Open AccessOpen Access


Dynamic S-Box Generation Using Novel Chaotic Map with Nonlinearity Tweaking

Amjad Hussain Zahid1, Muhammad Junaid Arshad2, Musheer Ahmad3,*, Naglaa F. Soliman4, Walid El-Shafai5,6

1 School of Systems and Technology, University of Management and Technology, Lahore, 54700, Pakistan
2 Department of Computer Science, University of Engineering and Technology, Lahore, 54700, Pakistan
3 Department of Computer Engineering, Jamia Millia Islamia, New Delhi, 110025, India
4 Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, 11671, Saudi Arabia
5 Security Engineering Lab, Computer Science Department, Prince Sultan University, Riyadh, 11586, Saudi Arabia
6 Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt

* Corresponding Author: Musheer Ahmad. Email:

Computers, Materials & Continua 2023, 75(2), 3011-3026.


A substitution box (S-Box) is a crucial component of contemporary cryptosystems that provide data protection in block ciphers. At the moment, chaotic maps are being created and extensively used to generate these S-Boxes as a chaotic map assists in providing disorder and resistance to combat cryptanalytical attempts. In this paper, the construction of a dynamic S-Box using a cipher key is proposed using a novel chaotic map and an innovative tweaking approach. The projected chaotic map and the proposed tweak approach are presented for the first time and the use of parameters in their working makes both of these dynamic in nature. The tweak approach employs cubic polynomials while permuting the values of an initial S-Box to enhance its cryptographic fort. Values of the parameters are provided using the cipher key and a small variation in values of these parameters results in a completely different unique S-Box. Comparative analysis and exploration confirmed that the projected chaotic map exhibits a significant amount of chaotic complexity. The security assessment in terms of bijectivity, nonlinearity, bits independence, strict avalanche, linear approximation probability, and differential probability criteria are utilized to critically investigate the effectiveness of the proposed S-Box against several assaults. The proposed S-Box’s cryptographic performance is comparable to those of recently projected S-Boxes for its adaption in real-world security applications. The comparative scrutiny pacifies the genuine potential of the proposed S-Box in terms of its applicability for data security.


Cite This Article

A. H. Zahid, M. J. Arshad, M. Ahmad, N. F. Soliman and W. El-Shafai, "Dynamic s-box generation using novel chaotic map with nonlinearity tweaking," Computers, Materials & Continua, vol. 75, no.2, pp. 3011–3026, 2023.

This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 486


  • 327


  • 2


Share Link