Abstract

This paper proposes to present a novel method of generating cryptographic dynamic substitution-boxes, which makes use of the combined effect of discrete hyperchaos mapping and algebraic group theory. Firstly, an improved 2D hyperchaotic map is proposed, which consists of better dynamical behaviour in terms of large Lyapunov exponents, excellent bifurcation, phase attractor, high entropy, and unpredictability. Secondly, a hyperchaotic key-dependent substitution-box generation process is designed, which is based on the bijectivity-preserving effect of multiplication with permutation matrix to obtain satisfactory configuration of substitution-box matrix over the enormously large problem space of 256!. Lastly, the security strength of obtained S-box is further elevated through the action of proposed algebraic group structure. The standard set of performance parameters such as nonlinearity, strict avalanche criterion, bits independent criterion, differential uniformity, and linear approximation probability is quantified to assess the security and robustness of proposed S-box. The simulation and comparison results demonstrate the effectiveness of proposed method for the construction of cryptographically sound S-boxes.

1. Introduction

The modern secure communication based on block ciphers plays a significant role. It provides a way to stay secure against unauthorized access and tampering in an insecure communication channel. The usage of cryptographic primitives such as data encryption methods, hash functions, and pseudorandom number generators depends upon the area of applications [14]. A block cipher is a symmetric encryption mechanism that relies on one private key for successful encryption and decryption of data at the sender side and at the receiver side, respectively. It takes an input block of size n bits and a key of size k bits and produces an output of n bits during the process of encryption and decryption. There exists a number of block cryptosystems, and some of the well-known are Data Encryption Standard (DES), Advanced Encryption Standard (AES), international data encryption algorithm (IDEA), and KASUMI. These block cryptosystems play a crucial role in multimedia security [5]. The architecture of secure block ciphers consists of two vital components, namely, substitution-box at the substitution layer and permutation-box at the permutation layer, which in combination bring the effect of necessary confusion and diffusion in the system. The aim of substitution-box (S-box) is to produce desired confusion between the ciphertext and the key, whereas the permutation-box (P-box) is needed to spread the inputs linearly and randomly for the diffusion [6].

The substitution layer in a symmetric-key cryptosystem is meant to perform the process of data substitution with the help of S-boxes. Substitution-boxes are the only components in block ciphers that add nonlinearity to the operation of the cryptosystem. Substitution-boxes are decisive components of symmetric-key algorithms as they are the only nonlinear transformation that transforms inputs to outputs in some nonlinear fashion [7]. They are sort of nonlinear mappings that substitute a set of input bits of size n-bits with a different set of bits called output bits as , where n represents the number of input bits for S-box and m represents output bits from S-box after substitution. An S-box can be generated as a lookup table with words of m-bits each. S-boxes are also termed as the vectorial Boolean functions or multiple-input multiple-output Boolean functions. This means that an S-box consists of m different component Boolean functions as , where each is Boolean function in n variables, that is, [8]. Particularly, the scenario when corresponds to bijective S-boxes in which there exists a one-to-one mapping from input domain to output domain; that is, each input of n-bit long uniquely maps to an n-bit long output. There exist a vast number of bijective S-boxes for n = 8 whose count is 256!, which is more than 10506 [9]. Thus, it is challenging for the cryptographers to construct and find cryptographically strong S-boxes configurations out of this vast state space. The cryptographic strength of S-box decides the security of block ciphers. If the S-box is weak, then the resulting cryptosystem will have high linearity and can be easily broken. S-boxes also make the block ciphers powerful and robust to resist linear and differential cryptanalytic attacks [10].

In literature, some significant research efforts have been made to develop substitution-boxes with good measures of desirable cryptographic properties. In [11], Özkaynak and Özer gave a method by exploring the trajectories of 3D Lorenz chaotic system, which determined S-box with satisfactory security features. In [12], the authors explored the features of six-dimensional hyperchaotic system and artificial bee colony optimization approach to generate an optimized configuration of S-box. Çavuşoğlu et al. in [13] investigated the dynamical characteristics of new scaled version 3D chaotic Zhongtang system for S-box generation. Ahmad et al. in [14] also investigated an artificial bee colony optimization and 1D chaotic logistic map-based method to construct an S-box which showed better cryptographic features and S-box reported in [12]. Alzaidi et al. reported a sine-cosine optimization and new 1D chaotic map-based S-box construction mechanism in [15]. Wang et al. in [16] suggested a simple S-box generation algorithm with the help of a new 3D continuous chaotic system which has infinite equilibrium points. In [17], Zhang et al. studied the dynamics of fractional-order logistic map and designed an S-box construction method with consistent security performance which found application for image encryption. Lambic proposed a new discrete-space 1D chaotic map using the concept of multiplication of integer numbers and circular shift and gave an S-box generation application for security usages in [18]. Recently, Gao et al. presented a new way of constructing S-boxes by using the algebraic action of modular groups PSL (2, Z) on a particular projective line in [19]. The obtained S-box met all the performance criteria well and was deemed suitable for encryption applications. Hematpour and Ahadpour investigated strong chaotic nonlinear map for performance improvisation of particle swarm optimization, which was then executed to optimize the S-box for high nonlinear property in [20]. Their examination and application of improved PSO resulted in some good set of S-boxes with acceptable cryptographic features. For some recent S-box generation methods, the readers are referred to [2129].

Chaos-based cryptography has coveted to design and use the chaotic maps for the development of security methods such as multimedia encryption algorithms, watermarking, steganography, hash functions, substitution-box design, pseudorandom number generators, and authentication protocols [4, 3037]. The robustness of these cryptographic primitives is significantly based on the dynamical characteristics of employed chaotic maps. The chaotic maps with frail performance may lead to weak security effect offered by the cryptographic primitive based on weak chaotic maps or systems [38]. But most of them are found to hold one or other limitations that restricted their usage to develop a strong cryptographic application. Utilization of chaotic maps with frail performance may threaten the security of cryptographic system and make it susceptible to attacks [38, 39]. They have the problems of limited chaotic range and behaviour, nonuniform coverage of chaotic attractor in phase space, low Lyapunov exponent, low complexity, etc. [40, 41]. This motivates to construct chaotic maps that should possess better and more rich dynamical features than conventional chaotic maps [35, 38, 4043]. Consequently, an improved 2D hyperchaotic map is designed, which has significantly better dynamical characteristics compared to existing 2D chaotic map. Some of the significant contributions presented in this paper are as follows:(1)An improved 2D discrete hyperchaotic map is suggested, which exhibits rich dynamical features in terms of Lyapunov exponents, bifurcation, entropy, complexity, etc.(2)A chaotic permutation matrix based novel approach is presented to search a suitable configuration of substitution-box. The multiplication of permutation matrix with input S-box preserves the bijectivity property of S-box.(3)A strong and persuasive algebraic group-theoretic structure has been found experimentally, whose actions further elevated the cryptographic strength of the S-box.(4)The security assessment against benchmarking parameters is done, which shows excellent performance of proposed S-box generation method.(5)The security strength of obtained S-box is compared and analyzed with some recently investigated S-boxes studies to make evident the standout features of the proposed method.

The structure of the rest of the paper is maintained as follows: The model of an enhanced 2D chaotic map and its dynamical analyses is discussed in Section 2. The application of developed hyperchaos mapping for permutation matrix based proposed S-box generation algorithm and algebraic group action is described in Section 3. Section 4 reports the performance assessments and analyses of proposed S-box and its comparison with existing S-boxes. The conclusion of the research works done in this paper is mentioned in Section 5.

2. 2D Discrete Hyperchaos Mapping

The dynamics of the proposed 2D discrete hyperchaotic mapping are governed by the mathematical form shown in the following equation:where and are chaotic state variables of the map after n iterations. It also includes the parameters a, b, k > 0, and r > 1. Existence of large number of map’s parameters extends the key space when the map is incorporated in any cryptographic applications which make the brute-force attacks impractical. The initial values of and along with setting of their parameters decide the future trajectory of the map. The default setting in all computer simulations and experiments related to proposed 2D map (1) is as follows:  = 0.11,  = 0.12, a = 1.5, b = 0.5, k = 2, and r = 3.

The mathematical form of 2D logistic chaotic map is as follows [44]:where r is its control parameter. The 2D logistic map exhibits its chaotic behaviour when parameter r lies in [1.11, 1.15] or [1.18, 1.19].

The 2D Henon chaotic map is described through the following equation [45]:where a and b are its system parameters that decide its dynamical behaviour. It is known that 2D Henon map shows chaotic behaviour for b = 0.3 and a lies in [1.06, 1.22] or [1.27, 1.29] or [1.31, 1.42].

The 2D sine-logistic modulation map (SLMM) suggested and investigated in [46] has the following mathematical form:where a is the system’s bifurcation parameter. Regarding the 2D SLMM map, it was studied that it exhibits chaotic phenomenon when a lies in [0.87, 1] but shows hyperchaotic behaviour when the parameter lies in [0.905, 1]. In what follows, the dynamics of the proposed map (1) are analyzed and compared with three mentioned 2D chaotic discrete maps: logistic map, Henon map, and SLMM map.

2.1. Lyapunov Exponents

Lyapunov exponent (LE) is a quantitative measure used to determine the degree of chaotic behaviour of a dynamic system. It is a commonly accepted metric that describes the separation between two trajectories starting from extremely close initial points [47]. Mathematically, Lyapunov exponents for a dynamical map are computed as

A positive value of Lyapunov exponent indicates chaotic nature between the two trajectories; that is, no matter how close the initial distance is, trajectories will diverge exponentially over time making them unpredictable. Hence, a larger value of LE indicates superior chaotic phenomenon of the system [40]. The Lyapunov exponents of the proposed chaotic map for different values of parameters k and r are shown in Figure 1. It can be seen that the enhanced map shows chaotic phenomenon for complete range of . Particularly, a hyperchaotic nature of map (1) is evident from Figures 1(d) and 1(e) as both exponents are found to possess positive values over whole specified range of bifurcation parameters k and r. Moreover, it is worth noting that a similar kind of behaviour is experienced for larger of values of both parameters of proposed enhanced map (1). Specifically, the exponents get bigger for higher values of parameters k and r, thereby reflecting the higher divergence of orbits and complicated nature of existence of chaos. Since the 2D map (1) has both LE positives that indicate a KY dimension of proposed map as 2.0, The Lyapunov exponents for the proposed 2D map are also analyzed by varying the parameters k and r simultaneously, and the obtained diagrams are shown in Figure 2. The diagrams confirm the existence of hyperchaos phenomenon of the proposed map for a wide range of both parameters. For comparison, the Lyapunov values of proposed map for mentioned settings are listed in Table 1 and we found fairly larger LE values obtained from our 2D chaotic map than some existing 2D discrete chaotic maps. Hence, Figure 1 shows a richer dynamical behaviour and high sensitivity of proposed hyperchaotic map compared to contemporary 2D logistic chaotic map, 2D Henon chaotic map, and 2D SLMM map.

2.2. Bifurcation

Bifurcation analysis is used to quantify regions of chaotic behaviour of a nonlinear dynamic system. Bifurcation is sensitive to control parameters, which, after a special value, cause change in state from fixed to chaotic behaviour indicating that outputs are more random. This shift in phase is known as bifurcation. Bifurcation diagrams are used to visualize the chaotic system behaviour [40]. The bifurcation analysis of the proposed map (1) is investigated for . The bifurcation plots of different 2D discrete chaotic maps are shown in Figure 1 (right column). It is clear from Figures 1(d) and 1(e) that there do no exist any blank windows or nonchaotic regions in the bifurcation diagram of the proposed map (1). It has been found through simulation that similar bifurcation behaviour exists for both map’s parameters . The proposed map has pretty better bifurcation behaviour for parameters k and r under system’s both variables x and y than bifurcation behaviour of 2D logistic chaotic map, 2D Henon chaotic map, and 2D SLMM map as evident from Figure 1 bifurcation diagrams.

2.3. Time Series Correlation

The X and Y time series obtained from the proposed 2D hyperchaotic map with mentioned settings are shown in Figure 3. In order to show the sensitiveness to small change in initial conditions, different Xc and Yc times series are generated, whose corresponding and initial conditions are having a minor difference of  = 10−10 only. The respective sequences are shown along with their counterpart series to make it evident that the two are fairly different and nonoverlapping. To quantify the sensitiveness, the correlations between chaotic sequences (denoted as ) and Y and (denoted as ) are calculated. The correlation between these two pairs of chaotic sequences is provided in Table 1. It is found that the sequences are almost zero correlations as  = −0.0061 and  = −0.0049, which indicate that the two series are highly deviated and uncorrelated to each other. From Table 1, it is somewhat clear that the correlation coefficients for the sequences from the proposed map are considerably better than coefficients obtained after similar time series analysis for the cases of 2D logistic chaotic map, 2D Henon chaotic map, and 2D SLMM map.

2.4. Approximate Entropy

Approximate entropy is a mathematical algorithm created to measure irregularity in time series. It is a nonlinear algorithm that could distinguish between noisy and chaotic time series with small number of data points [48]. A small ApEn value represents deterministic time series, whereas larger value represents randomness, complexity, and unpredictability. Also, a time series tends to have larger ApEn value when patterns are rarely repeated. It has ability to identify intricacy in chaotic behaviour shown by dynamical maps [49]. For an n-dimensional time series , ApEn has the following mathematical expression:where e denotes the embedding dimension, t is the tolerance, and is defined aswhere is the delay in time and is count of k such that . We calculated the ApEn by varying values of respective bifurcation parameter for existing 2D logistic map, 2D Henon map, 2D SLMM map, and proposed enhanced 2D hyperchaos map; the obtained results are shown in Figure 4. The approximate entropies of different time series obtained by the 2D enhanced chaotic map with same initial conditions are quantified and provided in Table 1. The average ApEn for our enhanced map is found to be around 1.3247, which is sufficient higher than 0.0291, 0.1212, and 0.1038 from existing 2D logistic map, 2D Henon map, and 2D SLMM map, respectively. The obtained ApEn scores justify that the proposed map possesses better complexity and unpredictability compared to existing 2D logistic chaotic map, 2D Henon chaotic map, and 2D SLMM map as evident from Table 1.

2.5. Phase Attractor

The phase diagram to show the coverage of chaotic attractor of the proposed map is provided in Figure 5. It is always significant to analyze the chaotic attractor to know a comprehensive understanding of the dynamics of chaotic maps [50]. We can see in Figure 4 that the attractor covers the entire space like a fractal and does not confine to have a specific shape; rather it covers randomly the complete space even when initial point is fixed anywhere in . The phase space of the proposed map is sufficiently complex and perfectly covers the entire region of space compared to the phase attractors of existing 2D logistic chaotic map, 2D Henon chaotic map, and 2D SLMM map.

3. Proposed Substitution-Box Generation

This section presents the proposed method of S-box generation. The complete procedure consists of three different phases. In the first phase, an initial bijective S-box is constructed by using the chaotic values obtained from the improved hyperchaos map (1). The procedure indicates iteration of our proposed hyperchaotic map given in equation (1). The block diagram of the proposed S-box generation method is shown in Figure 6. Meanwhile, the processing steps of different phases of the S-box method are as follows. Phase 1:Require: initial conditions of hyperchaos map (2) as Returns: initial S-box A, last x and y chaotic variables(1)Iterate hyperchaos map (1) for itr_n0 times and discard the values to remove transient effect(2)Further iterate hyperchaos map (1) once and find as//equation (1)(3)Add to sbox if it does not exist already in it(4)Check if length (sbox) = 256 and then exit. Else repeat from Step 2The second phase evolves the initial S-box from phase-1 on the basis of average nonlinearity score. The evolution of S-box is based on the concept of random permutation matrix whose multiplication with a bijective S-box preserves its bijectivity. The change due to permutation matrix multiplication is accepted only when it causes some improvisation on the nonlinearity score of S-box. The algorithmic steps of phase-2 are subsequently given below. A simple example is also prepared to understand the effect of multiplying with random permutation matrix .Phase 2:Require: Last chaotic variable x and y from phase-1, initial S-Box sbox, gen_countReturn: S-Box sbox_gSet //N = 16 to Nendfor and to N find index in uu such that  Set T(k) = endforfor to NendforifendifendwhileAn example of the phase-2 procedure is illustrated, which is given in the Appendix for better apprehension. Phase-2 of the presented method resulted in an intermediate S-box given in Table 2.

third phase aims to explore the merits of algebraic technique to generate cryptographically near-optimal configuration of S-box. To solve the purpose, a suitable algebraic group structure is constructed after exhaustive experimental analysis. It has been found that algebraic structure described below is the most suitable one among all those studied during our experimentation. The action of the obtained algebraic group structure gives the final proposed S-box.Phase 3:Require: S-box sbox_g and algebraic group structure GReturn: final S-box SNow, we apply the action of a group of permutations of order 841724928.  The group G: can be generated by elements, namely Where,;t: = (2, 233, 31, 150, 191, 91, 207, 80, 190, 24, 211, 154, 251, 222, 225, 43, 153, 83, 231, 111, 44, 165, 34, 18, 242, 216, 38, 239, 210, 85, 167, 5, 156, 10, 184, 135, 136, 96, 42, 112, 197, 203, 200, 47, 51, 219, 27, 252, 188, 244, 109, 97, 208, 174, 205, 75, 148, 99, 170, 79, 169, 59, 234, 86, 122, 139, 155, 35, 89, 70, 248, 52, 67, 250, 115, 71, 238, 145, 92, 151, 144, 179, 76, 116, 213, 224, 140, 120);u: = (3, 62, 138, 195, 226, 11, 98, 235);v: = (4, 84, 214, 209, 123, 246, 29, 141, 87, 199, 130, 108, 102, 8, 198, 168, 95, 230, 66, 132, 57, 189, 88, 48, 162, 171, 40, 176, 81, 72, 229, 77, 78, 133, 113, 249, 36, 9, 65, 223, 196, 110, 160, 237, 54, 22, 46, 63, 166, 178, 114, 121, 32, 202, 55, 142, 26, 143, 21, 159, 232, 74, 49, 173, 14, 105, 12, 101, 20, 30, 19, 58, 247, 41, 39, 255);w: = (7, 206, 100, 134, 33, 181, 15, 221, 107, 186, 192, 53, 215, 16, 73, 175, 163, 25, 147);x: = (64, 93, 124, 220, 164, 152, 131, 228, 119, 104, 126, 69, 182, 183, 254, 128, 243, 241);

The action of each element/permutation on sbox_ (obtained after phase-2, shown in Table 3) yields an S-box. After comprehensive analysis and study, it has been determined that the generated S-box S corresponding to permutation was found to have strong cryptographic features. It acts on the indices of sbox_g. The action of each element of said permutation of group G on the index set of sbox_g gives distinct cryptographically sound S-box. We declare this S-box as our proposed S-box S which is shown in Table 3.

4. S-Box Performance Results

The significance of cryptographically sound S-box is that if it is not strong it means cipher has to suffer on the quality of encryption and security [51]. Therefore, before using any S-box in a cryptosystem, it is important to measure its security strength and robustness. A secure S-box should take care of the performance criteria well; for example, it should have balanced component Boolean functions, nonlinearity of components functions which must be high, satisfaction of SAC and BIC criteria, low differential uniformity, and linear approximation probability to resist linear cryptanalysis and differential cryptanalysis [20, 21]. In what follows, we discussed and assessed these performance parameters for our S-box and analyzed its security strength.

4.1. Nonlinearity

Nonlinearity property is a measure of dissimilarity between a function and its closest affine function. Since S-boxes are represented using Boolean functions, the nonlinearity of these functions becomes an important factor to measure the cryptographic strength of the S-boxes. Because linear functions can be easily breakable, it is prudent for S-boxes to generate efficient nonlinear functions. There should be sufficient nonlinear mapping of input to output and the S-box strength depends upon the value of nonlinearity which provides resistance against linear cryptanalysis [21]. In practice, the nonlinearity of a function is computed using equation (8).

The nonlinearity of the S-box is determined by computing the nonlinearity of its component Boolean functions. We get scores such as 110, 112, 112, 110, 110, 110, 112, and 108 as nonlinearity of its component Boolean functions. The average nonlinearity of proposed S-box is 110.5 with least value of 108 and largest value of 112. The nonlinearity scores of proposed S-box are also shown graphically in Figure 7:

4.2. Strict Avalanche Criterion (SAC)

Strict avalanche criterion was introduced by Webster and Tavares in 1985 to generalize the avalanche effect. According to SAC analysis, a single toggle in the input bit should alter 50% of the entire output bits to qualify as a suitable Boolean encryption function [52]. Hence, a good measure of SAC value makes the function show a strong random behaviour, making it complicated for attackers. In order to measure the SAC of S-box, dependence matrix is used. If value of each element in the dependence element as well its mean is close to 0.5, we can confirm that the S-box fulfils the strict avalanche criterion. The dependency matrix given in Table 4 is obtained using the procedure suggested in [52]. The SAC of the proposed S-box is found to be 0.5046 which is significantly close to ideal value of 0.5.

4.3. Bits Independence Criterion (BIC)

Webster and Tavares also introduced another crucial criterion called output bits independence criterion of Boolean function. Pairwise independence of the avalanche variables for a given set of avalanche vectors is measured in order to determine nonlinearity of obtained functions [53]. The degree of independence between the pairs is measured through correlation coefficient. For the Boolean functions to satisfy BIC, each Boolean function should have high nonlinearity to ensure sufficient independence. The BIC results for nonlinearity of our S-box are determined, which are presented in Table 5. The table shows the minimum nonlinearity of 102 but a high mean score of 109.14.

4.4. Differential Uniformity (DU)

Differential cryptanalysis proposed by Biham and Shamir [54] and other related techniques are powerful tools to analyze block ciphers. It led to various research works exploring the security offered by different types of functions. Now, differential uniformity (DU) is used to find robustness of S-boxes against differential cryptanalysis as suggested in [54]. It is a measure of change observed in differential output with respect to change in input . In order to avoid these attacks, S-boxes with low values of DU are desirable. The expression given in equation (9) is used to compute DU for an S-box. Following the expression, we get the differential distribution table given in Table 6. Interestingly, the maximum value of the differential distribution table is 8 only. The remarkable feature of the S-box is that this maximum value of DDT (which is 8) occurs in the table only once:

4.5. Linear Approximation Probability (LAP)

Linear approximation probability is another vital security measure used to assess robustness of an S-box against Matsui’s linear cryptanalysis [55]. This test is conducted to find imbalance of an event. The parity of the input bits selected by mask a is equal to the parity of output bits selected by mask b. According to Matsui’s definition, linear approximation probability is measured aswhere a and b are input and output masks, respectively, and X is the set of all possible inputs and 28 for S-box which is the number of its elements. An S-box with low LAP value is desirable as it can oppose various linear attacks. We evaluated the linear approximation probability of proposed S-box and we found it to be 0.1094.

4.6. Comparison with State-of-the-Art S-Box Methods

The performance of any new S-box technique should be gauged against the already investigated state-of-the-art S-boxes. Here, we compared the cryptographic features of our proposed S-box with some recent S-boxes methods in Table 7. It is quite clear from the comparison analysis made in Table 7 that the nonlinearity of the proposed S-box is sufficiently the highest, which is 110.5, and the smallest value of linear approximation probability is 0.1094; both performance scores indicate higher robustness of proposed S-box against linear cryptanalysis and other related attacks compared to all S-boxes listed in Table 7. The proposed S-box also satisfies the SAC criterion as its score is considerably closer to ideal 0.5 value, and it also satisfies well the BIC performance of the proposed S-box for nonlinearity having a decent value of 109.14, which is the highest among all the BIC scores of the comparison table. Our proposed S-box performs extremely well in putting effort to mitigate the differential cryptanalysis as the differential uniformity is 8, which is the lowest of all DU listed in the table. Hence, the comparison analysis makes it quite evident that our generated S-box has excellent cryptographic features, which performs significantly better than many recent and state-of-the-art S-boxes available in the literature.

5. Conclusions

The security of chaos-based cryptographic algorithms significantly depends on the dynamical characteristics of employed chaotic maps or systems. The applied chaotic maps should not have the frail performance for a strong chaotic cryptosystem. Keeping this guideline in consideration, this paper firstly suggested a 2D discrete hyperchaotic map, which is found to have prominently better dynamical characteristics compared to some existing 2D discrete chaotic maps when assessed against chaotic sensitivity, Lyapunov exponent, bifurcation, approximate entropy, and so forth. The proposed hyperchaotic map has been applied to suggest a novel approach for generating S-boxes based on multiplication operation of random permutation matrices obtained through chaotic sequences. The approach of evolving S-boxes using the chaotic permutation matrices determined the suitable configuration of S-box. The S-box cryptographic strength improvisation is progressed by the action of experimentally found potent algebraic group structure. The performance appraisal against the well-accepted criteria shows the excellent security features of proposed S-box. It has been found after comparison analysis that the obtained S-box has better cryptographic security, robustness, and power than many S-boxes recently investigated and constructed in the literature.

The future scope of the proposed study includes its investigation for the construction of varying sizes of substitution-boxes. The evolution of S-boxes can be made based on the multiple performance criteria instead of only nonlinearity to make it cryptographically strong and robust against related assaults. The generated S-boxes can also be applied to design cryptographic primitives such as image encryption, information hiding, and cryptographic hashing.

Appendix

For the phase-2 of the proposed S-box method for a hypothetical scenario, we have the following -order matrix named (readers note that this is not the S-box):

For the above sbox_p matrix, one needs a permutation matrix . So, to generate a random permutation matrix of size , the hyperchaos map (1) is iterated 5 times to get chaotic arrays x and y, which are obtained as given below. Following the phase-2 algorithms, the arrays uu and sorted sequence qq are derived. The arrays uu and qq help to get the permutation sequence T, which in turn resulted in a random permutation matrix of size . The incorporation of alteration in the previous matrix according to the rule gives rise to another changed matrix but consisting of all the elements of the input matrix as evident from the matrix obtained in the presented example:

Proceeding further in similar fashion, the new configuration of obtained after 100th successive generation for the above example case is given as

Data Availability

The necessary data are included within the article.

Conflicts of Interest

The authors declare no conflicts of interest.