribution, the research [26] developed a novel algorithm for constructing dynamic S-Boxes. The authors of this work claim that their novel technique has overcome the intrinsic weakness of varied existing S-Boxes using the theory of chaos. In contrast to that, their work has leveraged the robustness of the pseudo-randomness sequences. Moreover, very low non-linearity was assessed in the proposed S-Boxes. This weakness has been addressed by using the genetic algorithms (GA) in order to maximize the non-linearity of Gaussian distribution-based S-Boxes. Lastly, the thorough security analysis of the given technique indicates that the proposed S-Boxes are equipped with ample promise for their application in the varied cyber security areas. Moreover, the work [27] came up with an S-Box algorithm through the usage of scaled Zhongtang chaotic system. Besides, the bits given by the random number generator were subjected to the NIST test series. All the tests were successfully passed. Additionally, the S-Box so written was tested based on the validation metrics like strict avalanche criteria, differential approximation probability, bit independence criteria, non-linearity, etc. Lastly, upon comparing the suggested S-Box with other published works, it was found that the suggested S-Box is furnished with more effective and stronger security. Moreover, the Table 1 shows some relevant works with their descriptions.
3 Lorenz chaotic system
Edward Lorenz in 1960 came up with a novel chaotic system dubbed as Lorenz system after his name. Nonlinear system of ordinary differential equations written below characterize this chaotic system. Apart from that, it is dynamical system [34]:
In the above set of equations, the variables σ, ρ and β correspond to the control parameters. Besides, state variables of this dynamical system are x,y,z. Using Runge–Kutta methods such as the RK45 [35], System (1) is commonly solved numerically. Additionally, other methods can also be applied. The chaotic attractors of both the 2D and 3D have been drawn in the Fig 1.
The Lorenz chaotic system was chosen due to its strong sensitivity to initial conditions, complex dynamic behavior, and proven unpredictability—qualities that are highly desirable in cryptographic applications. Compared to other chaotic maps, the Lorenz system offers a higher degree of randomness and a broader state space, which enhances the security of the generated keys [34]. Its continuous-time nature also enables more granular control in generating pseudo-random sequences. These attributes collectively contribute to the robustness of the proposed S-Box design.
Apart from that, the Figs 2 and 3 show the bifurcation diagram and the Lyapunov exponents of the reported chaotic system.
4 Proposed S-Box algorithm
As cryptographic threats evolve, the design of S-Boxes must continually advance to ensure robust security. Motivated by this need, our proposed methodology explores a novel approach based on three-dimensional (3D) structures.
The 3D structure introduces an additional layer of complexity in the substitution process, which significantly increases the non-linearity and confusion characteristics of the S-Box. Unlike traditional 2D S-Boxes that operate within a planar mapping framework, our 3D approach leverages spatial transformations across three axes, enabling a broader permutation space and more intricate scrambling of input-output relationships. This added dimensionality not only complicates the reverse engineering efforts of potential attackers but also helps resist various cryptanalytic attacks such as linear and differential cryptanalysis.
The suggested S-Box algorithm has been developed for some arbitrary square dimensions say ϕ × ϕ. This algorithm has been developed upon the idea of dynamic 3D scrambled S-Box. First of all, a “raw” S-Box is created with the values of 0 to − 1. All the cells of this 3D box are initialized with the value of -1. Now, these values have been placed randomly over the arbitrary cells of the dynamic 3D scrambled S-Box. There are ample chances that some cells would have already been filled due to which a collision may occur so, a filter has been embedded to avoid such collision. After that, the remaining integers of the S-Box are inserted in the empty cells of 3D scrambled S-Box. Fig 4 shows these steps in a systematic fashion. Now, we will formally detail all the steps of the suggested algorithm.
Call the Algorithm 1 with the list of parameters x0, y0, z0, σ, ρ, β, ϕ, υ, ψ.
Step 1: As the Lorenz Chaotic System (1) is sparked, three arrays of random data, i.e., x, y and z are spawned. The arrays so obtained are not suitable for the particular logic of the algorithm, so they have been further processed to set of equations. In this way, three new arrays were obtained namely hori, verti and depth each of size (Lines 2 - 4).
Step 2: Line 5 creates a “raw” S-Box named as .
Step 3: Lines 6 - 12 initialize a 3D scrambled S-Box with the value of -1. Its name is S − with the dimensions of
×
×
. We may observe here that the variables υ and ψ can assume any value unless they comply with
and
. In this way, we may have more than one dynamically created 3D scrambled S-Boxes. This act will enhance the security effects. If we multiply
,
and
, same number of values for the original S-Box of size
will be obtained.
Step 4: Line 13 loops the index iterator which iterates from 1 to . In each iteration, it assigns the
values of streams hori, verti and depth to the temporary variables p, q and r respectively. Line 17 carries out a very critical task. If the if condition at the line 17 evaluates to be true, the
value from the S–Box gets assigned to the scrambled S −
at the position (p,q,r). Line 19 assigns S–Box the value of -1 at the index iteraotr to keep track its used values.
Step 5: As soon as the integers from the linear array S–Box get transferred to the 3D scrambled S-Box S − , the algorithm shifts the left over integers of S −
to the empty cells of S −
(Lines 22 - 35). Reshape this scrambled 3D S-Box S −
to S −
and return it. Fig 5 shows the shifting of integers from the 1D S-Box to its 3D scrambled counterpart in an intuitive way.
Algorithm 1. Proposed 3D S-Box algorithm.
Input: x0, y0, z0, σ, ρ, β, ϕ, υ, ψ
Output: S −
1: Iterate the chaotic system (1) to generate ,
and
.
Here
. To avoid the
transient effect of the chaotic map, the first n0 values are
neglected.
2:
Horizontal index calculation
3:
Vertical index calculation
4:
Depth index calculation
5: Set S −
Set S–Box array
to the “raw” numbers
6: for to
do
7: for to
do
8: for to
do
9: S −
Initialize 3D scrambled
S − with -1
10: end for
11: end for
12: end for
13: for to
do
14:
15:
16:
17: if S − then
18: S −
Shift the numbers
from S–Box to the 3D scrambled S − at the position
(p,q,r)
19: S −
20: end if
21: end for
22:
23: for to
do
24: for to
do
25: for to
do
26: if S − then
27: while do
28:
29: end while
30: S −
Put remaining
values of S–Box to 3D scrambled S −
31:
32: end if
33: end for
34: end for
35: end for
36: Reshape S − to
and return S −
Example 1. In order to understand the proposed algorithm in a better way, here a toy example will be given.
Suppose we take the values as and
.
Suppose again that the arrays hori, verti and depth are filled as (Lines 2 - 4).
S −
(Line 5).
As the lines 6-12 execute, the scrambled S-Box S − is filled as shown in the Fig 6.
After the execution of the lines 13-21, the partially scrambled S-Box S − is filled as shown in the Fig 7.
Next, the state of S-Box is shown in the Fig 8 after the execution of the lines 22–35. This is how scrambling is being realized in this study.
5 Simulation and security analyses
Upon calling the Algorithm 1 with the values {0.2895, 0.3051, 0.9277, 10, 28,8/3, 16, 8, 4}, the S-Box so generated can be viewed in the Table 2.
Merely creating cryptographic products is insufficient; they must undergo rigorous evaluation against the prevalent standards, criteria, and benchmarks established by security experts, cryptographers, and analysts. Here, we will showcase the resilience and effectiveness of suggested S-Box by subjecting it to such assessments. These include differential probability (DP), Strict Avalanche Criterion (SAC), bijectivity, linear probability (LP), non-linearity (NL), and Bit Independence Criterion (BIC) [36].
5.1 Bijectivity
In general, a P × P S-Box is considered bijective in character and orientation when it encompasses unique integers [37]. Moreover, these integers are confined in the range [0,2P–1]. Table 2 evidently satisfies bijectivity criterion.
5.2 Non-linearity
From time to time, hackers may attempt linear cryptanalysis attacks on security products [38]. To mitigate this risk, the developed S-Boxes must incorporate a significant degree of non-linearity. If a linear mapping exists between ciphertext and the corresponding plaintext, adversaries and other opponents can exploit the employed S-Box. To assess potential non-linearity of an n-bit Boolean function, denoted as b(k), mathematical equation written below (2) is normally utilized [39].
In accordance to this equation, WSb(h) denotes the Walsh spectrum of a specified function b. Additionally, subsequent mathematical expression aids in computing non-linearity of an n-bit Boolean function b(k).
According to the above equation, . Additionally, h.x corresponds to dot product of x and h. The following gives more expressive form of this dot product
106, 106, 108, 108, 106, 108, 108, and 104 are non-linearity values for suggested S-Box. Additionally, the minimum, maximum, and average values are 104, 108, and 106.75, respectively. Furthermore, one can view all eight constituent Boolean functions giving the non-linearity values in Table 3.
5.3 Strict Avalanche Criterion (SAC)
This benchmark states that upon changing only one input bit n, 0.5 probability ought to be there that ensuing resultant bit m will alter accordingly [39]. In simpler terms, if SAC result is approximated to 0.5, S-Box under consideration possesses an adequate level of randomness and chaotic behavior. Additionally, Table 4 displays the calculated results of the novel S-Box. Sometimes, it is dubbed as a dependence matrix. Moreover, average SAC result for suggested S-Box calculates to be 0.4989, satisfying established criterion.
5.4 Bit Independence Criterion (BIC)
This is a yet another security parameter used by the experts to judge the robustness of some S-Box. It checks whether a change in a specific input bit, denoted as q, leads to distinct changes in output bits r and s [39]. If such a separation of output bits occurs, the S-Box is deemed successful in its objective. To fulfill this criterion, the constituent Boolean functions of the S-Box must adhere to non-linearity conditions. The computation of mathematical expression −
is conducted for all inputs of p which spans from 0 to 255 inclusive. In this expression, T represents the S-Box. It is to be noted that q and p differ by only one bit in the process of this evaluation.
Apart from that, the efficacy of some S-Box is gauged by finding average BIC-SAC values which has been found for the entire input values, with values near 0.5. This value indicates an optimal performance of the S-Boxes. Tables 5 and 6 delineate the benchmark employed for assessing SAC and non-linearity for Boolean functions within the suggested S-Box. Additionally, average non-linearity and SAC results for the suggested S-Box are 103.25 and 0.5064 in a respective fashion.
According to the study [40] which was done by Carlisle and Stafford , an S-Box satisfying non-linearity and SAC benchmarks is thought of as fulfilling the requisite BIC property. For suggested S-Box, results of 103.25 and 0.5064 portray an ostentatious weak linear relationship among output bits. Such statistics, no doubt, signals to the fulfillment of the BIC property.
5.5 Linear Probability (LP)
Intrinsic relationship between output and input of an S-Box is further assessed using concept of linear probability [41]. A lower LP value is preferable for a defiant and resilient S-Box. Eq (5) has been employed to find the LP value. A maximum LP value of 0.1190 for suggested S-Box signifies that the S-Box exhibits ample resilience against linear cryptanalytic attacks.
In accordance to this equation, the variables T, az, and bz denote S-Box, input, and output masks, in a respective way. Besides, .
5.6 Differential Probability (DP)
Hackers and other adversaries employ this strategy to have an illegitimate access over the plaintext. In this particular, strategy, the plaintext is attempted to be recovered from some ciphertext by examining discrepancies between pairs of ciphertexts and their corresponding plaintexts [42]. By scrutinizing these discrepancies, potential hackers may gain access to secret key. As far as a robust S-Box is concerned, the value of this security parameter should be lower. Eq (6) is used to find the value of DP.
The accompanying Table 7 vividly demonstrates that the suggested S-Box exhibits the value of this metric as 11/256 = 0.0430. Such outcome indicates a powerful defiance to various assaults differential cryptanalysis. Eq (6) gives underlying calculation of the differential probability (DP).
Within this equation, and
denote respective input and output differentials.
5.7 Investigation into fixed, reverse fixed point and short cycles properties
Numerous S-Boxes have been proposed in the literature, some of which suffer from vulnerabilities related to fixed points and reverse fixed points [23]. A fixed point occurs when an input value maps to itself within the S-Box, making the output identical to the input—an undesirable property that can be exploited by adversaries. Conversely, a reverse fixed point arises when an input maps to its binary complement. For example, if the input is 10110101 (decimal 181) and the output is 01001010 (decimal 74), this represents a reverse fixed point.
It is crucial for cryptographic designers to ensure that their S-Boxes are free from both fixed and reverse fixed points, as these characteristics can significantly compromise the security of systems utilizing such S-Boxes [25]. In the present study, the proposed S-Box was thoroughly evaluated and found to have zero fixed points and zero reverse fixed points, as shown in Table 8. Furthermore, a comparative analysis with several state-of-the-art approaches have been carried out. The suggested work beats these studies [23,32,43–50].
The proposed S-box was analyzed for its cycle structure. The analysis revealed a diverse distribution of cycle lengths, with no significant presence of fixed points or short cycles [51]. Most cycles exhibited lengths greater than 4, indicating strong resistance to attacks that exploit short cycles in permutation-based structures.
5.8 Deployment of the proposed S-Box in image encryption frameworks
This section presents the application of the proposed 3D S-Box in the context of image encryption. The plain (Fig 9) encrypted (Fig 10) and subsequently decrypted images (Fig 11) are displayed to demonstrate the practical viability and effectiveness of the proposed method. As S-Boxes are a core component in introducing confusion during the encryption process, integrating the novel 3D S-Box enhances the security of image data by providing a higher degree of non-linearity and resistance to statistical and differential attacks. The results affirm that the proposed S-Box not only preserves visual integrity after decryption but also strengthens the encryption scheme against potential threats.
6 Discussion
This research introduces a novel algorithm for the construction of a 2D S-Box, uniquely enhanced by leveraging three-dimensional conceptualizations to inject non-linearity, a critical attribute for cryptographic strength. The promising results from this innovative approach underscore its potential to substantially improve cryptographic systems.
In the lines below, we give arguments in favor of the proposed work.
Uniqueness of the 3D Approach: The proposed S-box is indeed unique in its utilization of a 3D framework for its development. As highlighted in the manuscript, the literature review conducted revealed no prior instances of S-box construction based on a 3D notion. This innovative approach allows for enhanced complexity and non-linearity, which are critical factors in achieving high security in cryptographic systems.
Theoretical Justification: To further solidify the theoretical foundation of the proposed method, the proposed 3D S-box structure is furnished with the following characteristics.
- Increased Confusion and Diffusion: The 3D framework inherently introduces additional dimensions of permutation and substitution, leading to more complex transformations. This increased complexity enhances the confusion and diffusion properties of the S-box, making it more resistant to various cryptanalytic attacks.
- Enhanced Avalanche Effect: The introduction of the third dimension allows the proposed S-box to achieve a more significant avalanche effect, where a small change in the input leads to substantial changes in the output. This is a critical characteristic that strengthens the security of the cryptographic system.
Here, we again describe the particular modus operandi of the proposed algorithm. First of all, a “raw” 1D S-Box was created. After it, a 3D scrambled S-Box was created with all entries equal to -1. After that, a looping structure was introduced in the suggested algorithm which took elements from the 1D S-Box one by one and insert them to the different empty cells of the 3D S-Box. During this shifting from the 1D S-Box to the 3D scrambled S-Box, some of the numbers couldn’t be shifted. The reason of this stems from the fact that some cells were already filled. After it, one more looping structure was written in the proposed algorithm to shift the remaining integers of the 1D S-Box to the 3D scrambled S-Box. Lastly, the 3D S-Box was reshaped to the 2D S-Box to get the final result. 3D Lorenz chaotic system has been employed to spawn the three streams of random numbers. These random numbers played a cardinal role since they facilitated in locating a particular cell into which the numbers were shifted from the 1D S-Box to the 3D S-Box. To the best of our knowledge, no S-Box has been developed before it in which the notion of 3D has been employed.
When compared to conventional 2D S-Boxes, which are typically developed through direct two-dimensional methods, our S-Box stands out. The use of a 3D framework to guide the design process inherently integrates a higher degree of complexity and security. Metrics such as non-linearity scores and differential uniformity are significantly improved in our S-Box, demonstrating its superior ability to obscure the linear relationships that attackers often exploit.
The findings of the proposed work bears profound implications for the design of varied cryptographic systems. For instance, the real time implementation of the suggested S-Box can improve the security level of current encryption systems with minimum adaptation needed. One future avenue of this research may be to probe the scalability of the suggested method across different cryptographic standards and its defiance against emerging cryptanalytic techniques.
In summary, the incorporation of the notion of 3D for the development of a 2D S-Box represents a significant advancement in cryptographic design. It not only challenges traditional design paradigms but also sets a new benchmark for the integration of complex mathematical structures in practical encryption technologies. The superior performance of our 2D S-Box fortified by 3D conceptual methods marks a critical step forward in the ongoing evolution of cryptographic security.
Finally Table 9 presents a comparison of the outcomes from the proposed algorithm with results from other published studies. One can see that the non-linearity of the proposed work is better than majority of other published studies.
While the proposed S-box demonstrates strong cryptographic properties such as high nonlinearity, good avalanche behavior, and satisfactory resistance to linear and differential attacks, certain limitations remain. First, the S-box is statically defined, which may restrict adaptability in dynamic environments or key-dependent cipher designs. Second, the computational overhead of evaluating its cryptographic metrics could be high if extended to large-scale systems or embedded devices with limited resources. Lastly, the S-box has not yet been integrated or benchmarked within a complete cipher structure, which may affect the assessment of its practical real-world security performance.
7 Conclusion
S-Boxes enjoy a very central position in the realm of exciting domain of cyber security. These boxes are part and parcel of a lot of security products. This work has presented a novel S-Box which has been written using the notion of 3D. All the numbers of the required S-Box are inserted in the different 3D cells of the scrambled S-Box. This particular structure of the algorithm improves the non-linearity of the required S-Box. To the best of our knowledge, no S-Box has been written so far by using the 3D construct. To demonstrate the intrinsic defiance and resilience from the multifarious cyber security attacks, the suggested S-Box has been subjected to the different state of the art security parameters like differential probability (DP), Strict Avalanche Criterion (SAC), bijectivity, linear probability (LP), non-linearity (NL), and Bit Independence Criterion (BIC). The promising results of this study highlight the potential of the proposed algorithm to significantly advance cryptographic security, which in turn, has the bright prospects for its real world application.
8 Future work
Current research introduced a new S-Box algorithm aimed at enhancing varied cyber security products. There are several promising vistas for deeper investigation and refinement of this work. For example, 1) IoT Security: Given the implications of ubiquitous nature Internet of Things (IoT) devices, securing the communication and data exchange between these devices is crucial. The suggested S-Box algorithm of this work can be deployed in various IoT settings to cement the security protocols, ensuring the confidentiality and integrity of data transmitted between IoT devices. This can be realized by integrating the S-Box algorithm into IoT communication protocols or embedding it directly into IoT devices to encrypt precious and sensitive data. 2) Cloud Computing Security: No doubt, virtually all the major organizations have shifted their operations based on the cloud computing. But plethora of security concerns are a source of permanent threat to it. As we deploy the suggested S-Box diverse cloud computing platforms, data stored in the cloud can be encrypted with heightened security measures. This would, of course, bolster the protection of precious data stored in cloud servers, thus saving it from unauthorized access or breaches. 3) Blockchain Technology: This is yet another niche which is known for its decentralized and tamper-proof character. Ensuring the security of transactions and data on blockchains is a paramount concern. Integrating the suggested S-Box algorithm into blockchain networks has the potential to enhance the encryption mechanisms used to secure transactions and data blocks. This would strengthen the overall security of blockchain networks, thus mitigating the risk of hacking or data manipulation. 4) Mobile Device Security: With the ubiquitous use of tablets and smartphones, ensuring the security of mobile devices and the data, is essential. By incorporating the developed S-Box algorithm into mobile device operating systems or security applications, data stored on these devices can be encrypted with advanced cryptographic techniques. This would enhance the protection of sensitive information stored on mobile devices, guarding against unauthorized access or data breaches.
References
- 1. Alexan W, Youssef M, Hussein HH, Ahmed KK, Hosny KM, Fathy A, et al. A new multiple image encryption algorithm using hyperchaotic systems, SVD, and modified RC5. Sci Rep. 2025;15(1):9775. pmid:40118872
- 2. Alexan W, El-Damak D, Gabr M. Image encryption based on fourier-DNA coding for hyperchaotic chen system, chen-based binary quantization S-box, and variable-base modulo operation. IEEE Access. 2024;12:21092–113.
- 3. Alexan W, Gabr M, Mamdouh E, Elias R, Aboshousha A. Color image cryptosystem based on sine chaotic map, 4D chen hyperchaotic map of fractional-order and hybrid DNA coding. IEEE Access. 2023;11:54928–56.
- 4. Alexan W, Elabyad N, Khaled M, Osama R, El-Damak D, Abd El Ghany MA, et al. Triple layer RGB image encryption algorithm utilizing three hyperchaotic systems and its FPGA implementation. IEEE Access. 2024.
- 5. Youssef M, Gabr M, Alexan W, Mansour MBM, Kamal K, Hosny H, et al. Enhancing satellite image security through multiple image encryption via hyperchaos, SVD, RC5, and dynamic S-Box generation. IEEE Access. 2024.
- 6. Alexan W, Alexan N, Gabr M. Multiple-layer image encryption utilizing fractional-order chen hyperchaotic map and cryptographically secure PRNGs. Fractal Fract. 2023;7(4):287.
- 7. Alexan W, Chen Y-L, Por LY, Gabr M. Hyperchaotic maps and the single neuron model: a novel framework for chaos-based image encryption. Symmetry. 2023;15(5):1081.
- 8. Yan W, Ding Q. A novel S-Box dynamic design based on nonlinear-transform of 1D chaotic maps. Electronics. 2021;10(11):1313.
- 9. Ali R, Jamil MK, Alali AS, Ali J, Afzal G. A robust S box design using cyclic groups and image encryption. IEEE Access. 2023;11:135880–90.
- 10. Hua Z, Li J, Chen Y, Yi S. Design and application of an S-box using complete Latin square. Nonlin Dynam. 2021;104(1):807–25.
- 11. Alqahtani J, Akram M, Ali GA, Iqbal N, Alqahtani A, Alroobaea R. Elevating network security: A novel S-box algorithm for robust data encryption. IEEE Access. 2023;12:2123–34.
- 12. Cassal-Quiroga BB, Campos-Cantón E. Generation of dynamical s-boxes for block ciphers via extended logistic map. Mathematical Problems in Engineering. 2020;2020(1):2702653.
- 13. Goswami SSP, Trivedi G. FPGA implementation of modified SNOW 3G stream ciphers using fast and resource efficient substitution box. IEEE Embedded Syst Lett. 2023;15(4):238–41.
- 14. Li Y, Ge G, Xia D. Chaotic hash function based on the dynamic S-Box with variable parameters. Nonlin Dynam. 2016;84(4):2387–402.
- 15. Mohammed MA, Abood LK, Maliki M. Mathematical message authentication code using S-box key. IJCSNS. 2017;17(7):31.
- 16. Ibrahim S, Abbas AM. Efficient key-dependent dynamic S-boxes based on permutated elliptic curves. Information Sciences. 2021;558:246–64.
- 17. Hematpour N, Ahadpour S, Behnia S. Presence of dynamics of quantum dots in the digital signature using DNA alphabet and chaotic S-box. Multimed Tools Appl. 2020;80(7):10509–31.
- 18.
Durak FB, Guajardo J. Improving the efficiency of AES protocols in multi-party computation. In International Conference on Financial Cryptography and Data Security, 2021: pp. 229–248. Berlin, Heidelberg: Springer.
- 19. Liu H, Zhao B, Huang L. Quantum image encryption scheme using arnold transform and s-box scrambling. Entropy (Basel). 2019;21(4):343. pmid:33267057
- 20. Alhadawi HS, Majid MA, Lambić D, Ahmad M. A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm. Multimed Tools Appl. 2020;80(5):7333–50.
- 21. Long M, Wang L. S-box design based on discrete chaotic map and improved artificial bee colony algorithm. IEEE Access. 2021;9:86144–54.
- 22. Ibrahim S, Abbas AM. A novel optimization method for constructing cryptographically strong dynamic S-boxes. IEEE Access. 2020;8:225004–17.
- 23. Naseer Y, Shah T, Shah D, Hussain S. A novel algorithm of constructing highly nonlinear Sp-boxes. Cryptography. 2019;3(1):6.
- 24. Javeed A, Shah T, Attaullah. Design of an S-box using Rabinovich-Fabrikant system of differential equations perceiving third order nonlinearity. Multimedia Tools Applic. 2020;79(9):6649–60.
- 25. Zahid AH, Iliyasu AM, Ahmad M, Shaban MMU, Arshad MJ, Alhadawi HS, et al. A novel construction of dynamic S-Box with high nonlinearity using heuristic evolution. IEEE Access. 2021;9:67797–812.
- 26. Alharbi AR, Jamal SS, Khan MF, Gondal MA, Abbasi AA. Construction and optimization of dynamic S-boxes based on gaussian distribution. IEEE Access. 2023;11:35818–29.
- 27. Çavuşoğlu Ü, Zengin A, Pehlivan I, Kaçar S. A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system. Nonlinear Dyn. 2016;87(2):1081–94.
- 28. Islam F ul, Liu G. Designing S-box based on 4D-4Wing hyperchaotic system. 3D Res. 2017;8(1).
- 29. Qazi AS, Zahid AH, Baz A, Arslan F, Ali M, Ali J. Innovative transformation of S-box through chaotic map using a pragmatic approach. IEEE Access. 2024;12:42725–36.
- 30. Khan M, Shah T. An efficient construction of substitution box with fractional chaotic system. SIViP. 2013;9(6):1335–8.
- 31. Özkaynak F, Çelik V, Özer AB. A new S-box construction method based on the fractional-order chaotic Chen system. Signal, Image and Video Processing. 2017;11(4):659–64.
- 32. Al Solami E, Ahmad M, Volos C, Doja MN, Beg MMS. A new hyperchaotic system-based design for efficient bijective substitution-boxes. Entropy (Basel). 2018;20(7):525. pmid:33265614
- 33. Lu Q, Zhu C, Wang G. A novel S-box design algorithm based on a new compound chaotic system. Entropy. 2019;21(10):1004.
- 34. Shen BW, Pielke R, Zeng X, Cui J, Faghih-Naini S, Paxson W, et al. The dual nature of chaos and order in the atmosphere. Atmos. 2022;13(11):1892.
- 35. Cerdán L. Ultrashort pulse generation in nanolasers by means of Lorenz–Haken instabilities. Annalen der Physik. 2021;533(9):2100122.
- 36. Liu L, Zhang Y, Wang X. A Novel Method for constructing the S-box based on spatiotemporal chaotic dynamics. Appl Sci. 2018;8(12):2650.
- 37. Abd-El-Atty B. Efficient S-box construction based on quantum-inspired quantum walks with PSO algorithm and its application to image cryptosystem. Complex Intel Syst. 2023;9(5):4817–35.
- 38. Zhu H, Tong X, Wang Z, Ma J. A novel method of dynamic S-box design based on combined chaotic map and fitness function. Multimedia Tools Applic. 2020;79(17):12329–47.
- 39. Malik AW, Zahid AH, Bhatti DS, Kim HJ, Kim K-I. Designing S-box using tent-sine chaotic system while combining the traits of tent and sine map. IEEE Access. 2023;11:79265–74.
- 40. Sevin A, Mohammed AAO. A survey on software implementation of lightweight block ciphers for IoT devices. J Amb Intel Human Comput. 2023;14(3):1801–15.
- 41. Waheed A, Subhan F, Suud MM, Alam M, Ahmad S. An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges. Multimed Tools Appl. 2023;82(19):29689–712.
- 42. Ali A, Khan MA, Ayyasamy RK, Wasif M. A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map. PeerJ Comput Sci. 2022;8:e940. pmid:35634109
- 43. Zhu C, Wang G, Sun K. Cryptanalysis and improvement on an image encryption algorithm design using a novel chaos based S-box. Symmetry. 2018;10(9):399.
- 44. Aboytes-González JA, Murguía JS, Mejía-Carlos M, González-Aguilar H, Ramírez-Torres MT. Design of a strong S-box based on a matrix approach. Nonlin Dynam. 2018;94(3):2003–12.
- 45. Yang C, Wei X, Wang C. S-box design based on 2D multiple collapse chaotic map and their application in image encryption. Entropy (Basel). 2021;23(10):1312. pmid:34682036
- 46. Khan MF, Saleem K, Hazzazi MM, Alotaibi M, Shukla PK, Aqeel M, et al. Human psychological disorder towards cryptography: true random number generator from EEG of schizophrenics and its application in block encryption’s substitution box. Comput Intell Neurosci. 2022;2022:2532497. pmid:35774444
- 47. Hussain I, Anees A, Al-Maadeed TA, Mustafa MT. Construction of S-box based on chaotic map and algebraic structures. Symmetry. 2019;11(3):351.
- 48. Liu X, Tong X, Wang Z, Zhang M. Efficient high nonlinearity S-box generating algorithm based on third-order nonlinear digital filter. Chaos, Solitons & Fractals. 2021;150:111109.
- 49. Alshammari BM, Guesmi R, Guesmi T, Alsaif H, Alzamil A. Implementing a symmetric lightweight cryptosystem in highly constrained iot devices by using a chaotic S-box. Symmetry. 2021;13(1):129.
- 50. Özkaynak F. On the effect of chaotic system in performance characteristics of chaos based S-box designs. Phys A. 2020;550:124072.
- 51. Alamsyah , Setiawan A, Putra AT, Budiman K, Muslim MA, Salahudin SN, et al. AES S-box modification uses affine matrices exploration for increased S-box strength. Nonlinear Dyn. 2024;113(4):3869–90.
- 52. Khan NA, Altaf M, Khan FA. Selective encryption of JPEG images with chaotic based novel S-box. Multimedia Tools Applic. 2021;80(6):9639–56.
- 53. Farah MAB, Farah A, Farah T. An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn. 2019;99(4):3041–64.
- 54. El-Latif AAA, Abd-El-Atty B, Belazi A, Iliyasu AM. Efficient chaos-based substitution-box and its application to image encryption. Electronics. 2021;10(12):1392.
- 55. Khan M, Asghar Z. RETRACTED ARTICLE: A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Comput Applic. 2016;29(4):993–9.
- 56. Belazi A, Khan M, El-Latif AAA, Belghith S. Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlin Dynam. 2017;87(1):337–61.
- 57. Abd el-Latif AA, Abd-el-Atty B, Amin M, Iliyasu AM. Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications. Scientific Reports. 2020;10(1):1930.
- 58. Farah T, Rhouma R, Belghith S. A novel method for designing S-box based on chaotic map and teaching–learning-based optimization. Nonlin Dynam. 2017;88(2):1059–74.
- 59. Isa H, Syed Junid SAA, Z’aba MR, Endut R, Ammar SM, Ali N. Enhancement of non-permutation binomial power functions to construct cryptographically strong S-boxes. Mathematics. 2023;11(2):446.
- 60. Alali AS, Ali R, Jamil MK, Ali J, Gulraiz . Dynamic S-box construction using mordell elliptic curves over galois field and its applications in image encryption. Mathematics. 2024;12(4):587.
- 61. Corona-Bermúdez E, Chimal-Eguía JC, Corona-Bermúdez U, Rivero-Ángeles ME. Chaos meets cryptography: developing an S-box design with the Rössler Attractor. Mathematics. 2023;11(22):4575.