<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">73097</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2025.073097</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Framework for Secure Substitution Box Construction and Its Application in Image Encryption</article-title>
<alt-title alt-title-type="left-running-head">Framework for Secure Substitution Box Construction and Its Application in Image Encryption</alt-title>
<alt-title alt-title-type="right-running-head">Framework for Secure Substitution Box Construction and Its Application in Image Encryption</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Hayat</surname><given-names>Umar</given-names></name><xref ref-type="aff" rid="aff-1">1</xref><xref ref-type="aff" rid="aff-2">2</xref><email>umar.hayat@warwickgrad.net</email></contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Ullah</surname><given-names>Ikram</given-names></name><xref ref-type="aff" rid="aff-2">2</xref></contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western"><surname>Bilal</surname><given-names>Muhammad</given-names></name><xref ref-type="aff" rid="aff-2">2</xref></contrib>
<aff id="aff-1"><label>1</label><institution>Department of Computer Science, University of Warwick</institution>, <addr-line>Coventry, CV4 7AL</addr-line>, <country>UK</country></aff>
<aff id="aff-2"><label>2</label><institution>Department of Mathematics, Quaid-i-Azam University</institution>, <addr-line>Islamabad, 44000</addr-line>, <country>Pakistan</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Umar Hayat. Email: <email>umar.hayat@warwickgrad.net</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2026</year>
</pub-date>
<pub-date date-type="pub" publication-format="electronic">
<day>10</day><month>2</month><year>2026</year>
</pub-date>
<volume>87</volume>
<issue>1</issue>
<elocation-id>59</elocation-id>
<history>
<date date-type="received">
<day>10</day>
<month>09</month>
<year>2025</year>
</date>
<date date-type="accepted">
<day>03</day>
<month>12</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2026 The Authors.</copyright-statement>
<copyright-year>2026</copyright-year>
<copyright-holder>Published by Tech Science Press.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_73097.pdf"></self-uri>
<abstract>
<p>Elliptic curve (EC) based cryptosystems gained more attention due to enhanced security than the existing public key cryptosystems. A substitution box (S-box) plays a vital role in securing modern symmetric key cryptosystems. However, the recently developed EC based algorithms usually trade off between computational efficiency and security, necessitating the design of a new algorithm with the desired cryptographic strength. To address these shortcomings, this paper proposes a new scheme based on Mordell elliptic curve (MEC) over the complex field for generating distinct, dynamic, and highly uncorrelated S-boxes. Furthermore, we count the exact number of the obtained S-boxes, and demonstrate that the permuted version of the presented S-box is statistically optimal. The nonsingularity of the presented algorithm and the injectivity of the resultant output are explored. Rigorous theoretical analysis and experimental results demonstrate that the proposed method is highly effective in generating a large number of dynamic S-boxes with adequate cryptographic properties, surpassing current state-of-the-art S-box generation algorithms in terms of security. Apart from this, the generated S-box is benchmarked using side-channel attacks, and its performance is compared with highly nonlinear S-boxes, demonstrating comparable results. In addition, we present an application of our proposed S-box generator by incorporating it into an image encryption technique. The encrypted and decrypted images are tested by employing extensive standard security metrics, including the Number of Pixel Change Rate, the Unified Average Changing Intensity, information entropy, correlation coefficient, and histogram analysis. Moreover, the analysis is extended beyond conventional metrics to validate the new method using advanced tests, such as the NIST statistical test suite, robustness analysis, and noise and cropping attacks. Experimental outcomes show that the presented algorithm strengthens the existing encryption scheme against various well-known cryptographic attacks.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Substitution box</kwd>
<kwd>Mordell elliptic curve</kwd>
<kwd>M&#x00F6;bius transformation</kwd>
<kwd>nonlinearity</kwd>
<kwd>image encryption</kwd>
<kwd>cryptanalysis</kwd>
<kwd>data security</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>Nowadays, protecting private information and confidential data from unauthorized sources is a significant challenge. Due to modern technology, access to information is easy for anyone from anywhere at any time, as various modern technology mediums, such as computer networks, software, and the internet, have made this possible. Almost all information is shared online through the internet, and the sharing of private information through insecure networks is a big problem. It is necessary to ensure the security of private data while transferring it through insecure networks. The said task can be fulfilled via different approaches. That is why, with the rapid advancement in information technology, cryptosystems are frequently developed to ensure the security of private information from unauthorized users. There are various methods employed in modern cryptography, including S-boxes, pseudo-random numbers, and encryption techniques, to secure information. However, the substitution box (S-box) is one of the crucial and fundamental components of well-known block ciphers, such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES). A well-designed S-box algorithm can be used for a real-time application if it meets the following conditions: (i) Low computation cost, (ii) strong resistance against well-known attacks, including algebraic, differential, linear, and Boolean function attacks, and (iii) the ability to generate highly dynamic S-boxes. Furthermore, the proposed S-boxes can also be utilized in various cryptographic applications.</p>
<sec id="s1_1">
<label>1.1</label>
<title>Related Work</title>
<p>Many researchers developed various new S-box algorithms to enhance the security of private information against modern attacks. These enhancements are based on diverse mathematical structures. Recently, chaotic systems have mostly been utilized in cryptography for designing secure cryptosystems. The reasons are their unpredictable behavior, ease of implementation, and sensitivity to initial conditions. For example, Lai et al. [<xref ref-type="bibr" rid="ref-1">1</xref>] proposed an S-box construction technique to enhance the cryptographic properties utilizing a new chaotic system. Ding and Xue [<xref ref-type="bibr" rid="ref-2">2</xref>] designed an efficient method to generate dynamic S-boxes for the encryption of images. Zhu et al. [<xref ref-type="bibr" rid="ref-3">3</xref>] utilized chaotic mappings to propose an S-box algorithm and a lightweight encryption scheme with better security. Liu et al. [<xref ref-type="bibr" rid="ref-4">4</xref>] developed an efficient method for the generation of S-boxes with strong nonlinearity that relies on a third-order nonlinear digital filter. Gupta and Chauhan [<xref ref-type="bibr" rid="ref-5">5</xref>] employed an S-box and a pseudo-random number generator based on a four dimensional (4D) hyperchaotic system in a secure image encryption approach. Gao et al. [<xref ref-type="bibr" rid="ref-6">6</xref>] designed a three dimensional (3D) encryption scheme and random numbers algorithm utilizing chaotic maps. Vijayakumar and Ahilan [<xref ref-type="bibr" rid="ref-7">7</xref>] designed an optimized chaos-based S-box for a real-time image encryption technique. Alexan et al. [<xref ref-type="bibr" rid="ref-8">8</xref>] proposed a secure algorithm for an image cryptosystem using different mathematical structures such as multiple base modulo operations, Chen-based binary quantization S-box, Fourier DNA coding, and a hyperchaotic system. Sani et al. [<xref ref-type="bibr" rid="ref-9">9</xref>] designed an S-box algorithm for a watermarking application based on a piecewise chaotic map. Brahim et al. [<xref ref-type="bibr" rid="ref-10">10</xref>] designed an image encryption technique utilizing multi-specific S-boxes and a hyperchaotic system. Tian and Su [<xref ref-type="bibr" rid="ref-11">11</xref>] developed a new virtual image enciphering method by integrating a chaotic S-box. Gan et al. [<xref ref-type="bibr" rid="ref-12">12</xref>] proposed an efficient and novel image encryption scheme using an S-box and a chaotic system. Zaghir et al. [<xref ref-type="bibr" rid="ref-13">13</xref>] used a novel three-dimensional hyperchaotic system to analyze and generate S-boxes for the AES algorithm. Khompysh et al. [<xref ref-type="bibr" rid="ref-14">14</xref>] designed an S-box algorithm based on a Galois field for protecting confidential information. Gao et al. [<xref ref-type="bibr" rid="ref-15">15</xref>] proposed a new 3D memristive cubic map using dual memristors and demonstrated its application to image encryption. The encryption scheme has strong confusion and diffusion properties. Lai and Chen [<xref ref-type="bibr" rid="ref-16">16</xref>] introduced an efficient and robust bit-level image encryption technique using chaotic maps. Aribilola et al. [<xref ref-type="bibr" rid="ref-17">17</xref>] proposed a technique for constructing robust S-boxes based on M&#x00F6;bius transformation combined with bit-wise shift permutation to improve the security of Internet of Things multimedia applications. The schemes based on a simple action of the M&#x00F6;bius transformation over a Galois field face the following challenges: (i) such a scheme can be easily predictable by the reverse engineering due to the bijective characteristic of said transformation, (ii) the aforesaid algebraic construction is limited to a small number of S-boxes and hence has the dynamic behaviour of a small degree, and (iii) has low resistance to the key related attacks due to the small number of utilized parameters. Bilal et al. [<xref ref-type="bibr" rid="ref-18">18</xref>] designed a dynamic S-box generator using a Mordell elliptic curve (MEC) with a combination of M&#x00F6;bius transformation. Further, the proposed S-boxes are utilized in image encryption. Dougherty et al. [<xref ref-type="bibr" rid="ref-19">19</xref>] introduced a new approach to image encryption utilizing signature-dependent S-boxes based on Latin squares and the Playfair cryptographic technique. Hua et al. [<xref ref-type="bibr" rid="ref-20">20</xref>] designed a novel S-box algorithm using a complete Latin square to encrypt images. Abd-El-Atty [<xref ref-type="bibr" rid="ref-21">21</xref>] employed quantum walks and particle swarm optimization to present an efficient S-box algorithm and used it in an image cryptosystem. Furthermore, Wang et al. [<xref ref-type="bibr" rid="ref-22">22</xref>] introduced an optical image enciphering technique that utilizes a quantum S-box. Gao et al. [<xref ref-type="bibr" rid="ref-23">23</xref>] designed a 3D hyperchaotic map, which is used to construct a pseudo-random number generator and a multi-image encryption scheme with robust cryptographic properties. Farah et al. [<xref ref-type="bibr" rid="ref-24">24</xref>] applied a Jaya optimization approach to enhance the performance of the chaotic-based S-box. Zamli [<xref ref-type="bibr" rid="ref-25">25</xref>] introduced a novel optimization technique to form an S-box that surpasses other optimization algorithms in two major benchmarks, namely nonlinearity and the strict avalanche criteria, while maintaining the desired performance in other metrics. Alhadawi et al. [<xref ref-type="bibr" rid="ref-26">26</xref>] presented a new S-box generation method combining a discrete chaotic map and nomadic people optimization. Artuger [<xref ref-type="bibr" rid="ref-27">27</xref>] developed a method to produce S-boxes with high nonlinearity based on a chaotic system and the whale optimization algorithm. Jawed and Sajid [<xref ref-type="bibr" rid="ref-28">28</xref>] designed an optimal S-box generation algorithm using an algebraic-heuristic algorithm, affine mapping, Galois field, and chaotic system. Additionally, the proposed S-box is utilized for both encryption and decryption of images. Qobbi et al. [<xref ref-type="bibr" rid="ref-29">29</xref>] used a genetic operator to construct a dynamic S-box to design a chaotic encryption scheme for medical images.</p>
<p>From the past few decades, elliptic curves (ECs) are playing a significant role in the area of cryptography due to their strong algebraic and cryptographic properties. Particularly, the sensitivity to initial parameters and the underlying algebraic structures. Furthermore, when the ordered EC is transformed through some maps, the dynamic behaviour and ordered points of the ECs make it difficult for the intruders to discover the utilized scheme for the generation of cryptographic components. Firstly, Miller utilized the EC in the field of cryptography [<xref ref-type="bibr" rid="ref-30">30</xref>] and stated that EC based cryptosystem is twenty times faster than the Diffie-Hellman scheme with identical key size. The ECs offer strong security with a smaller key size when compared to existing classical cryptosystems [<xref ref-type="bibr" rid="ref-31">31</xref>]. Liu and Liu [<xref ref-type="bibr" rid="ref-32">32</xref>] developed a cryptographic system based on a cyclic EC. When compared to other traditional cryptosystems, the aforesaid cryptosystems provide more security, but searching of a generator for such kind of ECs is a time consuming task. Silva-Garcia et al. [<xref ref-type="bibr" rid="ref-33">33</xref>] proposed a new symmetric cryptosystem using an EC with strong resistance against linear cryptanalysis. The proposed cryptosystem has a large key space to resist key related attacks. However, the proposed work includes the search for a generator point. In addition, AbdElHaleem et al. [<xref ref-type="bibr" rid="ref-34">34</xref>] designed an EC-based cryptosystem. The proposed cryptosystem is computationally intensive due to the group law operations. Furthermore, Pali et al. [<xref ref-type="bibr" rid="ref-35">35</xref>] introduced a scheme to generate an S-box using a supersingular EC over a finite field. The suggested scheme generates an S-box with high nonlinearity. However, the proposed technique does not have enough strength against key cryptanalysis due to the small size of its keyspace. Ye et al. [<xref ref-type="bibr" rid="ref-36">36</xref>] designed a safe cryptosystem for protecting digital data by utilizing an EC for the key exchange process. A generator point and three parameters each having a large number of bits are used for sharing keys. Consequently, the suggested cryptosystem consumes time in the computation of points from the generator and has small key space for the key exchange process.</p>
<p>Recently, some new S-box construction techniques have been designed based on finite ECs. For example, Hayat et al. [<xref ref-type="bibr" rid="ref-37">37</xref>] firstly used ECs for the generation of S-boxes. Hayat and Azam [<xref ref-type="bibr" rid="ref-38">38</xref>] developed an S-box algorithm using a totally ordered EC over a finite field. Khan et al. [<xref ref-type="bibr" rid="ref-39">39</xref>] developed a new S-box construction technique that uses ECs to construct secure and dynamic S-boxes. This technique computes the points on an EC using group law operations, which takes time to produce S-boxes. Ibrahim and Abbas [<xref ref-type="bibr" rid="ref-40">40</xref>] developed a method for generating dynamic S-boxes using ordered ECs over prime of different bit lengths. Furthermore, Hayat et al. [<xref ref-type="bibr" rid="ref-41">41</xref>] developed an efficient algorithm for generating strong S-boxes against different cryptanalyses using EC over finite rings. In [<xref ref-type="bibr" rid="ref-42">42</xref>] an S-box scheme is proposed for block ciphers based on ordered EC over finite rings to generate dynamic S-boxes for image encryption. The methods developed in [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-45">45</xref>] utilize ordered MECs to construct strong S-boxes with a low time complexity. Nevertheless, all the techniques mentioned in [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-45">45</xref>] have a common fact. That is, the proposed schemes are difficult to apply with ECs over large prime. The reason is the generation of all points on ECs to generate S-boxes. As the methods in [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-45">45</xref>] use MECs with two parameters <inline-formula id="ieqn-1"><mml:math id="mml-ieqn-1"><mml:mi>b</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-2"><mml:math id="mml-ieqn-2"><mml:mi>p</mml:mi></mml:math></inline-formula>. Due to the limited number of input parameters, the suggested algorithms have small key spaces and are vulnerable to key related attacks. Additionally, it is noted that these schemes cannot produce S-boxes for significantly small primes. Thus, there is still a need to generate dynamic S-boxes with strong cryptographic properties. The above discussion concludes the following research gaps for the motivation of this study.</p>
</sec>
<sec id="s1_2">
<label>1.2</label>
<title>Research Gaps and Motivation</title>
<p>The research gaps, novelty, and base for the current study are summarized as follows:
<list list-type="bullet">
<list-item>
<p>Despite that all of the discussed schemes have their own importance to develop nonlinear components, but all of them either need the whole EC or the EC at least of the length <inline-formula id="ieqn-3"><mml:math id="mml-ieqn-3"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula> to design an <inline-formula id="ieqn-4"><mml:math id="mml-ieqn-4"><mml:mi>n</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mi>n</mml:mi></mml:math></inline-formula> S-box. Thus, the need is to focus on generating the S-box of the same length in an optimized manner. The current scheme is optimized by reducing the number of points of the EC to <inline-formula id="ieqn-5"><mml:math id="mml-ieqn-5"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula>, which is half the length of the S-box. Furthermore, these points are not fixed as in the former schemes. This property makes our scheme not only fast but also flexible in selecting points.</p></list-item>
<list-item>
<p>The former schemes concentrate on the efficiency of the generation of the EC based S-box, but the time interval gets larger when a large number of S-boxes are required. To the best of our knowledge, no study has yet discussed the efficiency of the scheme for a large number of distinct S-boxes, taking into account the computation time of the underlying EC. The current scheme addresses this research gap by introducing an efficient scheme based on the MEC over the complex field.</p></list-item>
<list-item>
<p>Similarly, the aforementioned schemes require a prime larger than the size of the S-box. Naturally, the question arises whether the newly developed scheme performs for those primes for which the others do not. The authors answer this question by experimentally showing the performance of the current scheme for those primes where others are restricted. The new algorithm is also suitable for application in a constrained environment.</p></list-item>
</list></p>
</sec>
<sec id="s1_3">
<label>1.3</label>
<title>Contribution</title>
<p>To overcome the deficiencies in existing state-of-the-art S-box construction techniques, we designed a novel S-box construction algorithm. Our main contributions are:
<list list-type="bullet">
<list-item>
<p>We select a MEC with <inline-formula id="ieqn-6"><mml:math id="mml-ieqn-6"><mml:mi>p</mml:mi><mml:mo>&#x2261;</mml:mo><mml:mn>3</mml:mn><mml:mspace width="0.444em" /><mml:mo stretchy="false">(</mml:mo><mml:mi>mod</mml:mi><mml:mspace width="0.333em" /><mml:mn>4</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, and a complex algebraic structure <inline-formula id="ieqn-7"><mml:math id="mml-ieqn-7"><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mi>i</mml:mi><mml:mo>]</mml:mo></mml:mrow></mml:math></inline-formula> rather than a real finite field or ring. The aim of choosing such a conditional prime is to get a field. As for each prime <inline-formula id="ieqn-8"><mml:math id="mml-ieqn-8"><mml:mi>p</mml:mi></mml:math></inline-formula>, <inline-formula id="ieqn-9"><mml:math id="mml-ieqn-9"><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mi>i</mml:mi><mml:mo>]</mml:mo></mml:mrow></mml:math></inline-formula> is not a field. The elements of the chosen field are complex numbers, which consist of both real and imaginary parts. The nature of points of an MEC generated over such a field is not easy to understand, as in the case of real fields.</p></list-item>
<list-item>
<p>The new scheme does not require generating all the points of the MEC; however, to optimize the scheme, the points required by the scheme are fixed and are half the length of the proposed S-box. In addition, any such points may be selected on the chosen EC, which is not the case in [<xref ref-type="bibr" rid="ref-40">40</xref>,<xref ref-type="bibr" rid="ref-41">41</xref>,<xref ref-type="bibr" rid="ref-43">43</xref>,<xref ref-type="bibr" rid="ref-44">44</xref>]. This property makes it more difficult to determine the utilized points by brute-force search.</p></list-item>
<list-item>
<p>In the current scheme, we do not impose a condition on the size of the underlying prime. Therefore, the scheme also works for primes of restricted size if the number of points on the MEC for that prime is at least half the length of the S-box. However, the schemes in [<xref ref-type="bibr" rid="ref-39">39</xref>,<xref ref-type="bibr" rid="ref-41">41</xref>,<xref ref-type="bibr" rid="ref-43">43</xref>,<xref ref-type="bibr" rid="ref-44">44</xref>] require primes with a sufficiently large size. Thus, in this respect, our scheme is optimal than the schemes [<xref ref-type="bibr" rid="ref-39">39</xref>,<xref ref-type="bibr" rid="ref-41">41</xref>&#x2013;<xref ref-type="bibr" rid="ref-44">44</xref>] to output an S-box. Apart from this, the current scheme is more efficient than the methods in [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-44">44</xref>] in generating a significant number of dynamic S-boxes.</p></list-item>
<list-item>
<p>In the presented scheme, we form a vector by merging the real and imaginary parts of a coordinate of the naturally ordered points. The aim of doing this is to form a row vector with more diffusion in the acquired entries, which is not possible in the existing schemes based on the ECs generated over real finite fields or rings.</p></list-item>
<list-item>
<p>As the MEC consists of only two parameters. So, the key space is enhanced by applying the linear fractional transformation by preserving the existing order, and the key space of the current scheme becomes larger than that of existing schemes.</p></list-item>
<list-item>
<p>The randomness in elements of an S-box and the non-singularity of an algorithm are necessary to design an S-box. The stated objectives are achieved by selecting the indices of numbers in the formed vector. In a mathematical result, we show that the proposed algorithm has no singular points.</p></list-item>
<list-item>
<p>To achieve an S-box with the desired level of cryptographic properties, we permuted the initial S-box using a random permutation <inline-formula id="ieqn-10"><mml:math id="mml-ieqn-10"><mml:mi>&#x03C0;</mml:mi></mml:math></inline-formula> of length <inline-formula id="ieqn-11"><mml:math id="mml-ieqn-11"><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup></mml:math></inline-formula>. The permuted S-box outperforms existing optimal S-boxes in different cryptographic properties.</p></list-item>
<list-item>
<p>It is essential to evaluate the potential of an algorithm regarding the generation of S-boxes. Therefore, we theoretically find the exact number of the proposed S-boxes. Furthermore, we mathematically classify the S-boxes that do not qualify for the desired level of security.</p></list-item>
<list-item>
<p>The recently developed EC based schemes are not capable of giving an output for the significantly small primes. Therefore, we experimentally prove that the newly developed algorithm can generate a large number of highly non-linear S-boxes for small primes.</p></list-item>
</list></p>
</sec>
<sec id="s1_4">
<label>1.4</label>
<title>Paper Organization</title>
<p>The rest of the paper is organized as follows: The preliminaries for the finite field, EC, and M&#x00F6;bius transformation are discussed in <xref ref-type="sec" rid="s2">Section 2</xref>. The complete point-wise description of the proposed S-box algorithm is detailed in <xref ref-type="sec" rid="s3">Section 3</xref>. The cryptographic properties of the proposed S-box algorithm are analyzed in <xref ref-type="sec" rid="s4">Sections 4</xref> and <xref ref-type="sec" rid="s5">5</xref>, while the application of the proposed S-box is presented in <xref ref-type="sec" rid="s6">Section 6</xref>. Finally, the concluding remarks of the study are drawn in <xref ref-type="sec" rid="s7">Section 7</xref>.</p>
</sec>
</sec>
<sec id="s2">
<label>2</label>
<title>Paper Methodology</title>
<p>The proposed cryptographic system consists of three main phases: The selection of an appropriate finite field, an EC, and a transformation. As finite field are carefully chosen for developing a cryptosystem. The proposed study chooses the appropriate prime to construct a finite field. Then an MEC is generated based on the chosen finite field. To optimize the scheme, the specific points of the MEC based on the chosen field are generated instead of generating the whole EC. The generated points are naturally ordered. Lastly, we transform only one coordinate of the points by a linear fractional transformation. The indices of the transformed coordinate result in an S-box. We define all the related concepts in the following subsections.</p>
<sec id="s2_1">
<label>2.1</label>
<title>Finite Field</title>
<p>If <inline-formula id="ieqn-12"><mml:math id="mml-ieqn-12"><mml:mi>n</mml:mi></mml:math></inline-formula> is a prime number, then the set <inline-formula id="ieqn-13"><mml:math id="mml-ieqn-13"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>n</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo>}</mml:mo></mml:mrow></mml:math></inline-formula> is a finite field [<xref ref-type="bibr" rid="ref-46">46</xref>]. Otherwise, it is a ring of integers and denoted by <inline-formula id="ieqn-14"><mml:math id="mml-ieqn-14"><mml:msub><mml:mrow><mml:mtext>Z</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>n</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> [<xref ref-type="bibr" rid="ref-46">46</xref>]. It is important to note that, for each prime <inline-formula id="ieqn-15"><mml:math id="mml-ieqn-15"><mml:mi>p</mml:mi></mml:math></inline-formula>, there exists a finite field <inline-formula id="ieqn-16"><mml:math id="mml-ieqn-16"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> with <inline-formula id="ieqn-17"><mml:math id="mml-ieqn-17"><mml:mi>p</mml:mi></mml:math></inline-formula> elements. Furthermore, the set <inline-formula id="ieqn-18"><mml:math id="mml-ieqn-18"><mml:msub><mml:mrow><mml:mtext>Z</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mi>i</mml:mi><mml:mo>]</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mi>a</mml:mi><mml:mo>+</mml:mo><mml:mi>b</mml:mi><mml:mi>i</mml:mi><mml:mo>:</mml:mo><mml:mi>a</mml:mi><mml:mo>,</mml:mo><mml:mi>b</mml:mi><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mtext>Z</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>}</mml:mo></mml:mrow></mml:math></inline-formula> with <inline-formula id="ieqn-19"><mml:math id="mml-ieqn-19"><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:msqrt><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:msqrt></mml:math></inline-formula> is a ring with <inline-formula id="ieqn-20"><mml:math id="mml-ieqn-20"><mml:msup><mml:mi>p</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula> elements. In a ring <inline-formula id="ieqn-21"><mml:math id="mml-ieqn-21"><mml:msub><mml:mrow><mml:mtext>Z</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mi>i</mml:mi><mml:mo>]</mml:mo></mml:mrow></mml:math></inline-formula>, the addition and multiplication operations are performed using standard complex numbers under the modulo <inline-formula id="ieqn-22"><mml:math id="mml-ieqn-22"><mml:mi>p</mml:mi></mml:math></inline-formula> operation. If a condition is imposed on prime <inline-formula id="ieqn-23"><mml:math id="mml-ieqn-23"><mml:mi>p</mml:mi></mml:math></inline-formula>, then <inline-formula id="ieqn-24"><mml:math id="mml-ieqn-24"><mml:msub><mml:mrow><mml:mtext>Z</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mi>i</mml:mi><mml:mo>]</mml:mo></mml:mrow></mml:math></inline-formula> becomes a field <inline-formula id="ieqn-25"><mml:math id="mml-ieqn-25"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mi>i</mml:mi><mml:mo>]</mml:mo></mml:mrow></mml:math></inline-formula>. Let us discuss this condition in the auxiliary result stated in Lemma 1 as follows.</p>

<p><bold>Lemma 1:</bold> <italic>Let <inline-formula id="ieqn-26"><mml:math id="mml-ieqn-26"><mml:mi>p</mml:mi></mml:math></inline-formula> be a prime number. Then <inline-formula id="ieqn-27"><mml:math id="mml-ieqn-27"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mi>i</mml:mi><mml:mo>]</mml:mo></mml:mrow></mml:math></inline-formula> is a field if and only if <inline-formula id="ieqn-28"><mml:math id="mml-ieqn-28"><mml:mi>p</mml:mi><mml:mo>&#x2261;</mml:mo><mml:mn>3</mml:mn><mml:mspace width="0.444em" /><mml:mo stretchy="false">(</mml:mo><mml:mi>mod</mml:mi><mml:mspace width="0.333em" /><mml:mn>4</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> [<xref ref-type="bibr" rid="ref-47">47</xref>]</italic>.</p>

</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Elliptic Curve</title>
<p>ECs are widely utilized in cryptography due to their strong security. The ECs may be defined over fields and rings. We give a brief introduction of ECs over different algebraic structures in the following.</p>
<p>An EC over a finite field <inline-formula id="ieqn-29"><mml:math id="mml-ieqn-29"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> with <inline-formula id="ieqn-30"><mml:math id="mml-ieqn-30"><mml:mi>a</mml:mi><mml:mo>,</mml:mo><mml:mi>b</mml:mi></mml:math></inline-formula> <inline-formula id="ieqn-31"><mml:math id="mml-ieqn-31"><mml:mo>&#x2208;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-32"><mml:math id="mml-ieqn-32"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> is the set of points defined as,
<disp-formula id="eqn-1"><label>(1)</label><mml:math id="mml-eqn-1" display="block"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,a,b</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mi>x</mml:mi><mml:mo>,</mml:mo><mml:mi>y</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x00D7;</mml:mo><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>:</mml:mo><mml:msup><mml:mi>y</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2261;</mml:mo><mml:msup><mml:mi>x</mml:mi><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mi>a</mml:mi><mml:msup><mml:mi>x</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mi>b</mml:mi><mml:mspace width="mediummathspace" /><mml:mspace width="1em" /><mml:mo stretchy="false">(</mml:mo><mml:mi>mod</mml:mi><mml:mspace width="0.333em" /><mml:mi>p</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>}</mml:mo></mml:mrow><mml:mo>&#x222A;</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mi>&#x1D4AA;</mml:mi></mml:mrow><mml:mo>}</mml:mo></mml:mrow><mml:mo>.</mml:mo></mml:math></disp-formula></p>
<p>The prime <inline-formula id="ieqn-33"><mml:math id="mml-ieqn-33"><mml:mi>p</mml:mi></mml:math></inline-formula>, and integers <inline-formula id="ieqn-34"><mml:math id="mml-ieqn-34"><mml:mi>a</mml:mi><mml:mo>,</mml:mo><mml:mi>b</mml:mi></mml:math></inline-formula> are called the parameters of the EC <inline-formula id="ieqn-35"><mml:math id="mml-ieqn-35"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,a,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>, while the point <inline-formula id="ieqn-36"><mml:math id="mml-ieqn-36"><mml:mrow><mml:mi>&#x1D4AA;</mml:mi></mml:mrow></mml:math></inline-formula> represents the point at infinity. Let <inline-formula id="ieqn-37"><mml:math id="mml-ieqn-37"><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,a,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> represent the number of points on an EC, then in [<xref ref-type="bibr" rid="ref-48">48</xref>], the upper bound on the <inline-formula id="ieqn-38"><mml:math id="mml-ieqn-38"><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,a,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> is computed by Hasse&#x2019;s Theorem 1.</p>
<p><bold>Theorem 1</bold> (Hasse&#x2019;s Theorem): <italic>Suppose <inline-formula id="ieqn-39"><mml:math id="mml-ieqn-39"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,a,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> is an EC over the field <inline-formula id="ieqn-40"><mml:math id="mml-ieqn-40"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>. The upper bound for <inline-formula id="ieqn-41"><mml:math id="mml-ieqn-41"><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,a,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> is given by:</italic>
<disp-formula id="ueqn-2"><mml:math id="mml-ueqn-2" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd /><mml:mtd><mml:mrow><mml:mo>|</mml:mo><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,a,b</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mi>p</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo><mml:mo>|</mml:mo></mml:mrow><mml:mo>&#x2264;</mml:mo><mml:mn>2</mml:mn><mml:msqrt><mml:mi>p</mml:mi></mml:msqrt><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>An EC is known as an MEC if the parameter <inline-formula id="ieqn-42"><mml:math id="mml-ieqn-42"><mml:mi>a</mml:mi></mml:math></inline-formula> is set as zero while keeping the other parameter <inline-formula id="ieqn-43"><mml:math id="mml-ieqn-43"><mml:mi>b</mml:mi></mml:math></inline-formula> non-zero. Mathematically, the MEC over the <inline-formula id="ieqn-44"><mml:math id="mml-ieqn-44"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> is defined as:
<disp-formula id="eqn-2"><label>(2)</label><mml:math id="mml-eqn-2" display="block"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,b</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mi>x</mml:mi><mml:mo>,</mml:mo><mml:mi>y</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x00D7;</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>:</mml:mo><mml:msup><mml:mi>y</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2261;</mml:mo><mml:msup><mml:mi>x</mml:mi><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mi>b</mml:mi><mml:mspace width="1em" /><mml:mo stretchy="false">(</mml:mo><mml:mi>mod</mml:mi><mml:mspace width="0.333em" /><mml:mi>p</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>}</mml:mo></mml:mrow><mml:mo>&#x222A;</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mi>O</mml:mi><mml:mo>}</mml:mo></mml:mrow><mml:mo>.</mml:mo></mml:math></disp-formula></p>
<p>The remarkable result regarding the number of points on an MEC is stated in the following Lemma 2.</p>
<p><bold>Lemma 2:</bold> <italic>If <inline-formula id="ieqn-45"><mml:math id="mml-ieqn-45"><mml:mi>p</mml:mi><mml:mo>&#x2261;</mml:mo><mml:mn>2</mml:mn><mml:mspace width="0.444em" /><mml:mo stretchy="false">(</mml:mo><mml:mi>mod</mml:mi><mml:mspace width="0.333em" /><mml:mn>3</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is a prime with <inline-formula id="ieqn-46"><mml:math id="mml-ieqn-46"><mml:mi>p</mml:mi><mml:mo>&#x2265;</mml:mo><mml:mn>3</mml:mn></mml:math></inline-formula>, then the MEC <inline-formula id="ieqn-47"><mml:math id="mml-ieqn-47"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> comprises precisely <inline-formula id="ieqn-48"><mml:math id="mml-ieqn-48"><mml:mrow><mml:mo>(</mml:mo><mml:mi>p</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula> points, with the unique y-coordinates, and for each <inline-formula id="ieqn-49"><mml:math id="mml-ieqn-49"><mml:mi>y</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mi>p</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo>]</mml:mo></mml:mrow></mml:math></inline-formula>, <inline-formula id="ieqn-50"><mml:math id="mml-ieqn-50"><mml:mi mathvariant="normal">&#x2203;</mml:mi></mml:math></inline-formula> an <inline-formula id="ieqn-51"><mml:math id="mml-ieqn-51"><mml:mi>x</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mi>p</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo>]</mml:mo></mml:mrow></mml:math></inline-formula> such that <inline-formula id="ieqn-52"><mml:math id="mml-ieqn-52"><mml:mrow><mml:mo>(</mml:mo><mml:mi>x</mml:mi><mml:mo>,</mml:mo><mml:mi>y</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula></italic>.</p>
<p>The points of an EC may be ordered in numerous ways, but Azam et al. [<xref ref-type="bibr" rid="ref-43">43</xref>] defined some well-known orderings on the ECs. For instance, the natural ordering <inline-formula id="ieqn-53"><mml:math id="mml-ieqn-53"><mml:msub><mml:mrow><mml:mtext>O</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>N</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> on an EC is explained as follows. Let <inline-formula id="ieqn-54"><mml:math id="mml-ieqn-54"><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula> and <inline-formula id="ieqn-55"><mml:math id="mml-ieqn-55"><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula> be any two points on an EC, then
<disp-formula id="ueqn-4"><mml:math id="mml-ueqn-4" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd /><mml:mtd><mml:mi></mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:msub><mml:mo>&#x227A;</mml:mo><mml:mrow><mml:mi>N</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">&#x21D4;</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mtable columnalign="left left" rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:mrow><mml:mtext>either</mml:mtext></mml:mrow><mml:mspace width="1em" /><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>&#x003C;</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mspace width="1em" /><mml:mrow><mml:mtext>or</mml:mtext></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mspace width="1em" /><mml:mrow><mml:mtext>and</mml:mtext></mml:mrow><mml:mspace width="1em" /><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>&#x003C;</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>When an ordering is defined on an EC, then it is known as an ordered EC.</p>
<p>If an EC <inline-formula id="ieqn-56"><mml:math id="mml-ieqn-56"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,a,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> is defined over the field <inline-formula id="ieqn-57"><mml:math id="mml-ieqn-57"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mi>i</mml:mi><mml:mo>]</mml:mo></mml:mrow></mml:math></inline-formula>, where <inline-formula id="ieqn-58"><mml:math id="mml-ieqn-58"><mml:mi>p</mml:mi></mml:math></inline-formula> is a prime number and satisfying the condition <inline-formula id="ieqn-59"><mml:math id="mml-ieqn-59"><mml:mi>p</mml:mi><mml:mo>&#x2261;</mml:mo><mml:mn>3</mml:mn><mml:mspace width="0.444em" /><mml:mo stretchy="false">(</mml:mo><mml:mi>mod</mml:mi><mml:mspace width="0.333em" /><mml:mn>4</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>. The expression in 1 becomes:
<disp-formula id="ueqn-5"><mml:math id="mml-ueqn-5" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd /><mml:mtd><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,a,b</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mi>x</mml:mi><mml:mo>,</mml:mo><mml:mi>y</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mi>i</mml:mi><mml:mo>]</mml:mo></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mi>i</mml:mi><mml:mo>]</mml:mo></mml:mrow><mml:mo>:</mml:mo><mml:msup><mml:mi>y</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2261;</mml:mo><mml:msup><mml:mi>x</mml:mi><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mi>a</mml:mi><mml:mi>x</mml:mi><mml:mo>+</mml:mo><mml:mi>b</mml:mi><mml:mspace width="mediummathspace" /><mml:mspace width="1em" /><mml:mo stretchy="false">(</mml:mo><mml:mi>mod</mml:mi><mml:mspace width="0.333em" /><mml:mi>p</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>}</mml:mo></mml:mrow><mml:mo>&#x222A;</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mi>O</mml:mi><mml:mo>}</mml:mo></mml:mrow><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>Similarly, the MEC 2 changes to the form:
<disp-formula id="ueqn-6"><mml:math id="mml-ueqn-6" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd /><mml:mtd><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,0,b</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mi>x</mml:mi><mml:mo>,</mml:mo><mml:mi>y</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mi>i</mml:mi><mml:mo>]</mml:mo></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mi>i</mml:mi><mml:mo>]</mml:mo></mml:mrow><mml:mo>:</mml:mo><mml:msup><mml:mi>y</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2261;</mml:mo><mml:msup><mml:mi>x</mml:mi><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mi>b</mml:mi><mml:mspace width="mediummathspace" /><mml:mspace width="1em" /><mml:mo stretchy="false">(</mml:mo><mml:mi>mod</mml:mi><mml:mspace width="0.333em" /><mml:mi>p</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>}</mml:mo></mml:mrow><mml:mo>&#x222A;</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mi>O</mml:mi><mml:mo>}</mml:mo></mml:mrow><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>As the field <inline-formula id="ieqn-60"><mml:math id="mml-ieqn-60"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mi>i</mml:mi><mml:mo>]</mml:mo></mml:mrow></mml:math></inline-formula> is finite. Thus, there exists a finite number of points on the EC <inline-formula id="ieqn-61"><mml:math id="mml-ieqn-61"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,a,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>. In this version of EC, the points appear in the form <inline-formula id="ieqn-62"><mml:math id="mml-ieqn-62"><mml:mi>a</mml:mi><mml:mo>+</mml:mo><mml:mi>b</mml:mi><mml:mi>i</mml:mi></mml:math></inline-formula> for <inline-formula id="ieqn-63"><mml:math id="mml-ieqn-63"><mml:mi>a</mml:mi><mml:mo>,</mml:mo><mml:mi>b</mml:mi><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>.</p>
<p>The points on an EC may be generated in more than one way. We explain two methods, the group law method and the simple search method. Both are briefly explained as follows:
<list list-type="bullet">
<list-item>
<p><bold>The group law:</bold> In this method, one needs to know one non-identity <inline-formula id="ieqn-64"><mml:math id="mml-ieqn-64"><mml:mrow><mml:mtext>P</mml:mtext></mml:mrow></mml:math></inline-formula> point of an EC <inline-formula id="ieqn-65"><mml:math id="mml-ieqn-65"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,a,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>, and the other <inline-formula id="ieqn-66"><mml:math id="mml-ieqn-66"><mml:mi>n</mml:mi></mml:math></inline-formula> points are generated by the binary operation &#x002B;. For any two points <inline-formula id="ieqn-67"><mml:math id="mml-ieqn-67"><mml:mrow><mml:mtext>P</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula> and <inline-formula id="ieqn-68"><mml:math id="mml-ieqn-68"><mml:mrow><mml:mtext>Q</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>Q</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>Q</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula> of an EC, the addition &#x002B; is defined as follows:</p>
<p><inline-formula id="ieqn-69"><mml:math id="mml-ieqn-69"><mml:mrow><mml:mtext>P</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mtext>Q</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>Q</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>Q</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mtext>R</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>R</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>R</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula>, where <inline-formula id="ieqn-70"><mml:math id="mml-ieqn-70"><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>R</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msup><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>Q</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo></mml:math></inline-formula> and <inline-formula id="ieqn-71"><mml:math id="mml-ieqn-71"><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>R</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>Q</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>, where the scalar <inline-formula id="ieqn-72"><mml:math id="mml-ieqn-72"><mml:mi>&#x03BB;</mml:mi></mml:math></inline-formula> is obtained as,
<disp-formula id="ueqn-16"><mml:math id="mml-ueqn-16" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd /><mml:mtd><mml:mi>&#x03BB;</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mtable columnalign="left left" rowspacing=".2em" columnspacing="1em" displaystyle="false"><mml:mtr><mml:mtd><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>Q</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>Q</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:mrow></mml:mfrac></mml:mstyle></mml:mtd><mml:mtd><mml:mrow><mml:mtext>&#xA0;if&#xA0;</mml:mtext></mml:mrow><mml:mrow><mml:mtext>P</mml:mtext></mml:mrow><mml:mo>&#x2260;</mml:mo><mml:mrow><mml:mtext>Q</mml:mtext></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mn>3</mml:mn><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup><mml:mo>+</mml:mo><mml:mi>a</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:mrow></mml:mfrac></mml:mstyle></mml:mtd><mml:mtd><mml:mrow><mml:mtext>&#xA0;if&#xA0;</mml:mtext></mml:mrow><mml:mrow><mml:mtext>P</mml:mtext></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mtext>Q</mml:mtext></mml:mrow><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
It is necessary to mention that in a cyclic EC, only one point is sufficient to generate the whole EC, but the case differs in an ordinary EC.</p></list-item>
<list-item>
<p><bold>Search method:</bold> The first significance of a search method is that one does not need to know any point to generate any EC <inline-formula id="ieqn-73"><mml:math id="mml-ieqn-73"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,a,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>. Secondly, any EC can be generated by a search method. In the said method, we just find those values of <inline-formula id="ieqn-74"><mml:math id="mml-ieqn-74"><mml:mi>x</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-75"><mml:math id="mml-ieqn-75"><mml:mi>y</mml:mi></mml:math></inline-formula> that satisfy the algebraic representation of an EC. To explain this method, let us consider the EC <inline-formula id="ieqn-76"><mml:math id="mml-ieqn-76"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mn>5</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo>:</mml:mo><mml:msup><mml:mi>y</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2261;</mml:mo><mml:msup><mml:mi>x</mml:mi><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:msup><mml:mi>x</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mn>3</mml:mn><mml:mspace width="0.444em" /><mml:mo stretchy="false">(</mml:mo><mml:mi>mod</mml:mi><mml:mspace width="0.333em" /><mml:mn>5</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, and consider the following <xref ref-type="table" rid="table-1">Table 1</xref>.</p>
</list-item>
</list></p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>The description of search method for the points of EC <inline-formula id="ieqn-77"><mml:math id="mml-ieqn-77"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mn>5</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>3</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></title>
</caption>
<table>
<colgroup>
<col align="left"/></colgroup>
<tbody>
<tr>
<td align="center"><inline-graphic xlink:href="CMC_73097-inline-1.tif"/></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>It is visible from the <xref ref-type="table" rid="table-1">Table 1</xref>, that (1, 0), (4, 1), (4, 4) are points of the EC <inline-formula id="ieqn-78"><mml:math id="mml-ieqn-78"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mn>5</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>3</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula>.</p>

</sec>
<sec id="s2_3">
<label>2.3</label>
<title>M&#x00F6;bius Transformation</title>
<p>M&#x00F6;bius transformation based on algebraic structures and chaotic systems are widely used in literature to design highly secure cryptosystems [<xref ref-type="bibr" rid="ref-12">12</xref>,<xref ref-type="bibr" rid="ref-17">17</xref>]. The cryptographic algorithms based on M&#x00F6;bius transformation have strong resistance against various security attacks, including linear and differential attacks. In our framework, we design a cryptographic algorithm by combining an EC and M&#x00F6;bius transformation over the field <inline-formula id="ieqn-79"><mml:math id="mml-ieqn-79"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mi>i</mml:mi><mml:mo>]</mml:mo></mml:mrow><mml:mo>.</mml:mo></mml:math></inline-formula> A M&#x00F6;bius transformation (or fractional linear transformation) <inline-formula id="ieqn-80"><mml:math id="mml-ieqn-80"><mml:mi>g</mml:mi></mml:math></inline-formula> is a rational map of complex numbers <italic>Z</italic> because the map <inline-formula id="ieqn-81"><mml:math id="mml-ieqn-81"><mml:mi>f</mml:mi></mml:math></inline-formula> is the ratio of two linear maps, which is mathematically expressed as follows:
<disp-formula id="eqn-3"><label>(3)</label><mml:math id="mml-eqn-3" display="block"><mml:mi>g</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>Z</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>c</mml:mi><mml:mi>Z</mml:mi><mml:mo>+</mml:mo><mml:mi>d</mml:mi></mml:mrow><mml:mrow><mml:mi>e</mml:mi><mml:mi>Z</mml:mi><mml:mo>+</mml:mo><mml:mi>f</mml:mi></mml:mrow></mml:mfrac><mml:mo>,</mml:mo></mml:math></disp-formula>where the complex coefficients <inline-formula id="ieqn-82"><mml:math id="mml-ieqn-82"><mml:mi>c</mml:mi></mml:math></inline-formula>, <inline-formula id="ieqn-83"><mml:math id="mml-ieqn-83"><mml:mi>d</mml:mi></mml:math></inline-formula>, <inline-formula id="ieqn-84"><mml:math id="mml-ieqn-84"><mml:mi>e</mml:mi></mml:math></inline-formula>, and <inline-formula id="ieqn-85"><mml:math id="mml-ieqn-85"><mml:mi>f</mml:mi><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mi>i</mml:mi><mml:mo>]</mml:mo></mml:mrow><mml:mo>.</mml:mo></mml:math></inline-formula> Now, we explain two important conditions of M&#x00F6;bius transformation: when <inline-formula id="ieqn-86"><mml:math id="mml-ieqn-86"><mml:mi>c</mml:mi><mml:mi>f</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>d</mml:mi><mml:mi>e</mml:mi><mml:mo>&#x2260;</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula> and when <inline-formula id="ieqn-87"><mml:math id="mml-ieqn-87"><mml:mi>c</mml:mi><mml:mi>f</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>d</mml:mi><mml:mi>e</mml:mi><mml:mo>=</mml:mo><mml:mn>0.</mml:mn></mml:math></inline-formula>
<list list-type="simple">
<list-item><label>(i)</label><p>When <inline-formula id="ieqn-88"><mml:math id="mml-ieqn-88"><mml:mi>c</mml:mi><mml:mi>f</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>d</mml:mi><mml:mi>e</mml:mi><mml:mo>&#x2260;</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>, then <inline-formula id="ieqn-89"><mml:math id="mml-ieqn-89"><mml:mi>g</mml:mi></mml:math></inline-formula> is said to be a non-singular map and is bijective. Thus, <inline-formula id="ieqn-90"><mml:math id="mml-ieqn-90"><mml:mi>g</mml:mi></mml:math></inline-formula> is invertible [<xref ref-type="bibr" rid="ref-49">49</xref>].</p></list-item>
<list-item><label>(ii)</label><p>When <inline-formula id="ieqn-91"><mml:math id="mml-ieqn-91"><mml:mi>c</mml:mi><mml:mi>f</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>d</mml:mi><mml:mi>e</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>, then <inline-formula id="ieqn-92"><mml:math id="mml-ieqn-92"><mml:mi>g</mml:mi></mml:math></inline-formula> is called a singular map and not invertible. Thus, the transformation becomes constant [<xref ref-type="bibr" rid="ref-49">49</xref>].</p></list-item>
</list></p>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>The Proposed S-Box Description</title>
<p>Our scheme is concerned with the generation of S-boxes by integrating three mathematical structures: the finite field of <inline-formula id="ieqn-93"><mml:math id="mml-ieqn-93"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">[</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula>, the MEC <inline-formula id="ieqn-94"><mml:math id="mml-ieqn-94"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>, and the M&#x00F6;bius transformation. The basic steps in generating the resulting S-box are described as follows:
<list list-type="simple">
<list-item><label>(i)</label><p>To get the field <inline-formula id="ieqn-95"><mml:math id="mml-ieqn-95"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">[</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula>, it is necessary to select the appropriate prime <inline-formula id="ieqn-96"><mml:math id="mml-ieqn-96"><mml:mi>p</mml:mi></mml:math></inline-formula>. As for each prime <inline-formula id="ieqn-97"><mml:math id="mml-ieqn-97"><mml:mi>p</mml:mi></mml:math></inline-formula>, <inline-formula id="ieqn-98"><mml:math id="mml-ieqn-98"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">[</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula> is not a field. It becomes a ring for some primes, for example, 13, 17, and 29. Keeping in view this reason, we choose the prime <inline-formula id="ieqn-99"><mml:math id="mml-ieqn-99"><mml:mi>p</mml:mi></mml:math></inline-formula> such that <inline-formula id="ieqn-100"><mml:math id="mml-ieqn-100"><mml:mi>p</mml:mi><mml:mo>&#x2261;</mml:mo><mml:mn>3</mml:mn><mml:mspace width="0.444em" /><mml:mo stretchy="false">(</mml:mo><mml:mi>mod</mml:mi><mml:mspace width="0.333em" /><mml:mn>4</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, so that <inline-formula id="ieqn-101"><mml:math id="mml-ieqn-101"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">[</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula> becomes a field [<xref ref-type="bibr" rid="ref-47">47</xref>]. Selecting a ring instead of a field may result zero more than once in the denominator of the M&#x00F6;bius transformation, whereas in a field there exists a unique case causing the M&#x00F6;bius transformation to be undefined. So, in the case of fields, excluding such a case consumes less time than in the case of rings. Moreover, the prediction of the MEC over the proposed field <inline-formula id="ieqn-102"><mml:math id="mml-ieqn-102"><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mi>i</mml:mi><mml:mo>]</mml:mo></mml:mrow></mml:math></inline-formula> needs <inline-formula id="ieqn-103"><mml:math id="mml-ieqn-103"><mml:mrow><mml:mi>&#x1D4AA;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mi>p</mml:mi><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msup><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> time, whereas in case of the field <inline-formula id="ieqn-104"><mml:math id="mml-ieqn-104"><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> one can search the whole MEC in time <inline-formula id="ieqn-105"><mml:math id="mml-ieqn-105"><mml:mrow><mml:mi>&#x1D4AA;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mi>p</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>. That is, the selected field enhances the complexity of the brute-force attacks.</p></list-item>
<list-item><label>(ii)</label><p>Recently, in [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-44">44</xref>], MECs over the finite field <inline-formula id="ieqn-106"><mml:math id="mml-ieqn-106"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> are widely used due to the commonly recognized property explained by Lemma 2 in <xref ref-type="sec" rid="s2">Section 2</xref>. But we select the MEC <inline-formula id="ieqn-107"><mml:math id="mml-ieqn-107"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> over the chosen field <inline-formula id="ieqn-108"><mml:math id="mml-ieqn-108"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">[</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula> in the Step 3 To generate an <inline-formula id="ieqn-109"><mml:math id="mml-ieqn-109"><mml:mi>n</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mi>n</mml:mi></mml:math></inline-formula> S-box, we do not need to generate the all possible points of the <inline-formula id="ieqn-110"><mml:math id="mml-ieqn-110"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>, but only <inline-formula id="ieqn-111"><mml:math id="mml-ieqn-111"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula> points are sufficient to design the proposed S-box. Regardless of the approach, one may obtain any <inline-formula id="ieqn-112"><mml:math id="mml-ieqn-112"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula> points of the <inline-formula id="ieqn-113"><mml:math id="mml-ieqn-113"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>, but we select the initial <inline-formula id="ieqn-114"><mml:math id="mml-ieqn-114"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula> naturally ordered points of EC over <inline-formula id="ieqn-115"><mml:math id="mml-ieqn-115"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">[</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula>.</p></list-item>
<list-item><label>(iii)</label><p>After achieving the desired number of points, we proceed to arrange them by natural ordering. The significance of ordering is to distort the natural sequence of the points of the MEC. We do not specify the nature of points, whether they are different or similar. Thus, in what follows, <inline-formula id="ieqn-116"><mml:math id="mml-ieqn-116"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> is a naturally ordered MEC over <inline-formula id="ieqn-117"><mml:math id="mml-ieqn-117"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">[</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula> with <inline-formula id="ieqn-118"><mml:math id="mml-ieqn-118"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula> points unless it is specified.</p></list-item>
<list-item><label>(iv)</label><p>Next, we continue by selecting four parameters <inline-formula id="ieqn-119"><mml:math id="mml-ieqn-119"><mml:mi>c</mml:mi><mml:mo>,</mml:mo><mml:mi>d</mml:mi><mml:mo>,</mml:mo><mml:mi>e</mml:mi><mml:mo>,</mml:mo><mml:mi>f</mml:mi><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">[</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula> and apply the M&#x00F6;bius transformation <inline-formula id="ieqn-120"><mml:math id="mml-ieqn-120"><mml:mi>g</mml:mi></mml:math></inline-formula> for these parameters on only one coordinate of the generated <inline-formula id="ieqn-121"><mml:math id="mml-ieqn-121"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>. Currently, the <inline-formula id="ieqn-122"><mml:math id="mml-ieqn-122"><mml:mi>y</mml:mi></mml:math></inline-formula>-coordinate is transformed by the transformation <inline-formula id="ieqn-123"><mml:math id="mml-ieqn-123"><mml:mi>g</mml:mi></mml:math></inline-formula>. Keeping in view that the parameters <inline-formula id="ieqn-124"><mml:math id="mml-ieqn-124"><mml:mi>c</mml:mi><mml:mo>,</mml:mo><mml:mi>d</mml:mi><mml:mo>,</mml:mo><mml:mi>e</mml:mi><mml:mo>,</mml:mo><mml:mi>f</mml:mi><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">[</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula> are chosen by excluding the value for which the map <inline-formula id="ieqn-125"><mml:math id="mml-ieqn-125"><mml:mi>g</mml:mi></mml:math></inline-formula> becomes undefined. Otherwise, the transformation may be applied to any parameters.</p></list-item>
<list-item><label>(v)</label><p>Now form a row vector <inline-formula id="ieqn-126"><mml:math id="mml-ieqn-126"><mml:msub><mml:mi>A</mml:mi><mml:mrow><mml:mrow><mml:mtext>g(y)</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> by respectively allocating the odd and even indices to the real and imaginary parts of the acquired values of <inline-formula id="ieqn-127"><mml:math id="mml-ieqn-127"><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>. So that the length of <inline-formula id="ieqn-128"><mml:math id="mml-ieqn-128"><mml:msub><mml:mi>A</mml:mi><mml:mrow><mml:mrow><mml:mtext>g(y)</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> is <inline-formula id="ieqn-129"><mml:math id="mml-ieqn-129"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula>.</p></list-item>
<list-item><label>(vi)</label><p>To design the proposed S-box, we define and apply a mathematical rule as:
<disp-formula id="ueqn-166"><mml:math id="mml-ueqn-166" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd /><mml:mtd><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mtable columnalign="left left" rowspacing=".2em" columnspacing="1em" displaystyle="false"><mml:mtr><mml:mtd><mml:mi>r</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mtd><mml:mtd><mml:mrow><mml:mtext>&#xA0;if&#xA0;</mml:mtext></mml:mrow><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mrow><mml:mtext>r</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mo movablelimits="true" form="prefix">max</mml:mo><mml:mstyle scriptlevel="0"><mml:mrow><mml:mo maxsize="1.2em" minsize="1.2em">(</mml:mo></mml:mrow></mml:mstyle><mml:msub><mml:mi>A</mml:mi><mml:mrow><mml:mrow><mml:mtext>g</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub><mml:mstyle scriptlevel="0"><mml:mrow><mml:mo maxsize="1.2em" minsize="1.2em">)</mml:mo></mml:mrow></mml:mstyle></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mi>s</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mtd><mml:mtd><mml:mrow><mml:mtext>&#xA0;if&#xA0;</mml:mtext></mml:mrow><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mrow><mml:mtext>r</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mrow><mml:mtext>s</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mtext>&#xA0;and&#xA0;</mml:mtext></mml:mrow><mml:mi>r</mml:mi><mml:mo>&#x003E;</mml:mo><mml:mi>s</mml:mi><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
where <inline-formula id="ieqn-130"><mml:math id="mml-ieqn-130"><mml:mn>1</mml:mn><mml:mo>&#x2264;</mml:mo><mml:mi>r</mml:mi><mml:mo>,</mml:mo><mml:mi>s</mml:mi><mml:mo>&#x2264;</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula> and <inline-formula id="ieqn-131"><mml:math id="mml-ieqn-131"><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2260;</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> for <inline-formula id="ieqn-132"><mml:math id="mml-ieqn-132"><mml:mi>i</mml:mi><mml:mo>&#x2260;</mml:mo><mml:mi>j</mml:mi></mml:math></inline-formula>.</p></list-item>
<list-item><label>(vii)</label><p>Finally, to disrupt the obtained S-box and make it harder for an adversary to exploit the resultant S-box, we permute the <inline-formula id="ieqn-133"><mml:math id="mml-ieqn-133"><mml:mi>&#x03C3;</mml:mi></mml:math></inline-formula> by a random permutation <inline-formula id="ieqn-134"><mml:math id="mml-ieqn-134"><mml:mi>&#x03C0;</mml:mi></mml:math></inline-formula> to obtain a permuted S-box <inline-formula id="ieqn-135"><mml:math id="mml-ieqn-135"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mi>&#x03C0;</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> with enhanced cryptographic properties.</p></list-item>
</list></p>
<p>The above described steps are explicitly summarized in the following Algorithm 1 and <xref ref-type="fig" rid="fig-1">Fig. 1</xref>.</p>
<fig id="fig-11">
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_73097-fig-11.tif"/>
</fig>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Flowchart of our proposed S-box generation process</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_73097-fig-1.tif"/>
</fig>
<p>To have a clear view of the scheme, we explain the steps of the whole scheme by illustrating an example of a <inline-formula id="ieqn-162"><mml:math id="mml-ieqn-162"><mml:mn>4</mml:mn><mml:mo>&#x00D7;</mml:mo><mml:mn>4</mml:mn></mml:math></inline-formula> S-box in the <xref ref-type="fig" rid="fig-2">Fig. 2</xref>.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Generation of the sample S-boxes by the proposed scheme</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_73097-fig-2.tif"/>
</fig>
<p>Let us mathematically assess the probability of obtaining the proposed S-box and determine whether it is injective. We assert that the likelihood of the proposed algorithm is certain in generating injective S-boxes. For this, consider the following Lemma 3.</p>
<p><bold>Lemma 3:</bold> <italic>The presented S-box algorithm is nonsingular, then the resultant S-box is injective</italic>.</p>
<p><bold>Proof:</bold> From Algorithm 1, Step 19, it follows that the cardinality of the data set <inline-formula id="ieqn-163"><mml:math id="mml-ieqn-163"><mml:msub><mml:mi>A</mml:mi><mml:mrow><mml:mrow><mml:mtext>g</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is <inline-formula id="ieqn-164"><mml:math id="mml-ieqn-164"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula>, possibly consists of some repeated values. So, by designing <inline-formula id="ieqn-165"><mml:math id="mml-ieqn-165"><mml:mi>&#x03C3;</mml:mi></mml:math></inline-formula>, we have <inline-formula id="ieqn-166"><mml:math id="mml-ieqn-166"><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mi>r</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mtext>&#xA0;if&#xA0;</mml:mtext><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mrow><mml:mtext>r</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mo movablelimits="true" form="prefix">max</mml:mo><mml:mstyle scriptlevel="0"><mml:mrow><mml:mo maxsize="1.2em" minsize="1.2em">(</mml:mo></mml:mrow></mml:mstyle><mml:msub><mml:mi>A</mml:mi><mml:mrow><mml:mrow><mml:mtext>g</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub><mml:mstyle scriptlevel="0"><mml:mrow><mml:mo maxsize="1.2em" minsize="1.2em">)</mml:mo></mml:mrow></mml:mstyle></mml:math></inline-formula> and <inline-formula id="ieqn-167"><mml:math id="mml-ieqn-167"><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mi>s</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mtext>&#xA0;if&#xA0;</mml:mtext></mml:math></inline-formula>
<inline-formula id="ieqn-168"><mml:math id="mml-ieqn-168"><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mrow><mml:mtext>r</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mrow><mml:mtext>s</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mtext>&#xA0;and&#xA0;</mml:mtext><mml:mi>r</mml:mi><mml:mo>&#x003E;</mml:mo><mml:mi>s</mml:mi></mml:math></inline-formula> for <inline-formula id="ieqn-169"><mml:math id="mml-ieqn-169"><mml:mn>1</mml:mn><mml:mo>&#x2264;</mml:mo><mml:mi>i</mml:mi><mml:mo>&#x2264;</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula>. That is <inline-formula id="ieqn-170"><mml:math id="mml-ieqn-170"><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> represents the index of <inline-formula id="ieqn-171"><mml:math id="mml-ieqn-171"><mml:mo movablelimits="true" form="prefix">max</mml:mo><mml:mstyle scriptlevel="0"><mml:mrow><mml:mo maxsize="1.2em" minsize="1.2em">(</mml:mo></mml:mrow></mml:mstyle><mml:msub><mml:mi>A</mml:mi><mml:mrow><mml:mrow><mml:mtext>g</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub><mml:mstyle scriptlevel="0"><mml:mrow><mml:mo maxsize="1.2em" minsize="1.2em">)</mml:mo></mml:mrow></mml:mstyle></mml:math></inline-formula> in <inline-formula id="ieqn-172"><mml:math id="mml-ieqn-172"><mml:msub><mml:mi>A</mml:mi><mml:mrow><mml:mrow><mml:mtext>g</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub></mml:math></inline-formula> preceding to all other possible repetitions in <inline-formula id="ieqn-173"><mml:math id="mml-ieqn-173"><mml:msub><mml:mi>A</mml:mi><mml:mrow><mml:mrow><mml:mtext>g</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub></mml:math></inline-formula>, and indices may not be repeated. Thus, the probability Pr(<inline-formula id="ieqn-174"><mml:math id="mml-ieqn-174"><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> of each <inline-formula id="ieqn-175"><mml:math id="mml-ieqn-175"><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is <inline-formula id="ieqn-176"><mml:math id="mml-ieqn-176"><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mn>1</mml:mn><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:mfrac></mml:mstyle></mml:math></inline-formula>. As <inline-formula id="ieqn-177"><mml:math id="mml-ieqn-177"><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is <inline-formula id="ieqn-178"><mml:math id="mml-ieqn-178"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula> in number and <inline-formula id="ieqn-179"><mml:math id="mml-ieqn-179"><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, <inline-formula id="ieqn-180"><mml:math id="mml-ieqn-180"><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> for <inline-formula id="ieqn-181"><mml:math id="mml-ieqn-181"><mml:mi>i</mml:mi><mml:mo>&#x2260;</mml:mo><mml:mi>j</mml:mi></mml:math></inline-formula> are mutually exclusive. Then
<disp-formula id="ueqn-10"><mml:math id="mml-ueqn-10" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:mrow><mml:mtext>Pr</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mtd><mml:mtd><mml:mi></mml:mi><mml:mo>=</mml:mo><mml:munderover><mml:mo movablelimits="false">&#x22C3;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup></mml:mrow></mml:munderover><mml:mrow><mml:mtext>Pr</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:munderover><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup></mml:mrow></mml:munderover><mml:mrow><mml:mtext>Pr</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">)</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd /><mml:mtd><mml:mi></mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mtext>Pr</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:mrow><mml:mtext>Pr</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mn>2</mml:mn><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:mrow><mml:mtext>Pr</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mn>3</mml:mn><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>+</mml:mo><mml:mrow><mml:mtext>Pr</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">)</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd /><mml:mtd><mml:mi></mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup></mml:mfrac><mml:mo>+</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup></mml:mfrac><mml:mo>+</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup></mml:mfrac><mml:mo>+</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>+</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup></mml:mfrac><mml:mo>=</mml:mo><mml:mrow><mml:mfrac><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup></mml:mfrac></mml:mrow><mml:mo>=</mml:mo><mml:mn>1.</mml:mn></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>The <inline-formula id="ieqn-182"><mml:math id="mml-ieqn-182"><mml:mrow><mml:mtext>Pr</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula>, ensures the output of an S-box for valid input parameters, thereby confirming the nonsigularity of the proposed algorithm. Now, to prove that the proposed S-box is injective. Let us assume that <inline-formula id="ieqn-183"><mml:math id="mml-ieqn-183"><mml:mi>i</mml:mi><mml:mo>&#x2260;</mml:mo><mml:mi>j</mml:mi></mml:math></inline-formula>, where <inline-formula id="ieqn-184"><mml:math id="mml-ieqn-184"><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mi>r</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mtext>&#xA0;if&#xA0;</mml:mtext><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mrow><mml:mtext>r</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mo movablelimits="true" form="prefix">max</mml:mo><mml:mstyle scriptlevel="0"><mml:mrow><mml:mo maxsize="1.2em" minsize="1.2em">(</mml:mo></mml:mrow></mml:mstyle><mml:msub><mml:mi>A</mml:mi><mml:mrow><mml:mrow><mml:mtext>g</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub><mml:mstyle scriptlevel="0"><mml:mrow><mml:mo maxsize="1.2em" minsize="1.2em">)</mml:mo></mml:mrow></mml:mstyle></mml:math></inline-formula> and <inline-formula id="ieqn-185"><mml:math id="mml-ieqn-185"><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mi>s</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mtext>&#xA0;if&#xA0;</mml:mtext><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mrow><mml:mtext>s</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mo movablelimits="true" form="prefix">max</mml:mo><mml:mstyle scriptlevel="0"><mml:mrow><mml:mo maxsize="1.2em" minsize="1.2em">(</mml:mo></mml:mrow></mml:mstyle><mml:msub><mml:mi>A</mml:mi><mml:mrow><mml:mrow><mml:mtext>g</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub><mml:mstyle scriptlevel="0"><mml:mrow><mml:mo maxsize="1.2em" minsize="1.2em">)</mml:mo></mml:mrow></mml:mstyle></mml:math></inline-formula>. Here, we discuss two cases:
<list list-type="simple">
<list-item><label>(i)</label><p>If <inline-formula id="ieqn-186"><mml:math id="mml-ieqn-186"><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mrow><mml:mtext>r</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x2260;</mml:mo><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mrow><mml:mtext>s</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>, then either <inline-formula id="ieqn-187"><mml:math id="mml-ieqn-187"><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mrow><mml:mtext>r</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x003E;</mml:mo><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mrow><mml:mtext>s</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> or <inline-formula id="ieqn-188"><mml:math id="mml-ieqn-188"><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mrow><mml:mtext>r</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x003C;</mml:mo><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mrow><mml:mtext>s</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-189"><mml:math id="mml-ieqn-189"><mml:mi>r</mml:mi><mml:mo>&#x003C;</mml:mo><mml:mi>s</mml:mi></mml:math></inline-formula> or <inline-formula id="ieqn-190"><mml:math id="mml-ieqn-190"><mml:mi>r</mml:mi><mml:mo>&#x003E;</mml:mo><mml:mi>s</mml:mi></mml:math></inline-formula>. Then in both cases <inline-formula id="ieqn-191"><mml:math id="mml-ieqn-191"><mml:mi>r</mml:mi><mml:mo>&#x2260;</mml:mo><mml:mi>s</mml:mi></mml:math></inline-formula>, that is <inline-formula id="ieqn-192"><mml:math id="mml-ieqn-192"><mml:mi>r</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2260;</mml:mo><mml:mi>s</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula> and hence <inline-formula id="ieqn-193"><mml:math id="mml-ieqn-193"><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2260;</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula></p></list-item>
<list-item><label>(ii)</label><p>Suppose that <inline-formula id="ieqn-194"><mml:math id="mml-ieqn-194"><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mrow><mml:mtext>r</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mrow><mml:mtext>s</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>, as <inline-formula id="ieqn-195"><mml:math id="mml-ieqn-195"><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mrow><mml:mtext>r</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mrow><mml:mtext>s</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>A</mml:mi><mml:mrow><mml:mrow><mml:mtext>g</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub></mml:math></inline-formula>, and <inline-formula id="ieqn-196"><mml:math id="mml-ieqn-196"><mml:msub><mml:mi>A</mml:mi><mml:mrow><mml:mrow><mml:mtext>g</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub></mml:math></inline-formula> is a row (or column) vector. So, <inline-formula id="ieqn-197"><mml:math id="mml-ieqn-197"><mml:mi>r</mml:mi><mml:mo>&#x003C;</mml:mo><mml:mi>s</mml:mi></mml:math></inline-formula> or <inline-formula id="ieqn-198"><mml:math id="mml-ieqn-198"><mml:mi>s</mml:mi><mml:mo>&#x003C;</mml:mo><mml:mi>r</mml:mi></mml:math></inline-formula> depends on the selection of <inline-formula id="ieqn-199"><mml:math id="mml-ieqn-199"><mml:mi>i</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-200"><mml:math id="mml-ieqn-200"><mml:mi>j</mml:mi></mml:math></inline-formula>. Thus <inline-formula id="ieqn-201"><mml:math id="mml-ieqn-201"><mml:mi>r</mml:mi><mml:mo>&#x2260;</mml:mo><mml:mi>s</mml:mi></mml:math></inline-formula> in both the cases, and <inline-formula id="ieqn-202"><mml:math id="mml-ieqn-202"><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2260;</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> as in the preceding case.</p></list-item>
</list></p>
<p>Thus in both the cases, it follows that the newly developed algorithm outputs injective S-boxes with the maximum probability. <inline-formula id="ieqn-203"><mml:math id="mml-ieqn-203"><mml:mi>&#x25FB;</mml:mi></mml:math></inline-formula></p>
<p>To evaluate an S-box generator, it is necessary to check the capability of such a generator with respect to the generation of total S-boxes. The answer to the aforementioned query is provided in Lemma 4.</p>
<p><bold>Lemma 4:</bold> <italic>For a fixed prime <inline-formula id="ieqn-204"><mml:math id="mml-ieqn-204"><mml:mi>p</mml:mi></mml:math></inline-formula>, the total number of the proposed <inline-formula id="ieqn-205"><mml:math id="mml-ieqn-205"><mml:mi>n</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mi>n</mml:mi></mml:math></inline-formula> S-boxes from <inline-formula id="ieqn-206"><mml:math id="mml-ieqn-206"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula> points of MEC <inline-formula id="ieqn-207"><mml:math id="mml-ieqn-207"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> is:</italic></p>
<p><italic>(i) <inline-formula id="ieqn-208"><mml:math id="mml-ieqn-208"><mml:msup><mml:mi>p</mml:mi><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msup><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mi>p</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2212;</mml:mo><mml:mi>m</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mi>p</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, if <inline-formula id="ieqn-209"><mml:math id="mml-ieqn-209"><mml:mi mathvariant="normal">&#x2203;</mml:mi></mml:math></inline-formula>m points <inline-formula id="ieqn-211"><mml:math id="mml-ieqn-211"><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> with <inline-formula id="ieqn-212"><mml:math id="mml-ieqn-212"><mml:mi>e</mml:mi><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mi>f</mml:mi><mml:mo>.</mml:mo></mml:math></inline-formula></italic></p>
<p><italic>(ii) <inline-formula id="ieqn-213"><mml:math id="mml-ieqn-213"><mml:mn>0</mml:mn></mml:math></inline-formula>, if for some <inline-formula id="ieqn-214"><mml:math id="mml-ieqn-214"><mml:mi>i</mml:mi></mml:math></inline-formula>, <inline-formula id="ieqn-215"><mml:math id="mml-ieqn-215"><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>, and <inline-formula id="ieqn-216"><mml:math id="mml-ieqn-216"><mml:mi>f</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula></italic>.</p>
<p><bold>Proof:</bold> From Algorithm 1, it may be observed that the proposed <inline-formula id="ieqn-217"><mml:math id="mml-ieqn-217"><mml:mi>n</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mi>n</mml:mi></mml:math></inline-formula> S-box needs <inline-formula id="ieqn-218"><mml:math id="mml-ieqn-218"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula> values of the <inline-formula id="ieqn-219"><mml:math id="mml-ieqn-219"><mml:mi>y</mml:mi></mml:math></inline-formula>-coordinate. That is <inline-formula id="ieqn-220"><mml:math id="mml-ieqn-220"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula> points of the MEC <inline-formula id="ieqn-221"><mml:math id="mml-ieqn-221"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> are sufficient to get the desired output. For the chosen prime <inline-formula id="ieqn-222"><mml:math id="mml-ieqn-222"><mml:mi>p</mml:mi></mml:math></inline-formula>, <inline-formula id="ieqn-223"><mml:math id="mml-ieqn-223"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">[</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula> becomes a field, and hence a group under both binary operations multiplication and addition. Thus, in Step <inline-formula id="ieqn-224"><mml:math id="mml-ieqn-224"><mml:mn>10</mml:mn></mml:math></inline-formula> of the Algorithm 1, we have <inline-formula id="ieqn-225"><mml:math id="mml-ieqn-225"><mml:mi>e</mml:mi><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:mi>f</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula> either if (i) <inline-formula id="ieqn-226"><mml:math id="mml-ieqn-226"><mml:mi>e</mml:mi><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> and <italic>f</italic> are additive inverses of each other or (ii) for some <inline-formula id="ieqn-227"><mml:math id="mml-ieqn-227"><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>, and <inline-formula id="ieqn-228"><mml:math id="mml-ieqn-228"><mml:mi>f</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>. In the former case, if we have <italic>m</italic> such values of <italic>f</italic> for which <inline-formula id="ieqn-229"><mml:math id="mml-ieqn-229"><mml:mi>e</mml:mi><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> becomes additive inverse of <italic>f</italic>. The <inline-formula id="ieqn-230"><mml:math id="mml-ieqn-230"><mml:mi>e</mml:mi><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> cannot be equal to zero. As <inline-formula id="ieqn-231"><mml:math id="mml-ieqn-231"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">[</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">]</mml:mo><mml:mo>&#x2216;</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mn>0</mml:mn><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math></inline-formula> is the multiplicative group, then we need to skip <inline-formula id="ieqn-232"><mml:math id="mml-ieqn-232"><mml:mi>m</mml:mi></mml:math></inline-formula> such values of <italic>e</italic> to get the set et <inline-formula id="ieqn-233"><mml:math id="mml-ieqn-233"><mml:msub><mml:mi>A</mml:mi><mml:mrow><mml:mrow><mml:mtext>g</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, and hence we are left with <inline-formula id="ieqn-234"><mml:math id="mml-ieqn-234"><mml:msup><mml:mi>p</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2212;</mml:mo><mml:mi>m</mml:mi></mml:math></inline-formula> choices for <italic>e</italic>, <inline-formula id="ieqn-235"><mml:math id="mml-ieqn-235"><mml:msup><mml:mi>p</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula> choices for each <italic>c, d</italic> and <inline-formula id="ieqn-236"><mml:math id="mml-ieqn-236"><mml:msup><mml:mi>p</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula> possible values for <italic>f</italic>. That is the number of S-boxes becomes <inline-formula id="ieqn-237"><mml:math id="mml-ieqn-237"><mml:msup><mml:mi>p</mml:mi><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msup><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mi>p</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2212;</mml:mo><mml:mi>m</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mi>p</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>. It is mentioned that, for each <inline-formula id="ieqn-238"><mml:math id="mml-ieqn-238"><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> in a chosen set of points, there exists <inline-formula id="ieqn-239"><mml:math id="mml-ieqn-239"><mml:mi>e</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-240"><mml:math id="mml-ieqn-240"><mml:mi>f</mml:mi></mml:math></inline-formula> in a field <inline-formula id="ieqn-241"><mml:math id="mml-ieqn-241"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">[</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula> such that <inline-formula id="ieqn-242"><mml:math id="mml-ieqn-242"><mml:mi>e</mml:mi><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> and <italic>f</italic> become additive inverses, that bounds the maximum such occurrences by <inline-formula id="ieqn-243"><mml:math id="mml-ieqn-243"><mml:mi>m</mml:mi><mml:mo>&#x2264;</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula>. In the later case, the transformation <italic>g</italic> will undefined for all choices of <italic>c, d, e</italic>, and hence we are unable to form the vector <inline-formula id="ieqn-244"><mml:math id="mml-ieqn-244"><mml:msub><mml:mi>A</mml:mi><mml:mrow><mml:mrow><mml:mtext>g</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> from undefined values. Consequently, the Pr<inline-formula id="ieqn-245"><mml:math id="mml-ieqn-245"><mml:mstyle scriptlevel="0"><mml:mrow><mml:mo maxsize="1.2em" minsize="1.2em">(</mml:mo></mml:mrow></mml:mstyle><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mstyle scriptlevel="0"><mml:mrow><mml:mo maxsize="1.2em" minsize="1.2em">)</mml:mo></mml:mrow></mml:mstyle></mml:math></inline-formula> is not defined, and hence in such a special case the number of S-boxes will be zero. <inline-formula id="ieqn-246"><mml:math id="mml-ieqn-246"><mml:mi>&#x25FB;</mml:mi></mml:math></inline-formula></p>
<p><bold>Corollary 1:</bold> <italic>If the points <inline-formula id="ieqn-247"><mml:math id="mml-ieqn-247"><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> are chosen on the mentioned MEC in such a way that for any i, <inline-formula id="ieqn-248"><mml:math id="mml-ieqn-248"><mml:mi>e</mml:mi><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:mi>f</mml:mi><mml:mo>&#x2260;</mml:mo><mml:mn>0</mml:mn><mml:mspace width="0.444em" /><mml:mo stretchy="false">(</mml:mo><mml:mi>mod</mml:mi><mml:mspace width="0.333em" /><mml:mi>p</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, then the total number of the proposed S-boxes is <inline-formula id="ieqn-249"><mml:math id="mml-ieqn-249"><mml:msup><mml:mi>p</mml:mi><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msup><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mi>p</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula></italic>.</p>
<p><bold>Proof:</bold> In such a case <inline-formula id="ieqn-250"><mml:math id="mml-ieqn-250"><mml:mi>e</mml:mi><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:mi>f</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn><mml:mspace width="0.444em" /><mml:mo stretchy="false">(</mml:mo><mml:mi>mod</mml:mi><mml:mspace width="0.333em" /><mml:mi>p</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> if and only if <inline-formula id="ieqn-251"><mml:math id="mml-ieqn-251"><mml:mi>e</mml:mi><mml:mo>=</mml:mo><mml:mi>f</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>. Then by excluding these two values, we obtain the total number of S-boxes <inline-formula id="ieqn-252"><mml:math id="mml-ieqn-252"><mml:msup><mml:mi>p</mml:mi><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msup><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mi>p</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula>. <inline-formula id="ieqn-253"><mml:math id="mml-ieqn-253"><mml:mi>&#x25FB;</mml:mi></mml:math></inline-formula></p>
<p>The presented algorithm is capable of generating cryptographically strong S-boxes, but we specify some cases that should be avoided when constructing the proposed S-box. That is, the resultant S-boxes for such specific parameters are not cryptographically good. More precisely, the minimum nonlinearity becomes zero for such S-boxes. The following Lemma 5 is useful to recognize such S-boxes before generating them by their input parameters.</p>
<p><bold>Lemma 5:</bold> <italic>If <inline-formula id="ieqn-254"><mml:math id="mml-ieqn-254"><mml:mi>c</mml:mi><mml:mo>,</mml:mo><mml:mi>d</mml:mi><mml:mo>,</mml:mo><mml:mi>e</mml:mi><mml:mo>,</mml:mo><mml:mi>f</mml:mi><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">[</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula> such that <inline-formula id="ieqn-255"><mml:math id="mml-ieqn-255"><mml:mi>e</mml:mi><mml:mo>&#x2260;</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula> and <inline-formula id="ieqn-256"><mml:math id="mml-ieqn-256"><mml:mi>c</mml:mi><mml:mi>f</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>d</mml:mi><mml:mi>e</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>. Furthermore, for <inline-formula id="ieqn-257"><mml:math id="mml-ieqn-257"><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo>,</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula><inline-formula id="ieqn-258"><mml:math id="mml-ieqn-258"><mml:mi>&#x2204;</mml:mi></mml:math></inline-formula><inline-formula id="ieqn-259"><mml:math id="mml-ieqn-259"><mml:mi>y</mml:mi></mml:math></inline-formula> with <inline-formula id="ieqn-260"><mml:math id="mml-ieqn-260"><mml:mi>c</mml:mi><mml:mi>y</mml:mi><mml:mo>+</mml:mo><mml:mspace width="1em" /><mml:mi>f</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>, then the minimum nonlinearity of the resultant S-box will be zero</italic>.</p>
<p><bold>Proof:</bold> Since <inline-formula id="ieqn-261"><mml:math id="mml-ieqn-261"><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>c</mml:mi><mml:mi>y</mml:mi><mml:mo>+</mml:mo><mml:mi>d</mml:mi></mml:mrow><mml:mrow><mml:mi>e</mml:mi><mml:mi>y</mml:mi><mml:mo>+</mml:mo><mml:mi>f</mml:mi></mml:mrow></mml:mfrac></mml:math></inline-formula>, and after division algorithm we can write is as <inline-formula id="ieqn-262"><mml:math id="mml-ieqn-262"><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mfrac><mml:mi>c</mml:mi><mml:mi>e</mml:mi></mml:mfrac><mml:mo>+</mml:mo><mml:mfrac><mml:mrow><mml:mi>d</mml:mi><mml:mi>e</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>c</mml:mi><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mi>e</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>c</mml:mi><mml:mi>y</mml:mi><mml:mo>+</mml:mo><mml:mi>f</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mfrac></mml:math></inline-formula>. But we have <inline-formula id="ieqn-263"><mml:math id="mml-ieqn-263"><mml:mi>c</mml:mi><mml:mi>f</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>d</mml:mi><mml:mi>e</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>, which implies that <inline-formula id="ieqn-264"><mml:math id="mml-ieqn-264"><mml:mi>d</mml:mi><mml:mi>e</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>c</mml:mi><mml:mi>f</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>. Then we can write <inline-formula id="ieqn-265"><mml:math id="mml-ieqn-265"><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mfrac><mml:mi>c</mml:mi><mml:mi>e</mml:mi></mml:mfrac></mml:math></inline-formula>, and hence <inline-formula id="ieqn-266"><mml:math id="mml-ieqn-266"><mml:mi>g</mml:mi></mml:math></inline-formula> is independent of <inline-formula id="ieqn-267"><mml:math id="mml-ieqn-267"><mml:mi>y</mml:mi></mml:math></inline-formula>. That is <inline-formula id="ieqn-268"><mml:math id="mml-ieqn-268"><mml:mi>g</mml:mi></mml:math></inline-formula> is a constant transformation, and the proposed S-box <italic>S</italic> a naturally ordered symbol set of elements <inline-formula id="ieqn-269"><mml:math id="mml-ieqn-269"><mml:mo stretchy="false">[</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula>. Then the first <inline-formula id="ieqn-270"><mml:math id="mml-ieqn-270"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula> bits of the component Boolean function <inline-formula id="ieqn-271"><mml:math id="mml-ieqn-271"><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> are zeros, and last <inline-formula id="ieqn-272"><mml:math id="mml-ieqn-272"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula> bits of the <inline-formula id="ieqn-273"><mml:math id="mml-ieqn-273"><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> are ones. Choose <inline-formula id="ieqn-274"><mml:math id="mml-ieqn-274"><mml:mi>u</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mtext>GF</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mrow><mml:mtext>n</mml:mtext></mml:mrow></mml:mrow></mml:msup><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> having zero at the places of <inline-formula id="ieqn-275"><mml:math id="mml-ieqn-275"><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula> bits except the first one. Then <inline-formula id="ieqn-276"><mml:math id="mml-ieqn-276"><mml:mi>u</mml:mi><mml:mo>.</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula> for <inline-formula id="ieqn-277"><mml:math id="mml-ieqn-277"><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mtext>GF</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mrow><mml:mtext>n</mml:mtext></mml:mrow></mml:mrow></mml:msup><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, <inline-formula id="ieqn-278"><mml:math id="mml-ieqn-278"><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula>, as first bit of the mentioned <inline-formula id="ieqn-279"><mml:math id="mml-ieqn-279"><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> is zero. Thus <inline-formula id="ieqn-280"><mml:math id="mml-ieqn-280"><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>&#x2295;</mml:mo><mml:mi>u</mml:mi><mml:mo>.</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>0</mml:mn><mml:mo>&#x2295;</mml:mo><mml:mn>0</mml:mn><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>, and hence <inline-formula id="ieqn-281"><mml:math id="mml-ieqn-281"><mml:mo stretchy="false">(</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>l</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2295;</mml:mo><mml:mi>u</mml:mi><mml:mo>.</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:mrow></mml:msup><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula>, for <inline-formula id="ieqn-282"><mml:math id="mml-ieqn-282"><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula>. Similarly, the first bit in the remaining <inline-formula id="ieqn-283"><mml:math id="mml-ieqn-283"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula> elements <inline-formula id="ieqn-284"><mml:math id="mml-ieqn-284"><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> is one. Then for the selected <inline-formula id="ieqn-285"><mml:math id="mml-ieqn-285"><mml:mi>u</mml:mi></mml:math></inline-formula>, we have <inline-formula id="ieqn-286"><mml:math id="mml-ieqn-286"><mml:mi>u</mml:mi><mml:mo>.</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula>, that is <inline-formula id="ieqn-287"><mml:math id="mml-ieqn-287"><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>&#x2295;</mml:mo><mml:mi>u</mml:mi><mml:mo>.</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2295;</mml:mo><mml:mn>1</mml:mn><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>, and <inline-formula id="ieqn-288"><mml:math id="mml-ieqn-288"><mml:mo stretchy="false">(</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>l</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2295;</mml:mo><mml:mi>u</mml:mi><mml:mo>.</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:mrow></mml:msup><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula>, for <inline-formula id="ieqn-289"><mml:math id="mml-ieqn-289"><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula>. Then,
<disp-formula id="ueqn-11"><mml:math id="mml-ueqn-11" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd /><mml:mtd><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:msub><mml:mrow><mml:mtext>S</mml:mtext></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>u</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>x</mml:mi><mml:mo>&#x2208;</mml:mo><mml:msubsup><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msubsup></mml:mrow></mml:munder><mml:mo stretchy="false">(</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2295;</mml:mo><mml:mi>u</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mi>x</mml:mi></mml:mrow></mml:msup><mml:mo>=</mml:mo><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>x</mml:mi><mml:mo>&#x2208;</mml:mo><mml:msubsup><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msubsup></mml:mrow></mml:munder><mml:mn>1</mml:mn><mml:mo>=</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>which is the maximum value for the Boolean function <inline-formula id="ieqn-290"><mml:math id="mml-ieqn-290"><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula>. So that, the NL(<inline-formula id="ieqn-291"><mml:math id="mml-ieqn-291"><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2212;</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mn>2</mml:mn></mml:mfrac><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>, which is the required result. <inline-formula id="ieqn-292"><mml:math id="mml-ieqn-292"><mml:mi>&#x25FB;</mml:mi></mml:math></inline-formula></p>
<p>To clearly understand the above Lemma 5, we insert an example of such a <inline-formula id="ieqn-293"><mml:math id="mml-ieqn-293"><mml:mn>2</mml:mn><mml:mo>&#x00D7;</mml:mo><mml:mn>2</mml:mn></mml:math></inline-formula> S-box over <inline-formula id="ieqn-294"><mml:math id="mml-ieqn-294"><mml:mrow><mml:mtext>GF</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mn>4</mml:mn></mml:msup><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> and explicitly mention the necessary details. For this choose the <inline-formula id="ieqn-295"><mml:math id="mml-ieqn-295"><mml:mi>c</mml:mi><mml:mo>=</mml:mo><mml:mi>e</mml:mi><mml:mo>&#x2260;</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula> and <inline-formula id="ieqn-296"><mml:math id="mml-ieqn-296"><mml:mi>d</mml:mi><mml:mo>=</mml:mo><mml:mi>f</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>, then <inline-formula id="ieqn-297"><mml:math id="mml-ieqn-297"><mml:mi>c</mml:mi><mml:mi>f</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>d</mml:mi><mml:mi>e</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula> and in such a case for any possible <inline-formula id="ieqn-298"><mml:math id="mml-ieqn-298"><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo>,</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>p,b</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>, we have <inline-formula id="ieqn-299"><mml:math id="mml-ieqn-299"><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mfrac><mml:mi>c</mml:mi><mml:mi>e</mml:mi></mml:mfrac><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula>, and hence the corresponding S-box is shown in <xref ref-type="table" rid="table-2">Table 2</xref>. For the said S-box <inline-formula id="ieqn-300"><mml:math id="mml-ieqn-300"><mml:mi>u</mml:mi><mml:mo>=</mml:mo><mml:mn>1000</mml:mn></mml:math></inline-formula>, <inline-formula id="ieqn-301"><mml:math id="mml-ieqn-301"><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>0000000011111111</mml:mn></mml:math></inline-formula> and <inline-formula id="ieqn-302"><mml:math id="mml-ieqn-302"><mml:mrow><mml:mtext>GF</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mn>0000</mml:mn><mml:mo>,</mml:mo><mml:mn>0001</mml:mn><mml:mo>,</mml:mo><mml:mn>0010</mml:mn><mml:mo>,</mml:mo><mml:mn>0011</mml:mn><mml:mo>,</mml:mo><mml:mn>0100</mml:mn><mml:mo>,</mml:mo><mml:mn>0101</mml:mn><mml:mo>,</mml:mo><mml:mn>0110</mml:mn><mml:mo>,</mml:mo><mml:mn>0111</mml:mn><mml:mo>,</mml:mo></mml:math></inline-formula><inline-formula id="ieqn-303"><mml:math id="mml-ieqn-303"><mml:mn>1000</mml:mn><mml:mo>,</mml:mo><mml:mn>1001</mml:mn><mml:mo>,</mml:mo><mml:mn>1010</mml:mn><mml:mo>,</mml:mo><mml:mn>1011</mml:mn><mml:mo>,</mml:mo><mml:mn>1100</mml:mn><mml:mo>,</mml:mo><mml:mn>1101</mml:mn><mml:mo>,</mml:mo><mml:mn>1110</mml:mn><mml:mo>,</mml:mo><mml:mn>1111</mml:mn><mml:mo fence="false" stretchy="false">}</mml:mo><mml:mo>.</mml:mo></mml:math></inline-formula> After some calculations, we have <inline-formula id="ieqn-304"><mml:math id="mml-ieqn-304"><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:msub><mml:mrow><mml:mtext>S</mml:mtext></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mn>1000</mml:mn><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mn>16</mml:mn></mml:math></inline-formula>, and hence NL<inline-formula id="ieqn-305"><mml:math id="mml-ieqn-305"><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mn>4</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2212;</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mn>2</mml:mn></mml:mfrac><mml:mo stretchy="false">(</mml:mo><mml:mn>16</mml:mn><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mn>0.</mml:mn></mml:math></inline-formula></p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>The <inline-formula id="ieqn-306"><mml:math id="mml-ieqn-306"><mml:mn>2</mml:mn><mml:mo>&#x00D7;</mml:mo><mml:mn>2</mml:mn></mml:math></inline-formula> S-box</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/> </colgroup>
<tbody>
<tr>
<td>0</td>
<td>4</td>
<td>8</td>
<td>12</td>
</tr>
<tr>
<td>1</td>
<td>5</td>
<td>9</td>
<td>13</td>
</tr>
<tr>
<td>2</td>
<td>6</td>
<td>10</td>
<td>14</td>
</tr>
<tr>
<td>3</td>
<td>7</td>
<td>11</td>
<td>15</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s4">
<label>4</label>
<title>The Analyses against Cryptographic Attacks</title>
<p>To assess the cryptographic properties of our scheme, we first test a sample of S-boxes generated by the proposed method using a well-known set of standard tests. In the following, each test is explained in detail, and the results for the sample S-boxes are presented along with the relevant test. Each cryptographic test assesses different aspects of S-box resistance against linear, differential, Boolean function, and algebraic attacks. Furthermore, a detailed comparison of the presented method is carried out with the recently developed schemes.</p>
<p><bold>Experimental framework:</bold> To complete the said tasks, we perform the experiments using MATLAB R<inline-formula id="ieqn-307"><mml:math id="mml-ieqn-307"><mml:mn>2016</mml:mn><mml:mi>a</mml:mi></mml:math></inline-formula> on a LENOVO machine with an AMD A<inline-formula id="ieqn-308"><mml:math id="mml-ieqn-308"><mml:mn>6</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mn>6310</mml:mn></mml:math></inline-formula> APU with AMD Radeon R<inline-formula id="ieqn-309"><mml:math id="mml-ieqn-309"><mml:mn>4</mml:mn></mml:math></inline-formula> Graphics, <inline-formula id="ieqn-310"><mml:math id="mml-ieqn-310"><mml:mn>1800</mml:mn></mml:math></inline-formula> MHz, 4 Core(s), 4 Logical Processor(s), and <inline-formula id="ieqn-311"><mml:math id="mml-ieqn-311"><mml:mn>6.00</mml:mn></mml:math></inline-formula> GB RAM installed. The proposed S-boxes <inline-formula id="ieqn-312"><mml:math id="mml-ieqn-312"><mml:mi>&#x03C3;</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-313"><mml:math id="mml-ieqn-313"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mi>&#x03C0;</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> as shown in <xref ref-type="table" rid="table-3">Tables 3</xref> and <xref ref-type="table" rid="table-4">4</xref> are generated for the parameters <inline-formula id="ieqn-314"><mml:math id="mml-ieqn-314"><mml:mi>p</mml:mi><mml:mo>=</mml:mo><mml:mn>107</mml:mn><mml:mo>,</mml:mo><mml:mi>b</mml:mi><mml:mo>=</mml:mo><mml:mn>4</mml:mn><mml:mo>,</mml:mo><mml:mi>c</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:mn>46</mml:mn><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>d</mml:mi><mml:mo>=</mml:mo><mml:mn>32</mml:mn><mml:mo>+</mml:mo><mml:mn>46</mml:mn><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>e</mml:mi><mml:mo>=</mml:mo><mml:mn>3</mml:mn><mml:mo>+</mml:mo><mml:mn>4</mml:mn><mml:mi>i</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-315"><mml:math id="mml-ieqn-315"><mml:mi>f</mml:mi><mml:mo>=</mml:mo><mml:mn>5</mml:mn><mml:mo>+</mml:mo><mml:mn>6</mml:mn><mml:mi>i</mml:mi></mml:math></inline-formula>. Further, the parameters chosen for 100 S-boxes are <inline-formula id="ieqn-316"><mml:math id="mml-ieqn-316"><mml:mi>p</mml:mi><mml:mo>=</mml:mo><mml:mn>47</mml:mn></mml:math></inline-formula>, <inline-formula id="ieqn-317"><mml:math id="mml-ieqn-317"><mml:mi>b</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula>, <inline-formula id="ieqn-318"><mml:math id="mml-ieqn-318"><mml:mi>c</mml:mi><mml:mo>=</mml:mo><mml:mo stretchy="false">[</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>46</mml:mn><mml:mo>+</mml:mo><mml:mn>46</mml:mn><mml:mi>i</mml:mi><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula> with the step size <inline-formula id="ieqn-319"><mml:math id="mml-ieqn-319"><mml:mn>2</mml:mn></mml:math></inline-formula>, <inline-formula id="ieqn-320"><mml:math id="mml-ieqn-320"><mml:mi>d</mml:mi><mml:mo>=</mml:mo><mml:mo stretchy="false">[</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>4</mml:mn><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula>, <inline-formula id="ieqn-321"><mml:math id="mml-ieqn-321"><mml:mi>e</mml:mi><mml:mo>=</mml:mo><mml:mn>17</mml:mn><mml:mo>+</mml:mo><mml:mn>37</mml:mn><mml:mi>i</mml:mi></mml:math></inline-formula>, and <inline-formula id="ieqn-322"><mml:math id="mml-ieqn-322"><mml:mi>f</mml:mi><mml:mo>=</mml:mo><mml:mn>19</mml:mn><mml:mo>+</mml:mo><mml:mn>17</mml:mn><mml:mi>i</mml:mi></mml:math></inline-formula>.</p>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>The <inline-formula id="ieqn-323"><mml:math id="mml-ieqn-323"><mml:mi>&#x03C3;</mml:mi></mml:math></inline-formula> designed by proposed algorithm</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/> </colgroup>
<tbody>
<tr>
<td>32</td>
<td>105</td>
<td>139</td>
<td>71</td>
<td>35</td>
<td>93</td>
<td>250</td>
<td>146</td>
<td>144</td>
<td>131</td>
<td>177</td>
<td>88</td>
<td>6</td>
<td>117</td>
<td>0</td>
<td>5</td>
</tr>
<tr>
<td>42</td>
<td>17</td>
<td>170</td>
<td>118</td>
<td>126</td>
<td>54</td>
<td>163</td>
<td>154</td>
<td>47</td>
<td>176</td>
<td>232</td>
<td>156</td>
<td>8</td>
<td>183</td>
<td>34</td>
<td>48</td>
</tr>
<tr>
<td>153</td>
<td>235</td>
<td>107</td>
<td>77</td>
<td>192</td>
<td>172</td>
<td>180</td>
<td>37</td>
<td>186</td>
<td>140</td>
<td>245</td>
<td>157</td>
<td>29</td>
<td>193</td>
<td>74</td>
<td>169</td>
</tr>
<tr>
<td>23</td>
<td>189</td>
<td>78</td>
<td>91</td>
<td>109</td>
<td>196</td>
<td>30</td>
<td>123</td>
<td>216</td>
<td>21</td>
<td>143</td>
<td>15</td>
<td>89</td>
<td>243</td>
<td>92</td>
<td>97</td>
</tr>
<tr>
<td>81</td>
<td>212</td>
<td>14</td>
<td>116</td>
<td>152</td>
<td>63</td>
<td>39</td>
<td>197</td>
<td>49</td>
<td>218</td>
<td>217</td>
<td>25</td>
<td>236</td>
<td>254</td>
<td>137</td>
<td>128</td>
</tr>
<tr>
<td>113</td>
<td>241</td>
<td>83</td>
<td>3</td>
<td>161</td>
<td>155</td>
<td>240</td>
<td>55</td>
<td>86</td>
<td>70</td>
<td>244</td>
<td>36</td>
<td>85</td>
<td>66</td>
<td>22</td>
<td>141</td>
</tr>
<tr>
<td>201</td>
<td>1</td>
<td>149</td>
<td>9</td>
<td>198</td>
<td>164</td>
<td>253</td>
<td>208</td>
<td>134</td>
<td>150</td>
<td>51</td>
<td>52</td>
<td>251</td>
<td>159</td>
<td>167</td>
<td>191</td>
</tr>
<tr>
<td>204</td>
<td>94</td>
<td>10</td>
<td>138</td>
<td>230</td>
<td>239</td>
<td>119</td>
<td>130</td>
<td>246</td>
<td>209</td>
<td>90</td>
<td>64</td>
<td>72</td>
<td>171</td>
<td>168</td>
<td>219</td>
</tr>
<tr>
<td>199</td>
<td>132</td>
<td>185</td>
<td>174</td>
<td>84</td>
<td>221</td>
<td>222</td>
<td>202</td>
<td>28</td>
<td>194</td>
<td>127</td>
<td>205</td>
<td>98</td>
<td>58</td>
<td>247</td>
<td>242</td>
</tr>
<tr>
<td>206</td>
<td>136</td>
<td>226</td>
<td>106</td>
<td>135</td>
<td>238</td>
<td>57</td>
<td>46</td>
<td>115</td>
<td>110</td>
<td>173</td>
<td>100</td>
<td>160</td>
<td>158</td>
<td>2</td>
<td>200</td>
</tr>
<tr>
<td>4</td>
<td>225</td>
<td>249</td>
<td>79</td>
<td>65</td>
<td>95</td>
<td>53</td>
<td>214</td>
<td>12</td>
<td>133</td>
<td>229</td>
<td>111</td>
<td>195</td>
<td>142</td>
<td>61</td>
<td>26</td>
</tr>
<tr>
<td>234</td>
<td>233</td>
<td>104</td>
<td>96</td>
<td>175</td>
<td>129</td>
<td>162</td>
<td>108</td>
<td>112</td>
<td>101</td>
<td>27</td>
<td>125</td>
<td>56</td>
<td>151</td>
<td>237</td>
<td>178</td>
</tr>
<tr>
<td>248</td>
<td>7</td>
<td>122</td>
<td>188</td>
<td>252</td>
<td>255</td>
<td>148</td>
<td>124</td>
<td>80</td>
<td>184</td>
<td>43</td>
<td>207</td>
<td>210</td>
<td>31</td>
<td>18</td>
<td>73</td>
</tr>
<tr>
<td>11</td>
<td>41</td>
<td>220</td>
<td>67</td>
<td>82</td>
<td>40</td>
<td>166</td>
<td>24</td>
<td>102</td>
<td>182</td>
<td>187</td>
<td>179</td>
<td>215</td>
<td>38</td>
<td>45</td>
<td>147</td>
</tr>
<tr>
<td>20</td>
<td>76</td>
<td>69</td>
<td>16</td>
<td>13</td>
<td>50</td>
<td>68</td>
<td>103</td>
<td>190</td>
<td>203</td>
<td>231</td>
<td>19</td>
<td>211</td>
<td>145</td>
<td>165</td>
<td>33</td>
</tr>
<tr>
<td>99</td>
<td>87</td>
<td>60</td>
<td>223</td>
<td>62</td>
<td>227</td>
<td>121</td>
<td>114</td>
<td>120</td>
<td>59</td>
<td>44</td>
<td>213</td>
<td>224</td>
<td>181</td>
<td>228</td>
<td>75</td>
</tr>
</tbody>
</table>
</table-wrap><table-wrap id="table-4">
<label>Table 4</label>
<caption>
<title>The <inline-formula id="ieqn-324"><mml:math id="mml-ieqn-324"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mi>&#x03C0;</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> designed by proposed algorithm</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/> </colgroup>
<tbody>
<tr>
<td>205</td>
<td>243</td>
<td>125</td>
<td>22</td>
<td>190</td>
<td>66</td>
<td>64</td>
<td>80</td>
<td>96</td>
<td>48</td>
<td>229</td>
<td>178</td>
<td>201</td>
<td>162</td>
<td>136</td>
<td>107</td>
</tr>
<tr>
<td>25</td>
<td>224</td>
<td>198</td>
<td>93</td>
<td>147</td>
<td>4</td>
<td>239</td>
<td>240</td>
<td>217</td>
<td>85</td>
<td>195</td>
<td>5</td>
<td>104</td>
<td>124</td>
<td>109</td>
<td>255</td>
</tr>
<tr>
<td>53</td>
<td>94</td>
<td>29</td>
<td>166</td>
<td>188</td>
<td>40</td>
<td>0</td>
<td>197</td>
<td>227</td>
<td>17</td>
<td>128</td>
<td>143</td>
<td>236</td>
<td>37</td>
<td>11</td>
<td>228</td>
</tr>
<tr>
<td>158</td>
<td>250</td>
<td>130</td>
<td>200</td>
<td>38</td>
<td>86</td>
<td>95</td>
<td>34</td>
<td>242</td>
<td>28</td>
<td>71</td>
<td>99</td>
<td>152</td>
<td>76</td>
<td>56</td>
<td>127</td>
</tr>
<tr>
<td>246</td>
<td>1</td>
<td>97</td>
<td>20</td>
<td>209</td>
<td>24</td>
<td>52</td>
<td>8</td>
<td>15</td>
<td>249</td>
<td>171</td>
<td>173</td>
<td>31</td>
<td>235</td>
<td>92</td>
<td>134</td>
</tr>
<tr>
<td>116</td>
<td>55</td>
<td>91</td>
<td>23</td>
<td>88</td>
<td>244</td>
<td>78</td>
<td>191</td>
<td>192</td>
<td>32</td>
<td>123</td>
<td>177</td>
<td>170</td>
<td>252</td>
<td>159</td>
<td>105</td>
</tr>
<tr>
<td>211</td>
<td>135</td>
<td>182</td>
<td>207</td>
<td>87</td>
<td>165</td>
<td>129</td>
<td>42</td>
<td>144</td>
<td>154</td>
<td>176</td>
<td>175</td>
<td>16</td>
<td>13</td>
<td>156</td>
<td>145</td>
</tr>
<tr>
<td>62</td>
<td>161</td>
<td>150</td>
<td>10</td>
<td>33</td>
<td>35</td>
<td>181</td>
<td>214</td>
<td>251</td>
<td>133</td>
<td>237</td>
<td>233</td>
<td>68</td>
<td>9</td>
<td>208</td>
<td>2</td>
</tr>
<tr>
<td>112</td>
<td>193</td>
<td>148</td>
<td>45</td>
<td>185</td>
<td>58</td>
<td>102</td>
<td>221</td>
<td>203</td>
<td>27</td>
<td>18</td>
<td>120</td>
<td>126</td>
<td>74</td>
<td>202</td>
<td>83</td>
</tr>
<tr>
<td>39</td>
<td>36</td>
<td>98</td>
<td>238</td>
<td>3</td>
<td>79</td>
<td>153</td>
<td>139</td>
<td>41</td>
<td>119</td>
<td>222</td>
<td>54</td>
<td>103</td>
<td>142</td>
<td>184</td>
<td>245</td>
</tr>
<tr>
<td>151</td>
<td>241</td>
<td>230</td>
<td>70</td>
<td>61</td>
<td>122</td>
<td>206</td>
<td>51</td>
<td>49</td>
<td>60</td>
<td>63</td>
<td>69</td>
<td>157</td>
<td>213</td>
<td>234</td>
<td>21</td>
</tr>
<tr>
<td>186</td>
<td>194</td>
<td>108</td>
<td>216</td>
<td>75</td>
<td>163</td>
<td>254</td>
<td>137</td>
<td>132</td>
<td>155</td>
<td>141</td>
<td>26</td>
<td>100</td>
<td>6</td>
<td>183</td>
<td>121</td>
</tr>
<tr>
<td>111</td>
<td>189</td>
<td>12</td>
<td>72</td>
<td>218</td>
<td>210</td>
<td>187</td>
<td>114</td>
<td>204</td>
<td>73</td>
<td>149</td>
<td>253</td>
<td>81</td>
<td>167</td>
<td>215</td>
<td>101</td>
</tr>
<tr>
<td>89</td>
<td>131</td>
<td>169</td>
<td>43</td>
<td>219</td>
<td>118</td>
<td>172</td>
<td>84</td>
<td>110</td>
<td>146</td>
<td>160</td>
<td>19</td>
<td>138</td>
<td>212</td>
<td>168</td>
<td>67</td>
</tr>
<tr>
<td>59</td>
<td>231</td>
<td>226</td>
<td>57</td>
<td>174</td>
<td>223</td>
<td>179</td>
<td>50</td>
<td>247</td>
<td>46</td>
<td>164</td>
<td>7</td>
<td>180</td>
<td>196</td>
<td>140</td>
<td>82</td>
</tr>
<tr>
<td>47</td>
<td>14</td>
<td>115</td>
<td>113</td>
<td>220</td>
<td>225</td>
<td>117</td>
<td>199</td>
<td>30</td>
<td>106</td>
<td>248</td>
<td>77</td>
<td>65</td>
<td>90</td>
<td>44</td>
<td>232</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="s4_1">
<label>4.1</label>
<title>Tests and Results</title>
<sec id="s4_1_1">
<label>4.1.1</label>
<title>Nonlinearity</title>
<p>In [<xref ref-type="bibr" rid="ref-50">50</xref>], Willi and Othmar first proposed the idea of nonlinearity (NL) for an S-box <inline-formula id="ieqn-325"><mml:math id="mml-ieqn-325"><mml:mrow><mml:mtext>S</mml:mtext></mml:mrow></mml:math></inline-formula>. The NL evaluates the linear relation between the inputs and outputs of an S-box. Mathematically, NL(<inline-formula id="ieqn-326"><mml:math id="mml-ieqn-326"><mml:mrow><mml:mtext>S</mml:mtext></mml:mrow></mml:math></inline-formula>) of an S-box can be computed by:</p>
<p><disp-formula id="ueqn-12"><mml:math id="mml-ueqn-12" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd /><mml:mtd><mml:mrow><mml:mtext>NL</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext>S</mml:mtext></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mrow><mml:mtext>min</mml:mtext></mml:mrow><mml:mo fence="false" stretchy="false">{</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2212;</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mn>2</mml:mn></mml:mfrac><mml:msub><mml:mrow><mml:mrow><mml:mtext>max</mml:mtext></mml:mrow></mml:mrow><mml:mrow><mml:mi>u</mml:mi><mml:mo>&#x2260;</mml:mo><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>x</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mtext>GF</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:munder><mml:mo stretchy="false">(</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mtext>S</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2295;</mml:mo><mml:mi>u</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mi>x</mml:mi></mml:mrow></mml:msup><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mo fence="false" stretchy="false">}</mml:mo><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where, <inline-formula id="ieqn-327"><mml:math id="mml-ieqn-327"><mml:mi>u</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mtext>GF</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula>, and <inline-formula id="ieqn-328"><mml:math id="mml-ieqn-328"><mml:msub><mml:mrow><mml:mtext>S</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> represents the coordinate Boolean function of <inline-formula id="ieqn-329"><mml:math id="mml-ieqn-329"><mml:mrow><mml:mtext>S</mml:mtext></mml:mrow></mml:math></inline-formula>, while &#x201C;<inline-formula id="ieqn-330"><mml:math id="mml-ieqn-330"><mml:mo>&#x22C5;</mml:mo></mml:math></inline-formula>&#x201D; and &#x201C;<inline-formula id="ieqn-331"><mml:math id="mml-ieqn-331"><mml:mo>&#x2295;</mml:mo></mml:math></inline-formula>&#x201D; denote the dot product and addition over <inline-formula id="ieqn-332"><mml:math id="mml-ieqn-332"><mml:mrow><mml:mtext>G</mml:mtext></mml:mrow><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mn>2</mml:mn><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula>, respectively. The higher value of the NL stands for high resistance to linear attacks. The optimal value of NL for an <inline-formula id="ieqn-333"><mml:math id="mml-ieqn-333"><mml:mi>n</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mi>n</mml:mi></mml:math></inline-formula> S-box is <inline-formula id="ieqn-334"><mml:math id="mml-ieqn-334"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2212;</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>n</mml:mi><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mn>2</mml:mn><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula>. The NL value of the S-boxes outlined in <xref ref-type="table" rid="table-3">Tables 3</xref> and <xref ref-type="table" rid="table-4">4</xref> are 106 and 112, respectively. These NL results are high enough to thwart the attacks.</p>

</sec>
<sec id="s4_1_2">
<label>4.1.2</label>
<title>Linear Approximation Probability</title>
<p>Matsui presented the idea of linear approximation probability (LAP) in [<xref ref-type="bibr" rid="ref-51">51</xref>] for evaluating the strength of the S-box against linear attacks. To analyze the security of <inline-formula id="ieqn-335"><mml:math id="mml-ieqn-335"><mml:mrow><mml:mtext>S</mml:mtext></mml:mrow></mml:math></inline-formula>, LAP is used to quantify the linear characteristics and correlation between the input and output bits. The following expression is used to compute the LAP of an S-box:
<disp-formula id="ueqn-13"><mml:math id="mml-ueqn-13" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd /><mml:mtd><mml:mi>LAP</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mi>S</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:mfrac><mml:mrow><mml:mo>(</mml:mo><mml:munder><mml:mo movablelimits="true" form="prefix">max</mml:mo><mml:mrow><mml:mi>&#x03C1;</mml:mi><mml:mo>,</mml:mo><mml:mi>&#x03C3;</mml:mi></mml:mrow></mml:munder><mml:mrow><mml:mo>|</mml:mo><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mrow><mml:mo>{</mml:mo><mml:mi>x</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mtext>GF</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mo>:</mml:mo><mml:mi>&#x03C1;</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mi>x</mml:mi><mml:mo>=</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mi>S</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>}</mml:mo></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo>|</mml:mo></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where, <inline-formula id="ieqn-336"><mml:math id="mml-ieqn-336"><mml:mi>&#x03C1;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mtext>GF</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula>, <inline-formula id="ieqn-337"><mml:math id="mml-ieqn-337"><mml:mi>&#x03C3;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mtext>GF</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2216;</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mn>0</mml:mn><mml:mo>}</mml:mo></mml:mrow></mml:math></inline-formula>, and &#x201C;<inline-formula id="ieqn-338"><mml:math id="mml-ieqn-338"><mml:mo>&#x22C5;</mml:mo></mml:math></inline-formula>&#x201D; denotes the dot product over <inline-formula id="ieqn-339"><mml:math id="mml-ieqn-339"><mml:mrow><mml:mtext>GF</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mn>2</mml:mn><mml:mo>)</mml:mo></mml:mrow><mml:mo>.</mml:mo></mml:math></inline-formula> The lower value of the LAP indicates high resistance against linear attacks. The LAP results of the S-boxes demonstrated in <xref ref-type="table" rid="table-3">Tables 3</xref> and <xref ref-type="table" rid="table-4">4</xref> are <inline-formula id="ieqn-340"><mml:math id="mml-ieqn-340"><mml:mn>0.0312</mml:mn></mml:math></inline-formula> and <inline-formula id="ieqn-341"><mml:math id="mml-ieqn-341"><mml:mn>0.0078</mml:mn></mml:math></inline-formula>, respectively, which are very low.</p>

</sec>
<sec id="s4_1_3">
<label>4.1.3</label>
<title>Differential Approximation Probability</title>
<p>In [<xref ref-type="bibr" rid="ref-52">52</xref>], Biham and Shamir first provided the differential approximation probability (DAP) test. The DAP is a well-known test used to determine the security of an S-box against differential attacks. The DAP measures the probability of the precise difference between input and output bits. That is, it quantifies the probability of a specific differential characteristic occurring within the S-box <inline-formula id="ieqn-342"><mml:math id="mml-ieqn-342"><mml:mrow><mml:mtext>S</mml:mtext></mml:mrow></mml:math></inline-formula>. The DAP can be calculated by the following equation:
<disp-formula id="ueqn-14"><mml:math id="mml-ueqn-14" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd /><mml:mtd><mml:mrow><mml:mtext>DAP</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>S</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup></mml:mfrac><mml:mrow><mml:mo>(</mml:mo><mml:munder><mml:mo movablelimits="true" form="prefix">max</mml:mo><mml:mrow><mml:mi mathvariant="normal">&#x0394;</mml:mi><mml:msub><mml:mi>s</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mo>,</mml:mo><mml:mtext>&#x00A0;</mml:mtext><mml:mi mathvariant="normal">&#x0394;</mml:mi><mml:msub><mml:mi>s</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow></mml:munder><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mi>x</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mtext>GF</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mo>:</mml:mo><mml:mi>S</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2295;</mml:mo><mml:mi>S</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo>&#x2295;</mml:mo><mml:mi mathvariant="normal">&#x0394;</mml:mi><mml:msub><mml:mi>s</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mi mathvariant="normal">&#x0394;</mml:mi><mml:msub><mml:mi>s</mml:mi><mml:mn>2</mml:mn></mml:msub><mml:mo fence="false" stretchy="false">}</mml:mo><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>here, <inline-formula id="ieqn-343"><mml:math id="mml-ieqn-343"><mml:mi mathvariant="normal">&#x0394;</mml:mi><mml:msub><mml:mi>s</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-344"><mml:math id="mml-ieqn-344"><mml:mi mathvariant="normal">&#x0394;</mml:mi><mml:msub><mml:mi>s</mml:mi><mml:mrow><mml:mrow><mml:mtext>2</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> belong to <inline-formula id="ieqn-345"><mml:math id="mml-ieqn-345"><mml:mrow><mml:mtext>GF</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula>, and &#x201C;<inline-formula id="ieqn-346"><mml:math id="mml-ieqn-346"><mml:mo>&#x2295;</mml:mo></mml:math></inline-formula>&#x201D; represents the bit-wise addition over <inline-formula id="ieqn-347"><mml:math id="mml-ieqn-347"><mml:mrow><mml:mtext>GF</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mn>2</mml:mn><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula>. For the low value of DAP, the S-box is considered more strong against differential attacks. The DAP of the S-boxes exhibited in <xref ref-type="table" rid="table-3">Tables 3</xref> and <xref ref-type="table" rid="table-4">4</xref> are 0.0390 and 0.0156, respectively, which are very low.</p>

</sec>
<sec id="s4_1_4">
<label>4.1.4</label>
<title>Strict Avalanche Criterion</title>
<p>The concept of strict avalanche criterion (SAC) was first proposed by Webster and Tavares in [<xref ref-type="bibr" rid="ref-53">53</xref>]. The SAC is a useful tool to determine the security of <inline-formula id="ieqn-348"><mml:math id="mml-ieqn-348"><mml:mrow><mml:mtext>S</mml:mtext></mml:mrow></mml:math></inline-formula> against Boolean function attacks by quantifying the substantial change in an S-box output bit when a single input bit is varied. For the Boolean functions <inline-formula id="ieqn-349"><mml:math id="mml-ieqn-349"><mml:msub><mml:mrow><mml:mtext>S</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>, and <inline-formula id="ieqn-350"><mml:math id="mml-ieqn-350"><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mtext>GF</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, the SAC is computed using an <inline-formula id="ieqn-351"><mml:math id="mml-ieqn-351"><mml:mi>n</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mi>n</mml:mi></mml:math></inline-formula> dependence matrix <inline-formula id="ieqn-352"><mml:math id="mml-ieqn-352"><mml:mrow><mml:mtext>N</mml:mtext></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mrow><mml:mtext>ij</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>]</mml:mo></mml:mrow></mml:math></inline-formula>, whose entry <inline-formula id="ieqn-353"><mml:math id="mml-ieqn-353"><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mrow><mml:mtext>ij</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> is calculated as follows:
<disp-formula id="ueqn-15"><mml:math id="mml-ueqn-15" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd /><mml:mtd><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mrow><mml:mtext>ij</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup></mml:mfrac><mml:mrow><mml:mo>(</mml:mo><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>x</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mtext>GF</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:munder><mml:mi>w</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mrow><mml:mtext>S</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>x</mml:mi><mml:mo>&#x2295;</mml:mo><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mrow><mml:mtext>j</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2295;</mml:mo><mml:msub><mml:mrow><mml:mtext>S</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>)</mml:mo></mml:mrow><mml:mtext>&#xA0;</mml:mtext><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-354"><mml:math id="mml-ieqn-354"><mml:mi>w</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi mathvariant="normal">r</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, for <inline-formula id="ieqn-355"><mml:math id="mml-ieqn-355"><mml:mrow><mml:mtext>r</mml:mtext></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mtext>GF</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, denotes the number of non-zero bits in the vector r. The S-box S is said to satisfy the SAC and has high cryptographic strength against Boolean function attacks if every off-diagonal entry of N is close to the optimal value of 0.50. The SAC values of the S-boxes in <xref ref-type="table" rid="table-3">Tables 3</xref> and <xref ref-type="table" rid="table-4">4</xref> are 0.4218, 0.5937 and, 0.4531, 0.5625, respectively. These values are sufficiently close to the optimal value <inline-formula id="ieqn-356"><mml:math id="mml-ieqn-356"><mml:mn>0.50</mml:mn></mml:math></inline-formula>, exhibiting strong avalanche properties.</p>

</sec>
<sec id="s4_1_5">
<label>4.1.5</label>
<title>Bit Independence Criterion</title>
<p>The idea of the Bit independence criterion (BIC) was given by Webster and Tavares in [<xref ref-type="bibr" rid="ref-53">53</xref>]. The BIC is also used to determine the security of S against Boolean function attacks by measuring the variation in a pair of S-box output bits when a single input bit is changed. Let D be a BIC matrix and defined as <inline-formula id="ieqn-357"><mml:math id="mml-ieqn-357"><mml:mrow><mml:mtext>D</mml:mtext></mml:mrow><mml:mo>=</mml:mo><mml:mo stretchy="false">[</mml:mo><mml:msub><mml:mi>z</mml:mi><mml:mrow><mml:mrow><mml:mtext>qr</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula>, where <inline-formula id="ieqn-358"><mml:math id="mml-ieqn-358"><mml:msub><mml:mi>z</mml:mi><mml:mrow><mml:mrow><mml:mtext>qr</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> is computed by:
<disp-formula id="ueqn-168"><mml:math id="mml-ueqn-168" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd /><mml:mtd><mml:msub><mml:mi>z</mml:mi><mml:mrow><mml:mrow><mml:mtext>qr</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup></mml:mfrac><mml:mrow><mml:mo>(</mml:mo><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mfrac linethickness="0"><mml:mrow><mml:mi>x</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mtext>GF</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2264;</mml:mo><mml:mrow><mml:mtext>q</mml:mtext></mml:mrow><mml:mo>&#x2260;</mml:mo><mml:mi>&#x2113;</mml:mi><mml:mo>&#x2264;</mml:mo><mml:mrow><mml:mtext>n</mml:mtext></mml:mrow></mml:mrow></mml:mfrac></mml:mrow></mml:munder><mml:mi>w</mml:mi><mml:mstyle scriptlevel="0"><mml:mrow><mml:mo maxsize="1.2em" minsize="1.2em">(</mml:mo></mml:mrow></mml:mstyle><mml:msub><mml:mrow><mml:mtext>S</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>q</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo>&#x2295;</mml:mo><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mrow><mml:mtext>r</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2295;</mml:mo><mml:msub><mml:mrow><mml:mtext>S</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>q</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2295;</mml:mo><mml:msub><mml:mrow><mml:mtext>S</mml:mtext></mml:mrow><mml:mrow><mml:mi>&#x2113;</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo>&#x2295;</mml:mo><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mrow><mml:mtext>r</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2295;</mml:mo><mml:msub><mml:mrow><mml:mtext>S</mml:mtext></mml:mrow><mml:mrow><mml:mi>&#x2113;</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mstyle scriptlevel="0"><mml:mrow><mml:mo maxsize="1.2em" minsize="1.2em">)</mml:mo></mml:mrow></mml:mstyle><mml:mo>)</mml:mo></mml:mrow><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>The S-box is considered to fulfill the BIC criteria and provide good cryptographic strength against Boolean function attacks if every off-diagonal entry in the matrix D is close to the optimal value of 0.50. The BIC values of the <xref ref-type="table" rid="table-3">Tables 3</xref> and <xref ref-type="table" rid="table-4">4</xref> are 0.4707, 0.5293, 0.4883, and 0.5234, respectively, which are extremely close to the optimal value 0.50.</p>

</sec>
<sec id="s4_1_6">
<label>4.1.6</label>
<title>Algebraic Complexity</title>
<p>Sakall et al. [<xref ref-type="bibr" rid="ref-54">54</xref>] proposed the concept of algebraic complexity (AC) to test the resistance of an S-box against an algebraic attack. The AC represents the number of non-zero terms in the linear polynomial representation of an S-box. As <inline-formula id="ieqn-359"><mml:math id="mml-ieqn-359"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula> is the optimal value of the AC for any <inline-formula id="ieqn-360"><mml:math id="mml-ieqn-360"><mml:mi>n</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mi>n</mml:mi></mml:math></inline-formula> S-box. The AC of the S-boxes in <xref ref-type="table" rid="table-3">Tables 3</xref> and <xref ref-type="table" rid="table-4">4</xref> attains the optimal value <inline-formula id="ieqn-361"><mml:math id="mml-ieqn-361"><mml:mn>255</mml:mn></mml:math></inline-formula>.</p>

<p>It follows from the above-attained values of the proposed S-boxes that the presented algorithm has strong cryptographic strength. However, to rigorously analyze the new algorithm, a comparison with recently developed schemes is conducted below.</p>
</sec>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>The Comparison Based Analysis</title>
<p>This section provides a rigorous analysis of our algorithm and checks its cryptographic strength against the well-known attacks. The <xref ref-type="table" rid="table-5">Table 5</xref> presents a detailed comparison of our proposed S-boxes and S-boxes generated by the state-of-the-art techniques based on various mathematical structures. Furthermore, we prepared the <xref ref-type="table" rid="table-6">Tables 6</xref> and <xref ref-type="table" rid="table-7">7</xref> based on the data available in <xref ref-type="table" rid="table-5">Table 5</xref>. The &#x2018;Remark&#x2019; column summarizes the resistance of the reference techniques against the respective attacks, contrasted with that of the proposed scheme.</p>
<table-wrap id="table-5">
<label>Table 5</label>
<caption>
<title>Comparison of the newly generated S-box algorithm with some of existing algorithms</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/> </colgroup>
<thead>
<tr>
<th align="center" rowspan="2">S-boxes</th>
<th align="center" rowspan="2">Year</th>
<th align="center" rowspan="2">NL</th>
<th align="center" rowspan="2">LAP</th>
<th align="center" rowspan="2">DAP</th>
<th align="center" colspan="2">SAC</th>
<th align="center" colspan="3">BIC</th>
<th align="center" rowspan="2">AC</th>
</tr>
<tr>
<th>min</th>
<th>max</th>
<th>min</th>
<th>max</th>
<th>NL</th>
</tr>
</thead>
<tbody>
<tr>
<td><inline-formula id="ieqn-362"><mml:math id="mml-ieqn-362"><mml:mi>&#x03C3;</mml:mi></mml:math></inline-formula></td>
<td>2025</td>
<td>106</td>
<td>0.0312</td>
<td>0.0390</td>
<td>0.4218</td>
<td>0.5937</td>
<td>0.4707</td>
<td>0.5293</td>
<td>98</td>
<td>255</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-37">37</xref>]</td>
<td>2018</td>
<td>100</td>
<td>0.0547</td>
<td>0.0391</td>
<td>0.3906</td>
<td>0.6250</td>
<td>0.4707</td>
<td>0.5312</td>
<td>100</td>
<td>255</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-39">39</xref>]</td>
<td>2023</td>
<td>106</td>
<td>0.0078</td>
<td>0.0468</td>
<td>0.3906</td>
<td>0.6093</td>
<td>0.4746</td>
<td>0.5214</td>
<td>96</td>
<td>255</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-41">41</xref>]</td>
<td>2022</td>
<td>106</td>
<td>0.0156</td>
<td>0.0469</td>
<td>0.4063</td>
<td>0.5938</td>
<td>0.4688</td>
<td>0.5293</td>
<td>98</td>
<td>254</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-38">38</xref>]</td>
<td>2019</td>
<td>106</td>
<td>0.1484</td>
<td>0.0391</td>
<td>0.4375</td>
<td>0.5938</td>
<td>0.4648</td>
<td>0.5449</td>
<td>100</td>
<td>255</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-44">44</xref>]</td>
<td>2018</td>
<td>106</td>
<td>0.1328</td>
<td>0.0391</td>
<td>0.3906</td>
<td>0.5781</td>
<td>0.4648</td>
<td>0.5352</td>
<td>98</td>
<td>255</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-40">40</xref>]</td>
<td>2021</td>
<td>106</td>
<td>0.0469</td>
<td>0.0391</td>
<td>0.4063</td>
<td>0.5781</td>
<td>0.4805</td>
<td>0.5273</td>
<td>96</td>
<td>254</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-9">9</xref>]</td>
<td>2023</td>
<td>92</td>
<td>0.1406</td>
<td>0.0469</td>
<td>0.3906</td>
<td>0.5781</td>
<td>0.4629</td>
<td>0.5215</td>
<td>90</td>
<td>254</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-10">10</xref>]</td>
<td>2023</td>
<td>92</td>
<td>0.0313</td>
<td>0.0391</td>
<td>0.3906</td>
<td>0.6250</td>
<td>0.4707</td>
<td>0.5352</td>
<td>96</td>
<td>254</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-11">11</xref>]</td>
<td>2022</td>
<td>104</td>
<td>0.0624</td>
<td>0.0469</td>
<td>0.4219</td>
<td>0.5781</td>
<td>0.4668</td>
<td>0.5352</td>
<td>96</td>
<td>254</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-13">13</xref>]</td>
<td>2023</td>
<td>100</td>
<td>0.0156</td>
<td>0.0469</td>
<td>0.4219</td>
<td>0.5781</td>
<td>0.4668</td>
<td>0.5313</td>
<td>98</td>
<td>255</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-2">2</xref>]</td>
<td>2023</td>
<td>106</td>
<td>0.0468</td>
<td>0.0468</td>
<td>0.4062</td>
<td>0.5781</td>
<td>0.4726</td>
<td>0.5410</td>
<td>96</td>
<td>255</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-3">3</xref>]</td>
<td>2022</td>
<td>102</td>
<td>0.0625</td>
<td>0.0390</td>
<td>0.4218</td>
<td>0.5781</td>
<td>0.4804</td>
<td>0.5527</td>
<td>98</td>
<td>255</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-55">55</xref>]</td>
<td>2017</td>
<td>101</td>
<td>0.0664</td>
<td>0.0390</td>
<td>0.4218</td>
<td>0.5781</td>
<td>0.4667</td>
<td>0.5195</td>
<td>96</td>
<td>254</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-4">4</xref>]</td>
<td>2021</td>
<td>110</td>
<td>0.0234</td>
<td>0.0390</td>
<td>0.4062</td>
<td>0.5937</td>
<td>0.4746</td>
<td>0.5429</td>
<td>98</td>
<td>252</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-5">5</xref>]</td>
<td>2021</td>
<td>98</td>
<td>0.0312</td>
<td>0.0548</td>
<td>0.4062</td>
<td>0.5937</td>
<td>0.4628</td>
<td>0.5351</td>
<td>98</td>
<td>255</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-56">56</xref>]</td>
<td>2019</td>
<td>104</td>
<td>0.0547</td>
<td>0.0391</td>
<td>0.4018</td>
<td>0.5781</td>
<td>0.4667</td>
<td>0.5332</td>
<td>96</td>
<td>254</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-12">12</xref>]</td>
<td>2018</td>
<td>100</td>
<td>0.0625</td>
<td>0.1250</td>
<td>0.4043</td>
<td>0.5718</td>
<td>0.4746</td>
<td>0.5352</td>
<td>102</td>
<td>255</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-21">21</xref>]</td>
<td>2023</td>
<td>98</td>
<td>0.0313</td>
<td>0.0469</td>
<td>0.3906</td>
<td>0.6094</td>
<td>0.4746</td>
<td>0.5391</td>
<td>100</td>
<td>255</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-29">29</xref>]</td>
<td>2023</td>
<td>100</td>
<td>0.0078</td>
<td>0.0469</td>
<td>0.3906</td>
<td>0.6250</td>
<td>0.4707</td>
<td>0.5313</td>
<td>98</td>
<td>254</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-22">22</xref>]</td>
<td>2022</td>
<td>100</td>
<td>0.0625</td>
<td>0.0391</td>
<td>0.3594</td>
<td>0.6094</td>
<td>0.4590</td>
<td>0.5371</td>
<td>96</td>
<td>254</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-57">57</xref>]</td>
<td>2022</td>
<td>99</td>
<td>0.0429</td>
<td>0.0398</td>
<td>0.3984</td>
<td>0.6171</td>
<td>0.4667</td>
<td>0.5214</td>
<td>99</td>
<td>254</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-58">58</xref>]</td>
<td>2022</td>
<td>100</td>
<td>0.0312</td>
<td>0.0390</td>
<td>0.3906</td>
<td>0.5937</td>
<td>0.4648</td>
<td>0.5273</td>
<td>98</td>
<td>255</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-20">20</xref>]</td>
<td>2021</td>
<td>100</td>
<td>0.1406</td>
<td>0.0391</td>
<td>0.4219</td>
<td>0.6250</td>
<td>0.4648</td>
<td>0.5332</td>
<td>98</td>
<td>254</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-59">59</xref>]</td>
<td>2015</td>
<td>74</td>
<td>0.0234</td>
<td>0.0546</td>
<td>0.1093</td>
<td>0.6875</td>
<td>0.4023</td>
<td>0.5507</td>
<td>92</td>
<td>253</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-60">60</xref>]</td>
<td>2024</td>
<td>96</td>
<td>0.0313</td>
<td>0.0391</td>
<td>0.4217</td>
<td>0.6250</td>
<td>0.4727</td>
<td>0.5410</td>
<td>96</td>
<td>253</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-19">19</xref>]</td>
<td>2024</td>
<td>106</td>
<td>0.0391</td>
<td>0.0469</td>
<td>0.3906</td>
<td>0.6094</td>
<td>0.4688</td>
<td>0.5410</td>
<td>100</td>
<td>253</td>
</tr>
<tr>
<td><inline-formula id="ieqn-363"><mml:math id="mml-ieqn-363"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mi>&#x03C0;</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>2025</td>
<td>112</td>
<td>0.0078</td>
<td>0.0156</td>
<td>0.4531</td>
<td>0.5625</td>
<td>0.4883</td>
<td>0.5234</td>
<td>112</td>
<td>255</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-14">14</xref>]</td>
<td>2022</td>
<td>102</td>
<td>0.0313</td>
<td>0.0391</td>
<td>0.4075</td>
<td>0.5625</td>
<td>0.4706</td>
<td>0.5332</td>
<td>96</td>
<td>254</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-61">61</xref>]</td>
<td>2024</td>
<td>108</td>
<td>0.0703</td>
<td>0.0390</td>
<td>0.4062</td>
<td>0.5781</td>
<td>0.4707</td>
<td>0.5312</td>
<td>98</td>
<td>255</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-62">62</xref>]</td>
<td>2024</td>
<td>108</td>
<td>0.0703</td>
<td>0.0234</td>
<td>0.4219</td>
<td>0.5781</td>
<td>0.4746</td>
<td>0.5273</td>
<td>108</td>
<td>253</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-7">7</xref>]</td>
<td>2024</td>
<td>101</td>
<td>0.0703</td>
<td>0.0391</td>
<td>0.4062</td>
<td>0.5859</td>
<td>0.4766</td>
<td>0.5332</td>
<td>97</td>
<td>255</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-24">24</xref>]</td>
<td>2020</td>
<td>104</td>
<td>0.0390</td>
<td>0.0390</td>
<td>0.3593</td>
<td>0.6093</td>
<td>0.4570</td>
<td>0.5315</td>
<td>96</td>
<td>255</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-25">25</xref>]</td>
<td>2021</td>
<td>108</td>
<td>0.0469</td>
<td>0.0391</td>
<td>0.4375</td>
<td>0.5625</td>
<td>0.4727</td>
<td>0.5391</td>
<td>100</td>
<td>255</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-26">26</xref>]</td>
<td>2025</td>
<td>106</td>
<td>0.0156</td>
<td>0.0391</td>
<td>0.4063</td>
<td>0.5938</td>
<td>0.4805</td>
<td>0.5371</td>
<td>96</td>
<td>253</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-63">63</xref>]</td>
<td>2025</td>
<td>91</td>
<td>0.0273</td>
<td>0.0469</td>
<td>0.3516</td>
<td>0.7109</td>
<td>0.4668</td>
<td>0.5313</td>
<td>92</td>
<td>253</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-64">64</xref>]</td>
<td>2023</td>
<td>112</td>
<td>0.0625</td>
<td>0.0313</td>
<td>0.4375</td>
<td>0.5625</td>
<td>0.4727</td>
<td>0.5332</td>
<td>98</td>
<td>254</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-28">28</xref>]</td>
<td>2025</td>
<td>112</td>
<td>0.0234</td>
<td>0.0156</td>
<td>0.4531</td>
<td>0.5625</td>
<td>0.4766</td>
<td>0.5273</td>
<td>112</td>
<td>254</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-27">27</xref>]</td>
<td>2023</td>
<td>110</td>
<td>0.0391</td>
<td>0.0391</td>
<td>0.4375</td>
<td>0.5781</td>
<td>0.4590</td>
<td>0.5371</td>
<td>98</td>
<td>253</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-65">65</xref>]</td>
<td>2021</td>
<td>116</td>
<td>0.0313</td>
<td>0.0391</td>
<td>0.4375</td>
<td>0.5469</td>
<td>0.4727</td>
<td>0.5371</td>
<td>96</td>
<td>247</td>
</tr>
<tr>
<td>Ideal value</td>
<td>&#x2013;</td>
<td>120</td>
<td>0.000</td>
<td>0.000</td>
<td>0.500</td>
<td>0.500</td>
<td>0.500</td>
<td>0.500</td>
<td>120</td>
<td>255</td>
</tr>
</tbody>
</table>
</table-wrap><table-wrap id="table-6">
<label>Table 6</label>
<caption>
<title>Performance comparison of NL, LAP, and DAP against existing S-boxes</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/> </colgroup>
<thead>
<tr>
<th align="center" rowspan="2">S-boxes</th>
<th align="center" colspan="3">Linear attacks</th>
<th align="center" colspan="2">Differential attacks</th>
</tr>
<tr>
<th>NL</th>
<th>LAP</th>
<th>Remarks</th>
<th>DAP</th>
<th>Remarks</th>
</tr>
</thead>
<tbody>
<tr>
<td><inline-formula id="ieqn-364"><mml:math id="mml-ieqn-364"><mml:mi>&#x03C3;</mml:mi></mml:math></inline-formula></td>
<td>106</td>
<td>0.0312</td>
<td>&#x2013;</td>
<td>0.390</td>
<td>&#x2013;</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-3">3</xref>]</td>
<td><inline-formula id="ieqn-365"><mml:math id="mml-ieqn-365"><mml:mo>&#x003C;</mml:mo></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-366"><mml:math id="mml-ieqn-366"><mml:mo>&#x003E;</mml:mo></mml:math></inline-formula></td>
<td>Weaker</td>
<td><inline-formula id="ieqn-367"><mml:math id="mml-ieqn-367"><mml:mo>=</mml:mo></mml:math></inline-formula></td>
<td>Comparable</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-37">37</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-39">39</xref>]</td>
<td>&#x003D;</td>
<td>&#x003C;</td>
<td>Stronger</td>
<td>&#x003E;</td>
<td>Weaker</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-41">41</xref>]</td>
<td>&#x003D;</td>
<td>&#x003C;</td>
<td><bold>Stronger</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-38">38</xref>]</td>
<td>&#x003D;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-44">44</xref>]</td>
<td>&#x003D;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-40">40</xref>]</td>
<td>&#x003D;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-9">9</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-10">10</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-11">11</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-13">13</xref>]</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td>Comparable</td>
<td>&#x003E;</td>
<td>Weaker</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-2">2</xref>]</td>
<td>&#x003D;</td>
<td>&#x003E;</td>
<td>Comparable</td>
<td>&#x003E;</td>
<td>Weaker</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-55">55</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>Weaker</td>
<td>&#x003D;</td>
<td>Comparable</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-4">4</xref>]</td>
<td>&#x003E;</td>
<td>&#x003E;</td>
<td>Comparable</td>
<td>&#x003D;</td>
<td>Comparable</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-5">5</xref>]</td>
<td>&#x003C;</td>
<td>&#x003D;</td>
<td>Comparable</td>
<td>&#x003E;</td>
<td>Weaker</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-56">56</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-12">12</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>Weaker</td>
<td>&#x003E;</td>
<td>Weaker</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-21">21</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>Weaker</td>
<td>&#x003E;</td>
<td>Weaker</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-29">29</xref>]</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td><bold>Comparable</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-22">22</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Comparable</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-57">57</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-58">58</xref>]</td>
<td>&#x003C;</td>
<td>&#x003D;</td>
<td>Weaker</td>
<td>&#x003D;</td>
<td>Comparable</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-20">20</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-59">59</xref>]</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td><bold>Comparable</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-60">60</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-19">19</xref>]</td>
<td>&#x003D;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td><inline-formula id="ieqn-368"><mml:math id="mml-ieqn-368"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mi>&#x03C0;</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>112</td>
<td>0.0078</td>
<td>&#x2013;</td>
<td>0.0156</td>
<td>&#x2013;</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-14">14</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-61">61</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-62">62</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-7">7</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-24">24</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-25">25</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-26">26</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-63">63</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-64">64</xref>]</td>
<td>&#x003D;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-28">28</xref>]</td>
<td>&#x003D;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003D;</td>
<td><bold>Comparable</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-27">27</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-65">65</xref>]</td>
<td>&#x003E;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn id="table-6fn1" fn-type="other">
<p>Note: Where the symbols &#x003C;, &#x003E;, and &#x003D; exhibit that the reference S-box has respectively lower, greater and equal test value, when compared to the that of the proposed S-box.</p>
</fn>
</table-wrap-foot>
</table-wrap><table-wrap id="table-7">
<label>Table 7</label>
<caption>
<title>Performance comparison of SAC, BIC, and AC against existing S-boxes</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/> </colgroup>
<thead>
<tr>
<th>S-boxes</th>
<th colspan="5">Boolean attacks</th>
<th colspan="2">Algebraic attacks</th>
</tr>
<tr>
<th></th>
<th>SAC (min)</th>
<th>SAC (max)</th>
<th>BIC (min)</th>
<th>BIC (max)</th>
<th>Remarks</th>
<th>AC</th>
<th>Remarks</th>
</tr>
</thead>
<tbody>
<tr>
<td><inline-formula id="ieqn-369"><mml:math id="mml-ieqn-369"><mml:mi>&#x03C3;</mml:mi></mml:math></inline-formula></td>
<td>0.4218</td>
<td>0.5937</td>
<td>0.4707</td>
<td>0.5293</td>
<td>&#x2013;</td>
<td>255</td>
<td>&#x2013;</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-3">3</xref>]</td>
<td>&#x003D;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003E;</td>
<td>Stronger</td>
<td>&#x003D;</td>
<td>Comparable</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-37">37</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003D;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003D;</td>
<td><bold>Comparable</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-39">39</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003E;</td>
<td>&#x003C;</td>
<td>Comparable</td>
<td>&#x003D;</td>
<td>Comparable</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-41">41</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003C;</td>
<td>&#x003D;</td>
<td><bold>Weaker</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-38">38</xref>]</td>
<td>&#x003E;</td>
<td>&#x003E;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003D;</td>
<td><bold>Comparable</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-44">44</xref>]</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003D;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-40">40</xref>]</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003C;</td>
<td><bold>Stronger</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-9">9</xref>]</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td><bold>Comparable</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-10">10</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003D;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-11">11</xref>]</td>
<td>&#x003E;</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Comparable</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-13">13</xref>]</td>
<td>&#x003E;</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>Comparable</td>
<td>&#x003D;</td>
<td>Comparable</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-2">2</xref>]</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003E;</td>
<td>Comparable</td>
<td>&#x003D;</td>
<td>Comparable</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-55">55</xref>]</td>
<td>&#x003D;</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td>Stronger</td>
<td>&#x003C;</td>
<td>Weaker</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-4">4</xref>]</td>
<td>&#x003C;</td>
<td>&#x003D;</td>
<td>&#x003E;</td>
<td>&#x003E;</td>
<td>Weaker</td>
<td>&#x003C;</td>
<td>Weaker</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-5">5</xref>]</td>
<td>&#x003C;</td>
<td>&#x003D;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>Weaker</td>
<td>&#x003D;</td>
<td>Comparable</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-56">56</xref>]</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-12">12</xref>]</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003E;</td>
<td>Comparable</td>
<td>&#x003D;</td>
<td>Comparable</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-21">21</xref>]</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003E;</td>
<td>Comparable</td>
<td>&#x003D;</td>
<td>Comparable</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-29">29</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003D;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-22">22</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-57">57</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-58">58</xref>]</td>
<td>&#x003C;</td>
<td>&#x003D;</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td>Weaker</td>
<td>&#x003D;</td>
<td>Comparable</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-20">20</xref>]</td>
<td>&#x003E;</td>
<td>&#x003E;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-59">59</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-60">60</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003E;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-19">19</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td><inline-formula id="ieqn-370"><mml:math id="mml-ieqn-370"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mi>&#x03C0;</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>0.4531</td>
<td>0.5625</td>
<td>0.4883</td>
<td>0.5234</td>
<td>&#x2013;</td>
<td>255</td>
<td>&#x2013;</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-14">14</xref>]</td>
<td>&#x003C;</td>
<td>&#x003D;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-61">61</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003D;</td>
<td><bold>Comparable</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-62">62</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-7">7</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003D;</td>
<td><bold>Comparable</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-24">24</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003D;</td>
<td><bold>Comparable</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-25">25</xref>]</td>
<td>&#x003C;</td>
<td>&#x003D;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003D;</td>
<td><bold>Comparable</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-26">26</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-63">63</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-64">64</xref>]</td>
<td>&#x003C;</td>
<td>&#x003D;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-28">28</xref>]</td>
<td>&#x003C;</td>
<td>&#x003D;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-27">27</xref>]</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-65">65</xref>]</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td>&#x003C;</td>
<td>&#x003E;</td>
<td><bold>Weaker</bold></td>
<td>&#x003C;</td>
<td><bold>Weaker</bold></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The current scheme demonstrates superior performance across all analyzed attacks, as observed in <xref ref-type="table" rid="table-6">Tables 6</xref> and <xref ref-type="table" rid="table-7">7</xref>, when compared to the reference schemes highlighted in bold.</p>

<sec id="s5_1">
<label>5.1</label>
<title>Side-Channel Attack Analysis</title>
<p>Beyond testing conventional cryptographic criteria, it is important to assess the S-box resistance against side-channel attacks. Side-channel attacks, unlike conventional mathematical attacks that focus on the algorithmic framework, exploit physical leaks such as power consumption during cryptographic operations. Even a mathematically and cryptographically strong algorithm can become vulnerable if its implementation exposes exploitable information, so evaluating its resistance to such attacks is crucial. As a result, side-channel analysis is essential for designing cryptosystems that are both theoretically secure and resistant to real-world exploitation. We applied several well-known and commonly used parameters, including Normalized Transparency Order (TO), Mean Normalized Transparency Order (MTO), and Relative Transparency Order (RTO), along with supplementary measurements such as Maximum Correlation Coefficient (MCC), Correlation Coefficient Variance (CCV), and Signal-to-Noise Ratio (SNR) to our generated S-box in <xref ref-type="table" rid="table-3">Table 3</xref>. However, these analyses provide a foundation for evaluating how effectively an S-box reduces leakage that can be exploited by power analysis. To conduct a fair comparison between the proposed S-box and other related techniques based on a real finite field, and experimental results are demonstrated in <xref ref-type="table" rid="table-8">Table 8</xref>. The results show that the proposed algorithm&#x2019;s outputs closely align with those of AES and other recent, robust, and highly nonlinear state-of-the-art S-box methods. Since the variation between our method and other generators is very low, it can be assumed that the proposed S-box algorithm and the majority of modern S-box algorithms are theoretically equally resilient to basic side-channel attacks. These findings demonstrate that the cryptographic strength of our S-box does not compromise its resistance to side-channel leakage, preserving a robust trade-off between implementation security and cryptographic strength.</p>
<table-wrap id="table-8">
<label>Table 8</label>
<caption>
<title>Comparison of side-channel attacks results with existing S-boxes</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/> </colgroup>
<thead>
<tr>
<th>S-boxes</th>
<th>Year</th>
<th>TO<sub>0</sub></th>
<th>MTO<sub>0</sub></th>
<th>RTO<sub>0</sub></th>
<th>MCC</th>
<th>CCV</th>
<th>SNR</th>
</tr>
</thead>
<tbody>
<tr>
<td><inline-formula id="ieqn-374"><mml:math id="mml-ieqn-374"><mml:mi>&#x03C3;</mml:mi></mml:math></inline-formula></td>
<td>2025</td>
<td>7.999</td>
<td>6.801</td>
<td>7.492</td>
<td>0.789</td>
<td>0.015</td>
<td>14.444</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-66">66</xref>]</td>
<td>2025</td>
<td>7.930</td>
<td>6.906</td>
<td>7.501</td>
<td>0.781</td>
<td>0.101</td>
<td>9.894</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-67">67</xref>]</td>
<td>2025</td>
<td>7.908</td>
<td>6.967</td>
<td>7.511</td>
<td>0.801</td>
<td>0.092</td>
<td>10.153</td>
</tr>
<tr>
<td>AES [<xref ref-type="bibr" rid="ref-68">68</xref>]</td>
<td>2001</td>
<td>7.860</td>
<td>6.869</td>
<td>7.458</td>
<td>0.820</td>
<td>0.111</td>
<td>9.600</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s5_2">
<label>5.2</label>
<title>Performance Analysis</title>
<p>An S-box generator is considered cryptographically favorable if it can generate a large number of distinct S-boxes in a short span of time, and the number of fixed points in the generated S-boxes is as small as possible. Furthermore, it should be nonsingular [<xref ref-type="bibr" rid="ref-61">61</xref>]. In this subsection, we analyze the presented algorithm regarding its capability to generate S-boxes, fixed points, singularity, execution time, and distribution of NL values. Furthermore, we compare the current algorithm with similar algorithms [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-44">44</xref>] in terms of the aforementioned criteria.</p>
<sec id="s5_2_1">
<label>5.2.1</label>
<title>Generation Efficiency</title>
<p>We run the algorithms [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-44">44</xref>] for initial valid values of prime <inline-formula id="ieqn-375"><mml:math id="mml-ieqn-375"><mml:mi>p</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-376"><mml:math id="mml-ieqn-376"><mml:mi>b</mml:mi></mml:math></inline-formula> to generate the first <inline-formula id="ieqn-377"><mml:math id="mml-ieqn-377"><mml:mn>1000</mml:mn></mml:math></inline-formula> S-boxes using the MEC <inline-formula id="ieqn-378"><mml:math id="mml-ieqn-378"><mml:msup><mml:mi>y</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2261;</mml:mo><mml:msup><mml:mi>x</mml:mi><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mi>b</mml:mi><mml:mspace width="0.444em" /><mml:mo stretchy="false">(</mml:mo><mml:mi>mod</mml:mi><mml:mspace width="0.333em" /><mml:mi>p</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, and the experimental results are shown in <xref ref-type="table" rid="table-9">Table 9</xref>. The results indicate that the presented scheme needs fewer input points, a smaller value of prime than the schemes in [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-44">44</xref>] to generate a comparable number of distinct S-boxes. The number of total possible proposed S-boxes is greater than those of [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-44">44</xref>] for every initial valid underlying primes. More explicitly, the current algorithm begins to perform for very small primes, whereas the mentioned schemes are incapable of generating a single S-box for primes less than 257.</p>
<table-wrap id="table-9">
<label>Table 9</label>
<caption>
<title>The comparison of number of distinct <inline-formula id="ieqn-379"><mml:math id="mml-ieqn-379"><mml:mi>n</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mi>n</mml:mi></mml:math></inline-formula> S-boxes</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/> </colgroup>
<thead>
<tr>
<th align="center" rowspan="2">Scheme</th>
<th align="center" rowspan="2"><inline-formula id="ieqn-380"><mml:math id="mml-ieqn-380"><mml:mi>p</mml:mi></mml:math></inline-formula></th>
<th align="center" rowspan="2"><inline-formula id="ieqn-381"><mml:math id="mml-ieqn-381"><mml:mi>b</mml:mi></mml:math></inline-formula></th>
<th align="center" rowspan="2"><inline-formula id="ieqn-382"><mml:math id="mml-ieqn-382"><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula></th>
<th><italic>#</italic>Input</th>
<th><italic>#</italic>Dist.</th>
<th>Total</th>
<th><italic>#</italic>Fixed</th>
<th rowspan="2">Singular</th>
</tr>
<tr>
<th>points</th>
<th>S-boxes</th>
<th>S-boxes</th>
<th>points</th>
</tr>
</thead>
<tbody>
<tr>
<td>Proposed</td>
<td>31</td>
<td>1</td>
<td>961</td>
<td><inline-formula id="ieqn-383"><mml:math id="mml-ieqn-383"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula></td>
<td>1000</td>
<td>831,168,900</td>
<td>1</td>
<td>No</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-42">42</xref>]</td>
<td>563</td>
<td>1</td>
<td>563</td>
<td><inline-formula id="ieqn-384"><mml:math id="mml-ieqn-384"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula></td>
<td>1000</td>
<td>32,768</td>
<td>2</td>
<td>No</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-43">43</xref>]</td>
<td>257</td>
<td><inline-formula id="ieqn-385"><mml:math id="mml-ieqn-385"><mml:mo stretchy="false">[</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mi>p</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula></td>
<td>257</td>
<td><inline-formula id="ieqn-386"><mml:math id="mml-ieqn-386"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula></td>
<td>256</td>
<td>256</td>
<td>2</td>
<td>No</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-44">44</xref>]</td>
<td>257</td>
<td>1</td>
<td>257</td>
<td><inline-formula id="ieqn-387"><mml:math id="mml-ieqn-387"><mml:mi>p</mml:mi></mml:math></inline-formula></td>
<td>256</td>
<td>256</td>
<td>2</td>
<td>No</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-18">18</xref>]</td>
<td>257</td>
<td>1</td>
<td>257</td>
<td><inline-formula id="ieqn-388"><mml:math id="mml-ieqn-388"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula></td>
<td>NA</td>
<td>NA</td>
<td>NA</td>
<td>yes</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s5_2_2">
<label>5.2.2</label>
<title>Fixed Points Evaluation</title>
<p>Apart from the generation of a large number of distinct S-boxes, an S-box generator is considered to have good dynamic behavior if the mean value of the fixed points in the generated S-boxes is considerably small [<xref ref-type="bibr" rid="ref-61">61</xref>]. The round-off mean values of the fixed points (<italic>#</italic>Fixed points) for the proposed S-box generator and the generators presented in [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-44">44</xref>] are drawn in <xref ref-type="table" rid="table-9">Table 9</xref>. It is obvious that the proposed algorithm has comparatively more dynamic behavior than those of [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-44">44</xref>].</p>

</sec>
<sec id="s5_2_3">
<label>5.2.3</label>
<title>Analysis of Singular Points</title>
<p>An S-box algorithm is said to have singular points if it does not generate an S-box for a valid input parameter, and hence, the algorithm becomes singular. An S-box generator is considered favorable for cryptographic applications if it is nonsingular. The comparison of the presented algorithm with respect to the singular points is presented in <xref ref-type="table" rid="table-9">Table 9</xref>. It can be verified that the current algorithm is also nonsingular.</p>

</sec>
<sec id="s5_2_4">
<label>5.2.4</label>
<title>Assessment of the Execution Time</title>
<p>An S-box generator is promising for cryptographic applications if it can efficiently generate the resulting S-box [<xref ref-type="bibr" rid="ref-40">40</xref>]. More precisely, for a favorable S-box construction method, it is necessary to frequently output dynamic S-boxes in a minimal time. We analyzed the computation time of the current and some recent schemes for generating the above <inline-formula id="ieqn-389"><mml:math id="mml-ieqn-389"><mml:mn>1000</mml:mn></mml:math></inline-formula> S-boxes. The experimental results are shown in <xref ref-type="fig" rid="fig-3">Fig. 3</xref>.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>The comparison of execution time of new and existing algorithms [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-44">44</xref>]</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_73097-fig-3.tif"/>
</fig>
<p>It is clear that the average time for the proposed S-box is <inline-formula id="ieqn-390"><mml:math id="mml-ieqn-390"><mml:mn>0.50</mml:mn></mml:math></inline-formula> s, whereas the average time required for the S-boxes [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-44">44</xref>] is 0.63, 82.76 and 0.80 s, respectively. Furthermore, the current scheme takes only 0.57 s to generate 1000 S-boxes, whereas the schemes in [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-44">44</xref>] require 0.70, 188.50, and 0.95 s, respectively, to generate the same number of S-boxes. Consequently, our algorithm is faster than those of our competitors. The speed of the current algorithm is superior to that of the algorithm in [<xref ref-type="bibr" rid="ref-43">43</xref>] because the newly developed method does not require generating all points for S-box generation.</p>
</sec>
<sec id="s5_2_5">
<label>5.2.5</label>
<title>The NL Distribution</title>
<p>Apart from this, we picked only the first 100 S-boxes generated by the new scheme and the aforesaid schemes. The NL ranges for the proposed scheme and the schemes in [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-44">44</xref>] are [86, 104], [86, 104], [90, 104], and [90, 102], respectively. Thus, the range for the proposed scheme is comparable with the ranges of the scheme [<xref ref-type="bibr" rid="ref-42">42</xref>,<xref ref-type="bibr" rid="ref-44">44</xref>]. However, if we choose a bit larger prime for the current algorithm and the chosen parameters illustrated in <xref ref-type="sec" rid="s4">Section 4</xref>, then the NL range for the proposed technique becomes [92,104] and hence the number of S-boxes for each NL value in the corresponding range is shown in <xref ref-type="fig" rid="fig-4">Fig. 4</xref>. It follows that the minimum NL value (92) for the proposed algorithm is greater than the minimum NL values (86,90,90, respectively) attained by the schemes [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-44">44</xref>]. In addition, the current scheme generates more S-boxes of NL &#x003D; 104 than the schemes in [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-44">44</xref>]. Hence, the proposed algorithm is more capable of generating highly non-linear S-boxes with small input parameters.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>The comparison of NL distribution by the new and existing algorithms [<xref ref-type="bibr" rid="ref-42">42</xref>&#x2013;<xref ref-type="bibr" rid="ref-44">44</xref>]</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_73097-fig-4.tif"/>
</fig>
</sec>
<sec id="s5_2_6">
<label>5.2.6</label>
<title>Analysis Based on Repeated Trails</title>
<p>To validate the effectiveness of our S-box generator, we conducted independent repeated trials to produce 100 S-boxes using the various parameters described in <xref ref-type="sec" rid="s4">Section 4</xref>. For each generated S-box, we calculated cryptographic properties using standard metrics, including LAP, DAP, BIC, and SAC, and outlined the results in <xref ref-type="fig" rid="fig-5">Fig. 5</xref>. The LAP values for 100 S-boxes are shown in <xref ref-type="fig" rid="fig-5">Fig. 5a</xref>, falling in the range [0.0156, 0.0937] with an average of 0.0497, which are low, indicating that our generator produces secure S-boxes against linear attacks. Similarly, the DAP results for the same set of 100 S-boxes are depicted in <xref ref-type="fig" rid="fig-5">Fig. 5b</xref>. The range of the DAP is [0.0390, 0.0625], having average of 0.0442. That is low, and these findings confirm that constructed S-boxes exhibit high resistance to differential attacks. Moreover, the SAC (min) and SAC (max) test results for 100 S-boxes are presented in <xref ref-type="fig" rid="fig-5">Fig. 5c</xref>. The ranges [0.3437, 0.4375] and [0.5468, 0.6562] correspond to the SAC (min) and SAC (max) values, indicating averages of 0.3982 and 0.6053, respectively, which are closer to the desired value of 0.5. Likewise, the BIC (min) and BIC (max) test outcomes of 100 S-boxes are depicted in <xref ref-type="fig" rid="fig-5">Fig. 5d</xref>. The BIC ranges [0.4433, 0.4882] and [0.5156, 0.5566] with average BIC (min) and BIC (max) values 0.4710 and 0.5330, respectively, which are close to the ideal value 0.5, indicating that our generator can produce S-boxes with the desired confusion and secure against Boolean attacks. As a result of the repeated-trial analysis, the suggested method consistently generates dynamic S-boxes with satisfactory cryptographic properties and is independent of specific parameter choices. Hence, the proposed S-box framework offers considerable resistance against various cryptographic attacks.</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>Distribution of 100 S-boxes cryptographic results. (<bold>a</bold>) Maximal LAP. (<bold>b</bold>) Maximal DAP. (<bold>c</bold>) Minimum and Maximum values of SAC. (<bold>d</bold>) Minimum and Maximum values of BIC</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_73097-fig-5.tif"/>
</fig>
</sec>
</sec>
<sec id="s5_3">
<label>5.3</label>
<title>Key Space Analysis</title>
<p>The security of any encryption algorithm is based on its key space, and hence, keyed S-boxes are cryptographically more favorable regarding the security against key cryptanalysis [<xref ref-type="bibr" rid="ref-40">40</xref>]. In this section, we analyze the size of the key space and, hence, the sensitivity of each key of the proposed S-box generator.</p>
<sec id="s5_3_1">
<label>5.3.1</label>
<title>Size of Key Space</title>
<p>Since the proposed algorithm uses six keys that are <inline-formula id="ieqn-391"><mml:math id="mml-ieqn-391"><mml:mi>p</mml:mi><mml:mo>,</mml:mo><mml:mi>b</mml:mi><mml:mo>,</mml:mo><mml:mi>c</mml:mi><mml:mo>,</mml:mo><mml:mi>d</mml:mi><mml:mo>,</mml:mo><mml:mi>e</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-392"><mml:math id="mml-ieqn-392"><mml:mi>f</mml:mi></mml:math></inline-formula>. In which only <inline-formula id="ieqn-393"><mml:math id="mml-ieqn-393"><mml:mi>p</mml:mi></mml:math></inline-formula> is real, while the remaining five keys consist of two parts. The proposed algorithm is implemented by choosing <inline-formula id="ieqn-394"><mml:math id="mml-ieqn-394"><mml:mi>p</mml:mi></mml:math></inline-formula> of eight bits. However, the number of bits may be increased by selecting a large <inline-formula id="ieqn-395"><mml:math id="mml-ieqn-395"><mml:mi>p</mml:mi></mml:math></inline-formula>. In general, if <inline-formula id="ieqn-396"><mml:math id="mml-ieqn-396"><mml:mi>p</mml:mi></mml:math></inline-formula> consists of <inline-formula id="ieqn-397"><mml:math id="mml-ieqn-397"><mml:mi>&#x03BC;</mml:mi></mml:math></inline-formula> bits, then the key space of the proposed cryptosystem is <inline-formula id="ieqn-398"><mml:math id="mml-ieqn-398"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mn>11</mml:mn><mml:mi>&#x03BC;</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula>, which is much larger than the key spaces <inline-formula id="ieqn-399"><mml:math id="mml-ieqn-399"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mn>2</mml:mn><mml:mi>&#x03BC;</mml:mi></mml:mrow></mml:msup><mml:mo>,</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mn>3</mml:mn><mml:mi>&#x03BC;</mml:mi></mml:mrow></mml:msup><mml:mo>,</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mn>4</mml:mn><mml:mi>&#x03BC;</mml:mi></mml:mrow></mml:msup><mml:mo>,</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mn>9</mml:mn><mml:mi>&#x03BC;</mml:mi></mml:mrow></mml:msup><mml:mo>,</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mn>9</mml:mn><mml:mi>&#x03BC;</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula> of the schemes [<xref ref-type="bibr" rid="ref-39">39</xref>&#x2013;<xref ref-type="bibr" rid="ref-42">42</xref>,<xref ref-type="bibr" rid="ref-44">44</xref>], respectively. Thus, the new scheme offers more security to thwart unauthorized attempts of attackers.</p>
</sec>
<sec id="s5_3_2">
<label>5.3.2</label>
<title>Key Sensitivity</title>
<p>A cryptosystem is considerably secure to key-related attacks if a minor change in any key results in a different output. To analyze this property of the presented algorithm, we generate S-boxes against different altered keys, as listed in <xref ref-type="table" rid="table-10">Table 10</xref>. We have <inline-formula id="ieqn-400"><mml:math id="mml-ieqn-400"><mml:mn>12</mml:mn></mml:math></inline-formula> S-boxes, where <inline-formula id="ieqn-401"><mml:math id="mml-ieqn-401"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> is the one for unchanged keys, as shown in <xref ref-type="table" rid="table-3">Table 3</xref>, and <inline-formula id="ieqn-402"><mml:math id="mml-ieqn-402"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>3</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mn>12</mml:mn></mml:math></inline-formula>, for the slightly changed keys, are shown in <xref ref-type="table" rid="table-10">Table 10</xref>.</p>
<table-wrap id="table-10">
<label>Table 10</label>
<caption>
<title>The S-box <inline-formula id="ieqn-403"><mml:math id="mml-ieqn-403"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mn>12</mml:mn></mml:math></inline-formula> and the corresponding keys</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/> </colgroup>
<thead>
<tr>
<th align="center" rowspan="2">S-box</th>
<th align="center" rowspan="2"><inline-formula id="ieqn-404"><mml:math id="mml-ieqn-404"><mml:mi>p</mml:mi></mml:math></inline-formula></th>
<th colspan="2"><inline-formula id="ieqn-405"><mml:math id="mml-ieqn-405"><mml:mi>b</mml:mi></mml:math></inline-formula></th>
<th colspan="2"><inline-formula id="ieqn-406"><mml:math id="mml-ieqn-406"><mml:mi>c</mml:mi></mml:math></inline-formula></th>
<th colspan="2"><inline-formula id="ieqn-407"><mml:math id="mml-ieqn-407"><mml:mi>d</mml:mi></mml:math></inline-formula></th>
<th colspan="2"><inline-formula id="ieqn-408"><mml:math id="mml-ieqn-408"><mml:mi>e</mml:mi></mml:math></inline-formula></th>
<th colspan="2"><inline-formula id="ieqn-409"><mml:math id="mml-ieqn-409"><mml:mi>f</mml:mi></mml:math></inline-formula></th>
</tr>
<tr>
<th><inline-formula id="ieqn-410"><mml:math id="mml-ieqn-410"><mml:msub><mml:mi>b</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></th>
<th><inline-formula id="ieqn-411"><mml:math id="mml-ieqn-411"><mml:msub><mml:mi>b</mml:mi><mml:mrow><mml:mrow><mml:mtext>2</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula></th>
<th><inline-formula id="ieqn-412"><mml:math id="mml-ieqn-412"><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></th>
<th><inline-formula id="ieqn-413"><mml:math id="mml-ieqn-413"><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mrow><mml:mtext>2</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula></th>
<th><inline-formula id="ieqn-414"><mml:math id="mml-ieqn-414"><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></th>
<th><inline-formula id="ieqn-415"><mml:math id="mml-ieqn-415"><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mrow><mml:mtext>2</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula></th>
<th><inline-formula id="ieqn-416"><mml:math id="mml-ieqn-416"><mml:msub><mml:mi>e</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></th>
<th><inline-formula id="ieqn-417"><mml:math id="mml-ieqn-417"><mml:msub><mml:mi>e</mml:mi><mml:mrow><mml:mrow><mml:mtext>2</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula></th>
<th><inline-formula id="ieqn-418"><mml:math id="mml-ieqn-418"><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></th>
<th><inline-formula id="ieqn-419"><mml:math id="mml-ieqn-419"><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mrow><mml:mtext>2</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula></th>
</tr>
</thead>
<tbody>
<tr>
<td><inline-formula id="ieqn-420"><mml:math id="mml-ieqn-420"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>107</td>
<td>4</td>
<td>0</td>
<td>1</td>
<td>46</td>
<td>32</td>
<td>46</td>
<td>3</td>
<td>4</td>
<td>5</td>
<td>6</td>
</tr>
<tr>
<td><inline-formula id="ieqn-421"><mml:math id="mml-ieqn-421"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>103</td>
<td>4</td>
<td>0</td>
<td>1</td>
<td>46</td>
<td>32</td>
<td>46</td>
<td>3</td>
<td>4</td>
<td>5</td>
<td>6</td>
</tr>
<tr>
<td><inline-formula id="ieqn-422"><mml:math id="mml-ieqn-422"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>107</td>
<td>5</td>
<td>0</td>
<td>1</td>
<td>46</td>
<td>32</td>
<td>46</td>
<td>3</td>
<td>4</td>
<td>5</td>
<td>6</td>
</tr>
<tr>
<td><inline-formula id="ieqn-423"><mml:math id="mml-ieqn-423"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>107</td>
<td>4</td>
<td>1</td>
<td>1</td>
<td>46</td>
<td>32</td>
<td>46</td>
<td>3</td>
<td>4</td>
<td>5</td>
<td>6</td>
</tr>
<tr>
<td><inline-formula id="ieqn-424"><mml:math id="mml-ieqn-424"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mn>5</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>107</td>
<td>4</td>
<td>0</td>
<td>2</td>
<td>46</td>
<td>32</td>
<td>46</td>
<td>3</td>
<td>4</td>
<td>5</td>
<td>6</td>
</tr>
<tr>
<td><inline-formula id="ieqn-425"><mml:math id="mml-ieqn-425"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>107</td>
<td>4</td>
<td>0</td>
<td>1</td>
<td>47</td>
<td>32</td>
<td>46</td>
<td>3</td>
<td>4</td>
<td>5</td>
<td>6</td>
</tr>
<tr>
<td><inline-formula id="ieqn-426"><mml:math id="mml-ieqn-426"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mn>7</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>107</td>
<td>4</td>
<td>0</td>
<td>1</td>
<td>46</td>
<td>33</td>
<td>46</td>
<td>3</td>
<td>4</td>
<td>5</td>
<td>6</td>
</tr>
<tr>
<td><inline-formula id="ieqn-427"><mml:math id="mml-ieqn-427"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mn>8</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>107</td>
<td>4</td>
<td>0</td>
<td>1</td>
<td>46</td>
<td>32</td>
<td>47</td>
<td>3</td>
<td>4</td>
<td>5</td>
<td>6</td>
</tr>
<tr>
<td><inline-formula id="ieqn-428"><mml:math id="mml-ieqn-428"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mn>9</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>107</td>
<td>4</td>
<td>0</td>
<td>1</td>
<td>46</td>
<td>32</td>
<td>46</td>
<td>4</td>
<td>4</td>
<td>5</td>
<td>6</td>
</tr>
<tr>
<td><inline-formula id="ieqn-429"><mml:math id="mml-ieqn-429"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mn>10</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>107</td>
<td>4</td>
<td>0</td>
<td>1</td>
<td>46</td>
<td>32</td>
<td>46</td>
<td>3</td>
<td>5</td>
<td>5</td>
<td>6</td>
</tr>
<tr>
<td><inline-formula id="ieqn-430"><mml:math id="mml-ieqn-430"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>107</td>
<td>4</td>
<td>0</td>
<td>1</td>
<td>46</td>
<td>32</td>
<td>46</td>
<td>3</td>
<td>4</td>
<td>6</td>
<td>6</td>
</tr>
<tr>
<td><inline-formula id="ieqn-431"><mml:math id="mml-ieqn-431"><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mn>12</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>107</td>
<td>4</td>
<td>0</td>
<td>1</td>
<td>46</td>
<td>32</td>
<td>46</td>
<td>3</td>
<td>4</td>
<td>5</td>
<td>7</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Then we compute the correlation coefficient (CC) between each pair <inline-formula id="ieqn-432"><mml:math id="mml-ieqn-432"><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mrow><mml:mtext>j</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> for <inline-formula id="ieqn-433"><mml:math id="mml-ieqn-433"><mml:mi>i</mml:mi><mml:mo>&#x2260;</mml:mo><mml:mi>j</mml:mi></mml:math></inline-formula> of S-boxes generated by the original keys and slightly changed keys. The CC must be close to zero for a highly key sensitive S-box algorithm. The results are shown in <xref ref-type="fig" rid="fig-6">Fig. 6</xref>, where the average CC (<inline-formula id="ieqn-434"><mml:math id="mml-ieqn-434"><mml:mn>0.0085</mml:mn></mml:math></inline-formula>) indicates that a minor change in any key produces a completely uncorrelated and different output.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>The CC of the S-boxes generated by slightly different keys</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_73097-fig-6.tif"/>
</fig>
</sec>
</sec>
</sec>
<sec id="s6">
<label>6</label>
<title>Application of Proposed S-Box</title>
<p>The presented S-box algorithm can be utilized in diverse security fields such as steganography, encryption, and watermarking. Nowadays, in the area of cryptography, the security of confidential images has emerged as a prominent research topic. In this paper, we used our S-box generator for strong and secure image encryption. The S-box provides diffusion and confusion, which enhances the security of the image cryptosystem. Traditional image cryptosystems, particularly cryptosystems that depend on a static S-box, are insufficient to assure the security of images.</p>
<sec id="s6_1">
<label>6.1</label>
<title>Application in Image Encryption</title>
<p>In this subsection, we demonstrate the potential application of our S-box generator by integrating it into the image encryption technique designed by Hayat et al. [<xref ref-type="bibr" rid="ref-41">41</xref>]. The encryption technique presented by Hayat et al. [<xref ref-type="bibr" rid="ref-41">41</xref>] is based on an EC over a finite ring and comprises three phases, namely the masking phase, diffusion phase, and confusion phase. In the confusion phase, image based S-boxes are employed to permute the pixels of the diffused image in the encryption process to obtain a cipher image. Although the utilized S-boxes in the said encryption scheme present promising results and show strong security against well-known attacks. However, the presented S-box scheme uses a large EC and has a low key space. In order to analyze the security and efficiency of the image encryption algorithm, we replace the S-box designed by Hayat et al. [<xref ref-type="bibr" rid="ref-41">41</xref>] with the proposed S-box. The encryption scheme and replacement process are detailed in Algorithm 2. A comprehensive analysis of the results obtained is presented in the following subsections.</p>
</sec>
<sec id="s6_2">
<label>6.2</label>
<title>A Detailed Performance Analysis</title>
<p>In this section, we examined the effectiveness of the encryption scheme based on different generated S-boxes. To do this, we first substituted our proposed S-box and performed all standard security tests. Likewise, we substituted the other well-known S-boxes of algorithms [<xref ref-type="bibr" rid="ref-42">42</xref>,<xref ref-type="bibr" rid="ref-68">68</xref>] with NL &#x003D; <inline-formula id="ieqn-435"><mml:math id="mml-ieqn-435"><mml:mn>112</mml:mn></mml:math></inline-formula> in the same encryption scheme. Using the same system and the parameters listed in <xref ref-type="sec" rid="s4">Section 4</xref>, we encrypted standard images of Resolution chart<sub>256&#x00D7;256</sub>, Chemical plant<sub>256&#x00D7;256</sub>, Herringbone weave<sub>512&#x00D7;512</sub>, and San diego<sub>512&#x00D7;512</sub>, respectively. The encrypted images obtained using the presented S-box are shown in <xref ref-type="fig" rid="fig-7">Fig. 7</xref>.</p>
<fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>Results of encryption process: (<bold>a</bold>&#x2013;<bold>d</bold>) plain images; (<bold>e</bold>&#x2013;<bold>h</bold>) corresponding cipher images</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_73097-fig-7.tif"/>
</fig>
<fig id="fig-12">
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_73097-fig-12.tif"/>
</fig>
<sec id="s6_2_1">
<label>6.2.1</label>
<title>Discussion of Results</title>
<p>In this part of the article, we compare and discuss the results of the encrypted images obtained by the current and existing S-boxes.</p>
</sec>
<sec id="s6_2_2">
<label>6.2.2</label>
<title>Differential Attacks</title>
<p>If an encryption approach can produce considerably distinct encrypted images from two slightly distinct plain images, then it is assumed to be secure against differential attacks. The resilience of an encryption technique against a differential attack is quantified by two metrics: NPCR (Number of Pixels Changed Rate) and UACI (Unified Average Changing Intensity). The theoretical values of NPCR and UACI for the images of size <inline-formula id="ieqn-488"><mml:math id="mml-ieqn-488"><mml:mn>256</mml:mn><mml:mo>&#x00D7;</mml:mo><mml:mn>256</mml:mn></mml:math></inline-formula> and <inline-formula id="ieqn-489"><mml:math id="mml-ieqn-489"><mml:mn>512</mml:mn><mml:mo>&#x00D7;</mml:mo><mml:mn>512</mml:mn></mml:math></inline-formula> are 99.5693, [33.2824, 33.6447] and 99.5893, [33.3730, 33.5541], respectively. For the aforesaid images, we computed the NPCR and UACI values as listed in <xref ref-type="table" rid="table-11">Table 11</xref>. It may be observed that the NPCR values for the Resolution chart, Chemical plant, Herringbone weave, and San diego are according to the theoretical values and better than the results acquired by the [<xref ref-type="bibr" rid="ref-42">42</xref>,<xref ref-type="bibr" rid="ref-68">68</xref>]. Similarly, the UACI results of the images based on our S-box fall in the theoretical ranges and are better than results based on the S-boxes of [<xref ref-type="bibr" rid="ref-42">42</xref>,<xref ref-type="bibr" rid="ref-68">68</xref>]. Therefore, the encryption approach using our S-box shows stronger resistance against differential attacks than the results for the S-boxes of [<xref ref-type="bibr" rid="ref-42">42</xref>,<xref ref-type="bibr" rid="ref-68">68</xref>].</p>
<table-wrap id="table-11">
<label>Table 11</label>
<caption>
<title>Performance comparison of image encryption based on alternative S-boxes</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/> </colgroup>
<thead>
<tr>
<th align="center" rowspan="2">Images</th>
<th align="center" rowspan="2">S-box</th>
<th align="center" rowspan="2">NPCR (<inline-formula id="ieqn-490"><mml:math id="mml-ieqn-490"><mml:mi mathvariant="normal">&#x0025;</mml:mi></mml:math></inline-formula>)</th>
<th rowspan="2">UACI (<inline-formula id="ieqn-491"><mml:math id="mml-ieqn-491"><mml:mi mathvariant="normal">&#x0025;</mml:mi></mml:math></inline-formula>)</th>
<th rowspan="2">Entropy</th>
<th align="center" colspan="3">Correlation</th>
</tr>
<tr>
<th align="center">Hor.</th>
<th align="center">Diag.</th>
<th align="center">Ver.</th>
</tr>
</thead>
<tbody>
<tr>
<td>Resolution chart</td>
<td rowspan="4">Ours</td>
<td>99.66</td>
<td>33.36</td>
<td>7.99713</td>
<td>&#x2212;0.00004</td>
<td>&#x2212;0.00052</td>
<td>&#x2212;0.00805</td>
</tr>
<tr>
<td>Chemical plant</td>
<td>99.77</td>
<td>33.29</td>
<td>7.99722</td>
<td>0.00291</td>
<td>0.00230</td>
<td>0.00102</td>
</tr>
<tr>
<td>Herringbone weave</td>
<td>99.76</td>
<td>33.38</td>
<td>7.99931</td>
<td>&#x2212;0.00194</td>
<td>0.00015</td>
<td>&#x2212;0.00220</td>
</tr>
<tr>
<td>San diego</td>
<td>99.62</td>
<td>33.41</td>
<td>7.99923</td>
<td>0.00067</td>
<td>0.00089</td>
<td>&#x2212;0.00049</td>
</tr>
<tr>
<td>Resolution chart</td>
<td></td>
<td>99.63</td>
<td>33.34</td>
<td>7.99699</td>
<td>&#x2212;0.00488</td>
<td>0.00868</td>
<td>&#x2212;0.00516</td>
</tr>
<tr>
<td>Chemical plant</td>
<td></td>
<td>99.36</td>
<td>33.10</td>
<td>7.99759</td>
<td>&#x2212;0.00726</td>
<td>0.00312</td>
<td>&#x2212;0.00094</td>
</tr>
<tr>
<td>Herringbone weave</td>
<td>[<xref ref-type="bibr" rid="ref-68">68</xref>]</td>
<td>99.65</td>
<td>33.41</td>
<td>7.99920</td>
<td>0.00251</td>
<td>&#x2212;0.00126</td>
<td>0.00420</td>
</tr>
<tr>
<td>San diego</td>
<td></td>
<td>99.53</td>
<td>33.23</td>
<td>7.99940</td>
<td>0.00088</td>
<td>&#x2212;0.00027</td>
<td>&#x2212;0.00152</td>
</tr>
<tr>
<td>Resolution chart</td>
<td rowspan="4">[<xref ref-type="bibr" rid="ref-41">41</xref>]</td>
<td>99.71</td>
<td>33.36</td>
<td>7.99735</td>
<td>&#x2212;0.00168</td>
<td>0.00537</td>
<td>&#x2212;0.00386</td>
</tr>
<tr>
<td>Chemical plant</td>
<td>99.62</td>
<td>33.09</td>
<td>7.99743</td>
<td>&#x2212;0.00409</td>
<td>0.00098</td>
<td>0.00480</td>
</tr>
<tr>
<td>Herringbone weave</td>
<td>99.61</td>
<td>33.36</td>
<td>7.99928</td>
<td>0.00281</td>
<td>0.00103</td>
<td>&#x2212;0.00066</td>
</tr>
<tr>
<td>San diego</td>
<td>99.35</td>
<td>33.28</td>
<td>7.99921</td>
<td>0.00043</td>
<td>&#x2212;0.00016</td>
<td>0.00096</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s6_2_3">
<label>6.2.3</label>
<title>Statistical Attacks</title>
<p>A secure encryption algorithm must be capable of effectively resisting all kinds of statistical attacks. We applied various tests, including histograms, correlation, and entropy tests, to evaluate the robustness of the presented image cryptosystem against such attacks.</p>
</sec>
<sec id="s6_2_4">
<label>6.2.4</label>
<title>Information Entropy</title>
<p>Entropy is a statistical metric used to quantify the randomness of secret data. It depicts the intensity distribution and unpredictability among the image pixels. An encrypted image with a higher entropy can protect more information when compared to an encrypted image with a lower entropy. The ideal value of entropy for an encrypted image is 8. We computed the entropy of all cipher images shown in <xref ref-type="fig" rid="fig-7">Fig. 7</xref> and the results are depicted in <xref ref-type="table" rid="table-11">Table 11</xref>. It follows that entropy results for images such as the Resolution chart and Chemical plant when ciphered by the new S-box are comparable with images encrypted by the S-box in [<xref ref-type="bibr" rid="ref-68">68</xref>] and are close to the entropy obtained due to the S-box in [<xref ref-type="bibr" rid="ref-41">41</xref>]. Likewise, for encrypted images, Herringbone weave and San diego, entropy results for the current S-box are better than those of the S-box in [<xref ref-type="bibr" rid="ref-68">68</xref>] and are comparable with those of [<xref ref-type="bibr" rid="ref-41">41</xref>]. Consequently, the encryption method using our S-box exhibits stronger resilience to statistical attacks than [<xref ref-type="bibr" rid="ref-68">68</xref>] and achieves comparable resistance with [<xref ref-type="bibr" rid="ref-41">41</xref>].</p>

</sec>
<sec id="s6_2_5">
<label>6.2.5</label>
<title>Correlation Coefficient</title>
<p>The pixels of a plain image are significantly connected to the adjacent pixels. A secure encryption algorithm must generate encrypted images with extremely low inter-pixel correlation between their pixels. Ideally, bring it close to zero so that no information may be obtained by a cryptanalyst. We employed correlation analysis to compute the correlation coefficient in horizontal, diagonal, and vertical directions to examine the pixel correlation in the enciphered images. The outcomes obtained by the correlation test are depicted in <xref ref-type="table" rid="table-11">Table 11</xref>. It follows that correlation results for cipher images of the Resolution chart and Chemical plant along three different dimensions, such as horizontal, diagonal, and vertical, using our presented S-box, are better than results obtained from the S-boxes of [<xref ref-type="bibr" rid="ref-41">41</xref>,<xref ref-type="bibr" rid="ref-68">68</xref>]. Alike, for encrypted images such as Herringbone weave and San diego, correlation results using the new S-box are better than the S-box in [<xref ref-type="bibr" rid="ref-68">68</xref>] and are comparable with the S-box of the scheme [<xref ref-type="bibr" rid="ref-41">41</xref>]. The encryption approach using the newly designed S-box demonstrates stronger resilience to statistical attacks than utilizing the S-boxes in [<xref ref-type="bibr" rid="ref-41">41</xref>,<xref ref-type="bibr" rid="ref-68">68</xref>].</p>

</sec>
<sec id="s6_2_6">
<label>6.2.6</label>
<title>Histogram Analysis</title>
<p>The uniformity of the histogram of encrypted images demonstrates the level of security of an image encryption scheme. An encrypted image with a uniformly distributed histogram can effectively resist statistical attacks. The histograms of the cipher images are exhibited in <xref ref-type="fig" rid="fig-8">Fig. 8</xref>. It is evident that the histograms of the enciphered images generated using our S-box generator in the proposed encryption scheme are uniform. As a result, an improved cryptosystem provides robust security against statistical attacks and successfully passes the histogram analysis.</p>
<fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>(<bold>a</bold>&#x2013;<bold>d</bold>) Histograms of encrypted images in <xref ref-type="fig" rid="fig-7">Fig. 7</xref> (<bold>e&#x2013;h</bold>)</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_73097-fig-8.tif"/>
</fig>
</sec>
<sec id="s6_2_7">
<label>6.2.7</label>
<title>Key Space</title>
<p>The key space refers to the total number of distinct keys that can be utilized during the encryption process. It is important to recognize that the security of a cryptographic system is strongly correlated with the size of its key space. If the key space is large, then the attacker will find it more difficult to break the cryptosystem using a brute-force attack. The S-box algorithm proposed by Hayat et al. [<xref ref-type="bibr" rid="ref-41">41</xref>] has a key space <inline-formula id="ieqn-492"><mml:math id="mml-ieqn-492"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mn>4</mml:mn><mml:mi>&#x03BC;</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula>, and our S-box generator has a key space <inline-formula id="ieqn-493"><mml:math id="mml-ieqn-493"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mn>11</mml:mn><mml:mi>&#x03BC;</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula>. Thus, the encryption algorithm using our S-box generator has strong security against key attacks.</p>
</sec>
<sec id="s6_2_8">
<label>6.2.8</label>
<title>NIST SP 800&#x2013;22 Analysis</title>
<p>To evaluate the randomness and cryptographic robustness of the proposed scheme, after its integration into our S-box generator, the National Institute of Standards and Technology (NIST) Statistical Test Suite (SP 800&#x2013;22) [<xref ref-type="bibr" rid="ref-69">69</xref>] is employed to an arbitrary encrypted image. The NIST test suite is a collection of widely recognized, standardized tests which is used to assess the randomness of binary sequences generated by cryptographic schemes. These metrics ensure that cryptographic algorithms produce outputs that are unpredictable and maintain cryptographic security, thereby preventing statistical inference and pattern-based attacks. The results obtained after successfully applying the NIST test suite are demonstrated in <xref ref-type="table" rid="table-12">Table 12</xref>. The test results indicate that the probability (<inline-formula id="ieqn-494"><mml:math id="mml-ieqn-494"><mml:mi>p</mml:mi></mml:math></inline-formula>-values) of all tests exceed the accepted significance threshold of 0.01, demonstrating that they successfully pass each NIST test suite and achieved good randomness. These consistent <inline-formula id="ieqn-495"><mml:math id="mml-ieqn-495"><mml:mi>p</mml:mi></mml:math></inline-formula>-values verify that the encrypted image meets the criteria of statistical randomness, free from detectable patterns or structural biases, which is essential for cryptography. Therefore, the presented S-box algorithm exhibits strong resistance against statistical and pattern-based attacks, proving highly suitable for securing image data with high randomness.</p>
<table-wrap id="table-12">
<label>Table 12</label>
<caption>
<title>NIST results of <italic>p</italic>-values and proportion for encryption image</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/> </colgroup>
<thead>
<tr>
<th>Test name</th>
<th><italic>p</italic>-value</th>
<th>Proportion</th>
<th>Status</th>
</tr>
</thead>
<tbody>
<tr>
<td>Frequency test</td>
<td>0.721841</td>
<td>1/1</td>
<td>Passed</td>
</tr>
<tr>
<td>Block frequency test</td>
<td>0.036621</td>
<td>1/1</td>
<td>Passed</td>
</tr>
<tr>
<td>Cumulative sums test</td>
<td>0.729901</td>
<td>1/1</td>
<td>Passed</td>
</tr>
<tr>
<td>Runs test</td>
<td>0.758179</td>
<td>1/1</td>
<td>Passed</td>
</tr>
<tr>
<td>Longest runs test</td>
<td>0.185396</td>
<td>1/1</td>
<td>Passed</td>
</tr>
<tr>
<td>Rank test</td>
<td>0.421915</td>
<td>1/1</td>
<td>Passed</td>
</tr>
<tr>
<td>FFT test</td>
<td>0.339897</td>
<td>1/1</td>
<td>Passed</td>
</tr>
<tr>
<td>Universal test</td>
<td>0.644251</td>
<td>1/1</td>
<td>Passed</td>
</tr>
<tr>
<td>Approximate entropy test</td>
<td>0.287377</td>
<td>1/1</td>
<td>Passed</td>
</tr>
<tr>
<td>Seria test</td>
<td>0.521524</td>
<td>1/1</td>
<td>Passed</td>
</tr>
<tr>
<td>Linear complexity test</td>
<td>0.695777</td>
<td>1/1</td>
<td>Passed</td>
</tr>
<tr>
<td>Non-overlapping template test</td>
<td>0.957077</td>
<td>1/1</td>
<td>Passed</td>
</tr>
<tr>
<td>Overlapping template test</td>
<td>0.977911</td>
<td>1/1</td>
<td>Passed</td>
</tr>
<tr>
<td>Random excursions test</td>
<td>0.952105</td>
<td>1/1</td>
<td>Passed</td>
</tr>
<tr>
<td>Random excursions variants test</td>
<td>0.574973</td>
<td>1/1</td>
<td>Passed</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s6_2_9">
<label>6.2.9</label>
<title>Robustness Analyses</title>
<p>To examine the encryption performance of the presented scheme, three fundamental quantitative metrics are utilized in this study: the Peak Signal-to-Noise Ratio (PSNR), the Structural Similarity Index (SSIM), and the Bit Correct Ratio (BCR). The PSNR is a widely used, standard metric for assessing image quality by comparing the original and decrypted images. A higher PSNR value indicates a more precise decryption process and a higher-quality decrypted image, reflecting that the decrypted image is more similar to the original plain image. The PSNR is quantified utilizing the Mean Square Error (MSE) between the original plain and its decrypted image. On the other hand, the SSIM measures the degree of structural information preserved after decryption. It computes visual similarity, contrast, and structural correlation in plain and ciphered images. Likewise, the BCR quantifies decryption accuracy by computing the ratio of accurately retrieved bits to the total number of bits compared between the plain and encrypted images. It offers a numerical measure of decryption accuracy and the overall encryption process. We computed the MSE, PSNR, SSIM, and BCR values for the plain Cameraman image and the corresponding decrypted image, and summarized the results in <xref ref-type="table" rid="table-13">Table 13</xref>. Under the noise-free scenario, it is evident from <xref ref-type="table" rid="table-13">Table 13</xref> that the decrypted image generated using the proposed algorithm is exactly similar to the plain image. As a result, the MSE output is zero, the PSNR outcome approaches <inline-formula id="ieqn-496"><mml:math id="mml-ieqn-496"><mml:mi mathvariant="normal">&#x221E;</mml:mi></mml:math></inline-formula>, and both the SSIM and BCR results are equal to 1. Higher scores for these metrics indicate a more effective encryption process, revealing that negligible data loss occurs during decryption. Hence, the encryption approach, after using our S-box algorithm, removes the visual and structural features of the original plain images.</p>
<table-wrap id="table-13">
<label>Table 13</label>
<caption>
<title>Quantitative evaluation using MSE, PSNR, SSIM, and BCR analysis</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/> </colgroup>
<thead>
<tr>
<th>Name</th>
<th>MSE</th>
<th>PSNR</th>
<th>SSIM</th>
<th>BCR</th>
</tr>
</thead>
<tbody>
<tr>
<td>Cameraman<sub>256&#x00D7;256</sub></td>
<td>0</td>
<td><inline-formula id="ieqn-498"><mml:math id="mml-ieqn-498"><mml:mi mathvariant="normal">&#x221E;</mml:mi></mml:math></inline-formula></td>
<td>1</td>
<td>1</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s6_2_10">
<label>6.2.10</label>
<title>Noise Attack Test</title>
<p>During transmission, some image data may be lost due to noise. An encryption algorithm must possess strong anti-noise properties, maintain security even in noisy transmission scenarios, and ensure reliable image decryption. To evaluate the robustness of the encryption scheme against noise interference, a Cameraman<sub>256&#x00D7;256</sub> test image is chosen. We add Salt-and-pepper noise to the encrypted image at varying noise densities of 0.01, 0.05, 0.1, and 0.2, respectively. The performance of the presented algorithm against a noise attack is illustrated in <xref ref-type="fig" rid="fig-9">Fig. 9</xref>. From <xref ref-type="fig" rid="fig-9">Fig. 9</xref>, we observe that the decrypted images are visually recognizable across distinct noise densities, preserving the essential visual content of the plain images even after sufficient noise is added. This reveals that the generator exhibits strong resilience and high efficiency against noise-based attacks.</p>
<fig id="fig-9">
<label>Figure 9</label>
<caption>
<title>The encrypted Cameraman image with different levels of noise densities: (<bold>a</bold>) 0.01 noise, (<bold>b</bold>) 0.05 noise, (<bold>c</bold>) 0.10 noise, (<bold>d</bold>) 0.20 noise. Corresponding decrypted images of the noisy images in (<bold>a</bold>&#x2013;<bold>d</bold>) are shown in (<bold>e</bold>&#x2013;<bold>h</bold>), respectively</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_73097-fig-9.tif"/>
</fig>
</sec>
<sec id="s6_2_11">
<label>6.2.11</label>
<title>Crop Attack Test</title>
<p>In addition to noise interference, partial data loss may also occur during image transmission over networks. For a reliable encryption scheme, it is necessary to recover as much information as possible from encrypted images even in the presence of such losses. To examine the robustness of the presented scheme under these conditions, the ciphered image of Cameraman<sub>256&#x00D7;256</sub> is cropped at varying rates of 1/16%, 1/8%, 1/4%, and 1/2% of the total pixels, and the resulting cropped images are decrypted. The performance results are demonstrated in <xref ref-type="fig" rid="fig-10">Fig. 10</xref>. It is evident from <xref ref-type="fig" rid="fig-10">Fig. 10</xref> that, even with substantial data loss in the ciphered image, the decrypted images successfully reconstruct the primary visual content of the original image. These findings confirm that the proposed algorithm has strong resistance to cropping attacks, demonstrating its ability to effectively recover key image information even when partial data is missing. These results collectively validate the high security and robustness of the proposed encryption method against data loss attacks.</p>
<fig id="fig-10">
<label>Figure 10</label>
<caption>
<title>The encrypted Cameraman image with different levels of cropings: (<bold>a</bold>) 1/16%, (<bold>b</bold>) 1/8%, (<bold>c</bold>) 1/4%, (<bold>d</bold>) 1/2%. Corresponding decrypted images of data lost images in (<bold>a</bold>&#x2013;<bold>d</bold>) are shown in (<bold>e</bold>&#x2013;<bold>h</bold>), respectively</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_73097-fig-10.tif"/>
</fig>
</sec>
</sec>
</sec>
<sec id="s7">
<label>7</label>
<title>Conclusions</title>
<p>The current work highlights the significance of MECs when combined with fractional transformation in generating dynamic S-boxes. More explicitly, the focus of the new work is to demonstrate an MEC based algorithm, when <inline-formula id="ieqn-501"><mml:math id="mml-ieqn-501"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula> points are generated and combined with the fractional transformation, which efficiently generates a large number of dynamic S-boxes with the required level of security. However, the key outcomes of this study are: (i) The new algorithm needs exactly <inline-formula id="ieqn-502"><mml:math id="mml-ieqn-502"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula> points on the MEC, unlike the existing EC based algorithms, where at least <inline-formula id="ieqn-503"><mml:math id="mml-ieqn-503"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula> points are required to generate an S-box. (ii) One time generation of the said points resulting in a number of new S-boxes faster than other matching schemes. (iii) The scheme is more generalized, as it has significantly large outputs for those primes as well, whereas the comparable schemes do not have a single output. (iv) The empirical results reveal that the current algorithm is highly efficient and secure for the generation of S-boxes. Additionally, we tested the presented scheme by incorporating the newly designed S-box into an existing encryption algorithm. The results of the encrypted images using our newly designed S-box and the S-boxes of [<xref ref-type="bibr" rid="ref-42">42</xref>,<xref ref-type="bibr" rid="ref-68">68</xref>] reveal that the new algorithm is capable of generating S-boxes with comparable performance to existing S-boxes of high nonlinearity in securing image data.</p>
<p>Lastly, the theoretical and experimental analyses exhibit the robustness and potential of the newly designed algorithm. Moreover, the combination of ECs with other algebraic structures leads to a new area of research, developing more efficient and innovative techniques for generating secure dynamic S-boxes with high nonlinearity.</p>
</sec>
</body>
<back>
<ack>
<p>Not applicable.</p>
</ack>
<sec>
<title>Funding Statement</title>
<p>The authors received no specific funding for this study.</p>
</sec>
<sec>
<title>Author Contributions</title>
<p>The authors confirm contribution to the paper as follows: Conceptualization, Umar Hayat and Ikram Ullah; methodology, Umar Hayat, Ikram Ullah and Muhammad Bilal; project management, Umar Hayat; supervision, Umar Hayat; data analysis, Ikram Ullah; data visualization, Muhammad Bilal; software, Muhammad Bilal; writing original draft, Ikram Ullah and Muhammad Bilal; writing and editing final draft, Umar Hayat. All authors reviewed the results and approved the final version of the manuscript.</p>
</sec>
<sec sec-type="data-availability">
<title>Availability of Data and Materials</title>
<p>Not applicable.</p>
</sec>
<sec>
<title>Ethics Approval</title>
<p>Not Applicable.</p>
</sec>
<sec sec-type="COI-statement">
<title>Conflicts of Interest</title>
<p>The authors declare no conflicts of interest to report regarding the present study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Lai</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Akgul</surname> <given-names>A</given-names></string-name>, <string-name><surname>Li</surname> <given-names>C</given-names></string-name>, <string-name><surname>Xu</surname> <given-names>G</given-names></string-name>, <string-name><surname>&#x00C7;avu&#x015F;o&#x011F;lu</surname> <given-names>&#x00DC;</given-names></string-name></person-group>. <article-title>A new chaotic system with multiple attractors: dynamic analysis, circuit realization and S-box design</article-title>. <source>Entropy</source>. <year>2017</year>;<volume>20</volume>(<issue>1</issue>):<fpage>12</fpage>. doi:<pub-id pub-id-type="doi">10.3390/e20010012</pub-id>; <pub-id pub-id-type="pmid">33265101</pub-id></mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ding</surname> <given-names>C</given-names></string-name>, <string-name><surname>Xue</surname> <given-names>R</given-names></string-name></person-group>. <article-title>Signal-sensing dynamic S-box image encryption with 2D Griewank&#x2013;sin map</article-title>. <source>Nonlin Dynam</source>. <year>2023</year>;<volume>111</volume>(<issue>24</issue>):<fpage>22595</fpage>&#x2013;<lpage>620</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11071-023-08985-8</pub-id>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhu</surname> <given-names>D</given-names></string-name>, <string-name><surname>Tong</surname> <given-names>X</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>M</given-names></string-name></person-group>. <article-title>A novel lightweight block encryption algorithm based on combined chaotic system</article-title>. <source>J Inf Secur Appl</source>. <year>2022</year>;<volume>69</volume>(<issue>2</issue>):<fpage>103289</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.jisa.2022.103289</pub-id>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Liu</surname> <given-names>X</given-names></string-name>, <string-name><surname>Tong</surname> <given-names>X</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Efficient high nonlinearity S-box generating algorithm based on third-order nonlinear digital filter</article-title>. <source>Chaos Solitons Fractals</source>. <year>2021</year>;<volume>150</volume>:<fpage>111109</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.chaos.2021.111109</pub-id>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gupta</surname> <given-names>MD</given-names></string-name>, <string-name><surname>Chauhan</surname> <given-names>RK</given-names></string-name></person-group>. <article-title>Secure image encryption scheme using 4D-hyperchaotic systems based reconfigurable pseudo-random number generator and S-box</article-title>. <source>Integration</source>. <year>2021</year>;<volume>81</volume>:<fpage>137</fpage>&#x2013;<lpage>59</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.vlsi.2021.07.002</pub-id>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gao</surname> <given-names>S</given-names></string-name>, <string-name><surname>Wu</surname> <given-names>R</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>X</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Li</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>C</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>A 3D model encryption scheme based on a cascaded chaotic system</article-title>. <source>Signal Process</source>. <year>2023</year>;<volume>202</volume>:<fpage>108745</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.sigpro.2022.108745</pub-id>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Vijayakumar</surname> <given-names>M</given-names></string-name>, <string-name><surname>Ahilan</surname> <given-names>A</given-names></string-name></person-group>. <article-title>An optimized chaotic S-box for real-time image encryption scheme based on 4-dimensional memristive hyperchaotic map</article-title>. <source>Ain Shams Eng J</source>. <year>2024</year>;<volume>2024</volume>:<fpage>102620</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.asej.2023.102620</pub-id>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alexan</surname> <given-names>W</given-names></string-name>, <string-name><surname>El-Damak</surname> <given-names>D</given-names></string-name>, <string-name><surname>Gabr</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Image encryption based on fourier-DNA coding for hyperchaotic chen system, chen-based binary quantization S-box, and variable-base modulo operation</article-title>. <source>IEEE Access</source>. <year>2024</year>;<volume>12</volume>:<fpage>21092</fpage>&#x2013;<lpage>113</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2024.3363018</pub-id>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sani</surname> <given-names>RH</given-names></string-name>, <string-name><surname>Behnia</surname> <given-names>S</given-names></string-name>, <string-name><surname>Ziaei</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Construction of S-box based on chaotic piecewise map: watermark application</article-title>. <source>Multim Tools Appl</source>. <year>2023</year>;<volume>82</volume>(<issue>1</issue>):<fpage>1131</fpage>&#x2013;<lpage>48</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11042-022-13278-0</pub-id>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Brahim</surname> <given-names>AH</given-names></string-name>, <string-name><surname>Pacha</surname> <given-names>AA</given-names></string-name>, <string-name><surname>Said</surname> <given-names>NH</given-names></string-name></person-group>. <article-title>A new image encryption scheme based on a hyperchaotic system &#x0026; multi specific S-boxes</article-title>. <source>Inf Secur J A Glob Perspect</source>. <year>2023</year>;<volume>32</volume>(<issue>2</issue>):<fpage>59</fpage>&#x2013;<lpage>75</lpage>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Tian</surname> <given-names>P</given-names></string-name>, <string-name><surname>Su</surname> <given-names>R</given-names></string-name></person-group>. <article-title>A novel virtual optical image encryption scheme created by combining chaotic S-box with double random phase encoding</article-title>. <source>Sensors</source>. <year>2022</year>;<volume>22</volume>(<issue>14</issue>):<fpage>5325</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s22145325</pub-id>; <pub-id pub-id-type="pmid">35891004</pub-id></mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gan</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Chai</surname> <given-names>X</given-names></string-name>, <string-name><surname>Yuan</surname> <given-names>K</given-names></string-name>, <string-name><surname>Lu</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>A novel image encryption algorithm based on LFT based S-boxes and chaos</article-title>. <source>Multim Tools Applicat</source>. <year>2018</year>;<volume>77</volume>:<fpage>8759</fpage>&#x2013;<lpage>83</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11042-017-4772-0</pub-id>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zghair</surname> <given-names>HK</given-names></string-name>, <string-name><surname>Manaa</surname> <given-names>ME</given-names></string-name>, <string-name><surname>Al-Murieb</surname> <given-names>SSA</given-names></string-name>, <string-name><surname>Abd Al-Razaq</surname> <given-names>FJ</given-names></string-name></person-group>. <article-title>Analysis and description S-box generation for the AES algorithm-a new 3D hyperchaotic system</article-title>. <source>Bull Electr Eng Inform</source>. <year>2023</year>;<volume>12</volume>(<issue>3</issue>):<fpage>1639</fpage>&#x2013;<lpage>47</lpage>. doi:<pub-id pub-id-type="doi">10.11591/eei.v12i3.4824</pub-id>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Khompysh</surname> <given-names>A</given-names></string-name>, <string-name><surname>Kapalova</surname> <given-names>N</given-names></string-name>, <string-name><surname>Algazy</surname> <given-names>K</given-names></string-name>, <string-name><surname>Dyusenbayev</surname> <given-names>D</given-names></string-name>, <string-name><surname>Sakan</surname> <given-names>K</given-names></string-name></person-group>. <article-title>Design of substitution nodes (S-boxes) of a block cipher intended for preliminary encryption of confidential information</article-title>. <source>Cogent Eng</source>. <year>2022</year>;<volume>9</volume>(<issue>1</issue>):<fpage>2080623</fpage>. doi:<pub-id pub-id-type="doi">10.1080/23311916.2022.2080623</pub-id>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gao</surname> <given-names>S</given-names></string-name>, <string-name><surname>Iu</surname> <given-names>HHC</given-names></string-name>, <string-name><surname>Erkan</surname> <given-names>U</given-names></string-name>, <string-name><surname>Simsek</surname> <given-names>C</given-names></string-name>, <string-name><surname>Toktas</surname> <given-names>A</given-names></string-name>, <string-name><surname>Cao</surname> <given-names>Y</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>A 3D memristive cubic map with dual discrete memristors: design, implementation, and application in image encryption</article-title>. <source>IEEE Trans Circuits Syst Video Technol</source>. <year>2025</year>;<volume>35</volume>(<issue>8</issue>):<fpage>7706</fpage>&#x2013;<lpage>18</lpage>. doi:<pub-id pub-id-type="doi">10.1109/tcsvt.2025.3545868</pub-id>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Lai</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Effect of electromagnetic radiation on double-loop neural networks and its application to image encryption</article-title>. <source>Chaos Solit Fract</source>. <year>2025</year>;<volume>194</volume>:<fpage>116208</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.chaos.2025.116208</pub-id>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Aribilola</surname> <given-names>I</given-names></string-name>, <string-name><surname>Lee</surname> <given-names>B</given-names></string-name>, <string-name><surname>Asghar</surname> <given-names>MN</given-names></string-name></person-group>. <article-title>M&#x00F6;bius transformation and permutation based S-box to enhance IoT multimedia security</article-title>. <source>IEEE Access</source>. <year>2024</year>;<volume>12</volume>:<fpage>140792</fpage>&#x2013;<lpage>808</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2024.3466930</pub-id>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bilal</surname> <given-names>M</given-names></string-name>, <string-name><surname>Murtaza</surname> <given-names>G</given-names></string-name>, <string-name><surname>Demir</surname> <given-names>B</given-names></string-name>, <string-name><surname>Bustamante</surname> <given-names>MD</given-names></string-name>, <string-name><surname>Hayat</surname> <given-names>U</given-names></string-name></person-group>. <article-title>An efficient algorithm to generate dynamic substitution-boxes and its applications in image encryption</article-title>. <source>Alex Eng J</source>. <year>2025</year>;<volume>116</volume>:<fpage>214</fpage>&#x2013;<lpage>31</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.aej.2024.11.014</pub-id>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dougherty</surname> <given-names>ST</given-names></string-name>, <string-name><surname>Sahinkaya</surname> <given-names>S</given-names></string-name>, <string-name><surname>Ustun</surname> <given-names>D</given-names></string-name></person-group>. <article-title>A novel method for image encryption using time signature-dependent S-boxes based on latin squares and the playfair system of cryptography</article-title>. <source>Multim Tools Appl</source>. <year>2024</year>;<volume>83</volume>(<issue>2</issue>):<fpage>4167</fpage>&#x2013;<lpage>94</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11042-023-15240-0</pub-id>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hua</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Li</surname> <given-names>J</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Yi</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Design and application of an S-box using complete Latin square</article-title>. <source>Nonlin Dynam</source>. <year>2021</year>;<volume>104</volume>(<issue>1</issue>):<fpage>807</fpage>&#x2013;<lpage>25</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11071-021-06308-3</pub-id>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Abd-El-Atty</surname> <given-names>B</given-names></string-name></person-group>. <article-title>Efficient S-box construction based on quantum-inspired quantum walks with PSO algorithm and its application to image cryptosystem</article-title>. <source>Comp Intell Syst</source>. <year>2023</year>;<volume>9</volume>(<issue>5</issue>):<fpage>4817</fpage>&#x2013;<lpage>35</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s40747-023-00988-7</pub-id>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>J</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>F</given-names></string-name>, <string-name><surname>Ni</surname> <given-names>R</given-names></string-name></person-group>. <article-title>Optical image encryption scheme based on quantum S-box and meaningful ciphertext generation algorithm</article-title>. <source>Opt Commun</source>. <year>2022</year>;<volume>525</volume>:<fpage>128834</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.optcom.2022.128834</pub-id>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gao</surname> <given-names>S</given-names></string-name>, <string-name><surname>Ding</surname> <given-names>S</given-names></string-name>, <string-name><surname>Ho-Ching Iu</surname> <given-names>H</given-names></string-name>, <string-name><surname>Erkan</surname> <given-names>U</given-names></string-name>, <string-name><surname>Toktas</surname> <given-names>A</given-names></string-name>, <string-name><surname>Simsek</surname> <given-names>C</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>A three-dimensional memristor-based hyperchaotic map for pseudorandom number generation and multi-image encryption</article-title>. <source>Chaos Interdiscip J Nonlinear Sci</source>. <year>2025</year>;<volume>35</volume>(<issue>7</issue>):<fpage>073105</fpage>. doi:<pub-id pub-id-type="doi">10.1063/5.0270220</pub-id>; <pub-id pub-id-type="pmid">40591830</pub-id></mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Farah</surname> <given-names>MB</given-names></string-name>, <string-name><surname>Farah</surname> <given-names>A</given-names></string-name>, <string-name><surname>Farah</surname> <given-names>T</given-names></string-name></person-group>. <article-title>An image encryption scheme based on a new hybrid chaotic map and optimized substitution box</article-title>. <source>Nonlin Dynam</source>. <year>2020</year>;<volume>99</volume>(<issue>4</issue>):<fpage>3041</fpage>&#x2013;<lpage>64</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11071-019-05413-8</pub-id>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zamli</surname> <given-names>KZ</given-names></string-name></person-group>. <article-title>Optimizing S-box generation based on the adaptive agent heroes and cowards algorithm</article-title>. <source>Expert Syst Appl</source>. <year>2021</year>;<volume>182</volume>:<fpage>115305</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.eswa.2021.115305</pub-id>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alhadawi</surname> <given-names>HS</given-names></string-name>, <string-name><surname>Ahmad</surname> <given-names>M</given-names></string-name>, <string-name><surname>Salih</surname> <given-names>SQ</given-names></string-name></person-group>. <article-title>A novel bijective substitution box design based on nomadic people optimizer and discrete chaotic map</article-title>. <source>Knowl Based Syst</source>. <year>2025</year>;<volume>325</volume>:<fpage>113977</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.knosys.2025.113977</pub-id>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Artu&#x011F;er</surname> <given-names>F</given-names></string-name></person-group>. <article-title>A new S-box generator algorithm based on 3D chaotic maps and whale optimization algorithm</article-title>. <source>Wirel Pers Commun</source>. <year>2023</year>;<volume>131</volume>(<issue>2</issue>):<fpage>835</fpage>&#x2013;<lpage>53</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11277-023-10456-7</pub-id>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Jawed</surname> <given-names>MS</given-names></string-name>, <string-name><surname>Sajid</surname> <given-names>M</given-names></string-name></person-group>. <article-title>COBLAH: a chaotic OBL initialized hybrid algebraic-heuristic algorithm for optimal S-box construction</article-title>. <source>Comput Stand Interf</source>. <year>2025</year>;<volume>91</volume>:<fpage>103890</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.csi.2024.103890</pub-id>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Qobbi</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Abid</surname> <given-names>A</given-names></string-name>, <string-name><surname>Jarjar</surname> <given-names>M</given-names></string-name>, <string-name><surname>El Kaddouhi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Jarjar</surname> <given-names>A</given-names></string-name>, <string-name><surname>Benazzi</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Adaptation of a genetic operator and a dynamic S-box for chaotic encryption of medical and color images</article-title>. <source>Sci Afr</source>. <year>2023</year>;<volume>19</volume>:<fpage>e01551</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.sciaf.2023.e01551</pub-id>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Miller</surname> <given-names>VS</given-names></string-name></person-group>. <article-title>Use of elliptic curves in cryptography</article-title>. In: <conf-name>Advances in cryptology&#x2014;CRYPTO &#x2018;85 proceedings</conf-name>. <publisher-loc>Berlin/Heidelberg, Germany</publisher-loc>: <publisher-name>Springer</publisher-name>; <year>1985</year>. p. <fpage>417</fpage>&#x2013;<lpage>26</lpage>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Koblitz</surname> <given-names>N</given-names></string-name></person-group>. <source>A course in number theory and cryptography</source>. Vol. <volume>114</volume>. <publisher-loc>Berlin/Heidelberg, Germany</publisher-loc>: <publisher-name>Springer Science &#x0026; Business Media</publisher-name>; <year>1994</year>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Liu</surname> <given-names>H</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Cryptanalyzing an image encryption scheme based on hybrid chaotic system and cyclic elliptic curve</article-title>. <source>Opt Laser Technol</source>. <year>2014</year>;<volume>56</volume>:<fpage>15</fpage>&#x2013;<lpage>9</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.optlastec.2013.07.009</pub-id>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Silva-Garcia</surname> <given-names>VM</given-names></string-name>, <string-name><surname>Flores-Carapia</surname> <given-names>R</given-names></string-name>, <string-name><surname>Gonz&#x00E1;lez-Ram&#x00ED;rez</surname> <given-names>MD</given-names></string-name>, <string-name><surname>Vega-Alvarado</surname> <given-names>E</given-names></string-name>, <string-name><surname>Villarreal-Cervantes</surname> <given-names>MG</given-names></string-name></person-group>. <article-title>Cryptosystem based on the elliptic curve with a high degree of resistance to damage on the encrypted images</article-title>. <source>IEEE Access</source>. <year>2020</year>;<volume>8</volume>:<fpage>218777</fpage>&#x2013;<lpage>92</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2020.3042475</pub-id>.</mixed-citation></ref>
<ref id="ref-34"><label>[34]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>AbdElHaleem</surname> <given-names>SH</given-names></string-name>, <string-name><surname>Abd-El-Hafiz</surname> <given-names>SK</given-names></string-name>, <string-name><surname>Radwan</surname> <given-names>AG</given-names></string-name></person-group>. <article-title>A generalized framework for elliptic curves based PRNG and its utilization in image encryption</article-title>. <source>Sci Rep</source>. <year>2022</year>;<volume>12</volume>(<issue>1</issue>):<fpage>13278</fpage>. doi:<pub-id pub-id-type="doi">10.1038/s41598-022-17045-x</pub-id>; <pub-id pub-id-type="pmid">35918396</pub-id></mixed-citation></ref>
<ref id="ref-35"><label>[35]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pali</surname> <given-names>IA</given-names></string-name>, <string-name><surname>Soomro</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Memon</surname> <given-names>M</given-names></string-name>, <string-name><surname>Maitlo</surname> <given-names>AA</given-names></string-name>, <string-name><surname>Dehraj</surname> <given-names>S</given-names></string-name>, <string-name><surname>Umrani</surname> <given-names>NA</given-names></string-name></person-group>. <article-title>Construction of an S-box using suppersingular elliptic curve over finite field</article-title>. <source>J Hunan Univ Nat Sci</source>. <year>2023</year>;<volume>50</volume>(<issue>7</issue>):<fpage>43</fpage>&#x2013;<lpage>51</lpage>.</mixed-citation></ref>
<ref id="ref-36"><label>[36]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ye</surname> <given-names>G</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>M</given-names></string-name>, <string-name><surname>Wu</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Double image encryption algorithm based on compressive sensing and elliptic curve</article-title>. <source>Alex Eng J</source>. <year>2022</year>;<volume>61</volume>(<issue>9</issue>):<fpage>6785</fpage>&#x2013;<lpage>95</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.aej.2021.12.023</pub-id>.</mixed-citation></ref>
<ref id="ref-37"><label>[37]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hayat</surname> <given-names>U</given-names></string-name>, <string-name><surname>Azam</surname> <given-names>NA</given-names></string-name>, <string-name><surname>Asif</surname> <given-names>M</given-names></string-name></person-group>. <article-title>A method of generating 8 &#x00D7; 8 substitution boxes based on elliptic curves</article-title>. <source>Wirel Pers Commun</source>. <year>2018</year>;<volume>101</volume>(<issue>1</issue>):<fpage>439</fpage>&#x2013;<lpage>51</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11277-018-5698-1</pub-id>.</mixed-citation></ref>
<ref id="ref-38"><label>[38]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hayat</surname> <given-names>U</given-names></string-name>, <string-name><surname>Azam</surname> <given-names>NA</given-names></string-name></person-group>. <article-title>A novel image encryption scheme based on an elliptic curve</article-title>. <source>Signal Process</source>. <year>2019</year>;<volume>155</volume>:<fpage>391</fpage>&#x2013;<lpage>402</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.sigpro.2018.10.011</pub-id>.</mixed-citation></ref>
<ref id="ref-39"><label>[39]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Khan</surname> <given-names>MAM</given-names></string-name>, <string-name><surname>Azam</surname> <given-names>NA</given-names></string-name>, <string-name><surname>Hayat</surname> <given-names>U</given-names></string-name>, <string-name><surname>Kamarulhaili</surname> <given-names>H</given-names></string-name></person-group>. <article-title>A novel deterministic substitution box generator over elliptic curves for real-time applications</article-title>. <source>J King Saud Univ-Comput Inf Sci</source>. <year>2023</year>;<volume>35</volume>(<issue>1</issue>):<fpage>219</fpage>&#x2013;<lpage>36</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.jksuci.2022.11.012</pub-id>.</mixed-citation></ref>
<ref id="ref-40"><label>[40]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ibrahim</surname> <given-names>S</given-names></string-name>, <string-name><surname>Abbas</surname> <given-names>AM</given-names></string-name></person-group>. <article-title>Efficient key-dependent dynamic S-boxes based on permutated elliptic curves</article-title>. <source>Inf Sci</source>. <year>2021</year>;<volume>558</volume>:<fpage>246</fpage>&#x2013;<lpage>64</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.ins.2021.01.014</pub-id>.</mixed-citation></ref>
<ref id="ref-41"><label>[41]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hayat</surname> <given-names>U</given-names></string-name>, <string-name><surname>Ullah</surname> <given-names>I</given-names></string-name>, <string-name><surname>Azam</surname> <given-names>NA</given-names></string-name>, <string-name><surname>Azhar</surname> <given-names>S</given-names></string-name></person-group>. <article-title>A novel image encryption scheme based on elliptic curves over finite rings</article-title>. <source>Entropy</source>. <year>2022</year>;<volume>24</volume>(<issue>5</issue>):<fpage>571</fpage>. doi:<pub-id pub-id-type="doi">10.3390/e24050571</pub-id>; <pub-id pub-id-type="pmid">35626456</pub-id></mixed-citation></ref>
<ref id="ref-42"><label>[42]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ullah</surname> <given-names>I</given-names></string-name>, <string-name><surname>Azam</surname> <given-names>NA</given-names></string-name>, <string-name><surname>Hayat</surname> <given-names>U</given-names></string-name></person-group>. <article-title>Efficient and secure substitution box and random number generators over Mordell elliptic curves</article-title>. <source>J Inf Secur Appl</source>. <year>2021</year>;<volume>56</volume>(<issue>3</issue>):<fpage>102619</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.jisa.2020.102619</pub-id>.</mixed-citation></ref>
<ref id="ref-43"><label>[43]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Azam</surname> <given-names>NA</given-names></string-name>, <string-name><surname>Hayat</surname> <given-names>U</given-names></string-name>, <string-name><surname>Ullah</surname> <given-names>I</given-names></string-name></person-group>. <article-title>Efficient construction of a substitution box based on a Mordell elliptic curve over a finite field</article-title>. <source>Front Inf Technol Electron Eng</source>. <year>2019</year>;<volume>20</volume>(<issue>10</issue>):<fpage>1378</fpage>&#x2013;<lpage>89</lpage>. doi:<pub-id pub-id-type="doi">10.1631/FITEE.1800434</pub-id>.</mixed-citation></ref>
<ref id="ref-44"><label>[44]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Azam</surname> <given-names>NA</given-names></string-name>, <string-name><surname>Hayat</surname> <given-names>U</given-names></string-name>, <string-name><surname>Ullah</surname> <given-names>I</given-names></string-name></person-group>. <article-title>An injective S-box design scheme over an ordered isomorphic elliptic curve and its characterization</article-title>. <source>Secur Commun Netw</source>. <year>2018</year>;<volume>2018</volume>:<fpage>1</fpage>&#x2013;<lpage>9</lpage>.</mixed-citation></ref>
<ref id="ref-45"><label>[45]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Azam</surname> <given-names>NA</given-names></string-name>, <string-name><surname>Hayat</surname> <given-names>U</given-names></string-name>, <string-name><surname>Ayub</surname> <given-names>M</given-names></string-name></person-group>. <article-title>A substitution box generator, its analysis, and applications in image encryption</article-title>. <source>Signal Process</source>. <year>2021</year>;<volume>187</volume>:<fpage>108144</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.sigpro.2021.108144</pub-id>.</mixed-citation></ref>
<ref id="ref-46"><label>[46]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Swamy</surname> <given-names>U</given-names></string-name>, <string-name><surname>Murthy</surname> <given-names>A</given-names></string-name></person-group>. <source>Algebra: abstract and modern</source>. <publisher-loc>Chennai, India</publisher-loc>: <publisher-name>Pearson India</publisher-name>; <year>2012</year>.</mixed-citation></ref>
<ref id="ref-47"><label>[47]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Gallian</surname> <given-names>J</given-names></string-name></person-group>. <source>Contemporary abstract algebra</source>. <publisher-loc>New York, NY, USA</publisher-loc>: <publisher-name>Chapman and Hall/CRC</publisher-name>; <year>2021</year>.</mixed-citation></ref>
<ref id="ref-48"><label>[48]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Washington</surname> <given-names>LC</given-names></string-name></person-group>. <source>Elliptic curves: number theory and cryptography</source>. <publisher-loc>New York, NY, USA</publisher-loc>: <publisher-name>Chapman and Hall/CRC</publisher-name>; <year>2008</year>.</mixed-citation></ref>
<ref id="ref-49"><label>[49]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Beardon</surname> <given-names>AF</given-names></string-name></person-group>. <source>Algebra and geometry</source>. <publisher-loc>Cambridge, UK</publisher-loc>: <publisher-name>Cambridge University Press</publisher-name>; <year>2005</year>.</mixed-citation></ref>
<ref id="ref-50"><label>[50]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Meier</surname> <given-names>W</given-names></string-name>, <string-name><surname>Staffelbach</surname> <given-names>O</given-names></string-name></person-group>. <article-title>Nonlinearity criteria for cryptographic functions</article-title>. In: <conf-name>Workshop on the theory and application of cryptographic techniques</conf-name>. <publisher-loc>Berlin/Heidelberg, Germany</publisher-loc>: <publisher-name>Springer</publisher-name>; <year>1989</year>. p. <fpage>549</fpage>&#x2013;<lpage>62</lpage>. doi:<pub-id pub-id-type="doi">10.1007/3-540-46885-4_53</pub-id>.</mixed-citation></ref>
<ref id="ref-51"><label>[51]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Matsui</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Linear cryptanalysis method for DES cipher</article-title>. In: <conf-name>Workshop on the theory and application of cryptographic techniques</conf-name>. <publisher-loc>Berlin/Heidelberg, Germany</publisher-loc>: <publisher-name>Springer</publisher-name>; <year>1993</year>. p. <fpage>386</fpage>&#x2013;<lpage>97</lpage>. doi:<pub-id pub-id-type="doi">10.1007/3-540-48285-7_33</pub-id>.</mixed-citation></ref>
<ref id="ref-52"><label>[52]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Biham</surname> <given-names>E</given-names></string-name>, <string-name><surname>Shamir</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Differential cryptanalysis of DES-like cryptosystems</article-title>. <source>J Cryptol</source>. <year>1991</year>;<volume>4</volume>(<issue>1</issue>):<fpage>3</fpage>&#x2013;<lpage>72</lpage>. doi:<pub-id pub-id-type="doi">10.1007/bf00630563</pub-id>.</mixed-citation></ref>
<ref id="ref-53"><label>[53]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Webster</surname> <given-names>AF</given-names></string-name>, <string-name><surname>Tavares</surname> <given-names>SE</given-names></string-name></person-group>. <article-title>On the design of S-boxes</article-title>. In: <conf-name>Advances in cryptology&#x2014;CRYPTO &#x2018;85 proceedings</conf-name>. <publisher-loc>Berlin/Heidelberg, Germany</publisher-loc>: <publisher-name>Springer</publisher-name>; <year>1985</year>. p. <fpage>523</fpage>&#x2013;<lpage>34</lpage>.</mixed-citation></ref>
<ref id="ref-54"><label>[54]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Sakall</surname> <given-names>MT</given-names></string-name>, <string-name><surname>Aslan</surname> <given-names>B</given-names></string-name>, <string-name><surname>Bulu&#x015F;</surname> <given-names>E</given-names></string-name>, <string-name><surname>Mesut</surname> <given-names>A&#x015E;</given-names></string-name>, <string-name><surname>B&#x00FC;y&#x00FC;ksara&#x00E7;o&#x011F;lu</surname> <given-names>F</given-names></string-name>, <string-name><surname>Karaahmeto&#x011F;lu</surname> <given-names>O</given-names></string-name></person-group>. <article-title>On the algebraic expression of the AES S-box like S-boxes</article-title>. In: <conf-name>The Second International Conference on Networked Digital Technologies, NDT 2010; 2010 Jul 7&#x2013;9</conf-name>; <publisher-loc>Prague, Czech Republic. Berlin/Heidelberg, Germany</publisher-loc>: <publisher-name>Springer</publisher-name>; <year>2010</year>. p. <fpage>213</fpage>&#x2013;<lpage>27</lpage>.</mixed-citation></ref>
<ref id="ref-55"><label>[55]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>&#x00D6;zkaynak</surname> <given-names>F</given-names></string-name>, <string-name><surname>&#x00C7;elik</surname> <given-names>V</given-names></string-name>, <string-name><surname>&#x00D6;zer</surname> <given-names>AB</given-names></string-name></person-group>. <article-title>A new S-box construction method based on the fractional-order chaotic Chen system</article-title>. <source>Signal Image Video Process</source>. <year>2017</year>;<volume>11</volume>:<fpage>659</fpage>&#x2013;<lpage>64</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11760-016-1007-1</pub-id>.</mixed-citation></ref>
<ref id="ref-56"><label>[56]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wang</surname> <given-names>X</given-names></string-name>, <string-name><surname>&#x00C7;avu&#x015F;o&#x011F;lu</surname> <given-names>&#x00DC;</given-names></string-name>, <string-name><surname>Kacar</surname> <given-names>S</given-names></string-name>, <string-name><surname>Akgul</surname> <given-names>A</given-names></string-name>, <string-name><surname>Pham</surname> <given-names>VT</given-names></string-name>, <string-name><surname>Jafari</surname> <given-names>S</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>S-box based image encryption application using a chaotic system without equilibrium</article-title>. <source>Appl Sci</source>. <year>2019</year>;<volume>9</volume>(<issue>4</issue>):<fpage>781</fpage>. doi:<pub-id pub-id-type="doi">10.3390/app9040781</pub-id>.</mixed-citation></ref>
<ref id="ref-57"><label>[57]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zheng</surname> <given-names>J</given-names></string-name>, <string-name><surname>Zeng</surname> <given-names>Q</given-names></string-name></person-group>. <article-title>An image encryption algorithm using a dynamic S-box and chaotic maps</article-title>. <source>Appl Intell</source>. <year>2022</year>;<volume>52</volume>(<issue>13</issue>):<fpage>15703</fpage>&#x2013;<lpage>17</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s10489-022-03174-3</pub-id>.</mixed-citation></ref>
<ref id="ref-58"><label>[58]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hoseini</surname> <given-names>R</given-names></string-name>, <string-name><surname>Behnia</surname> <given-names>S</given-names></string-name>, <string-name><surname>Sarmady</surname> <given-names>S</given-names></string-name>, <string-name><surname>Fathizadeh</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Construction of dynamical S-boxes based on image encryption approach</article-title>. <source>Soft Comput</source>. <year>2022</year>;<volume>26</volume>(<issue>24</issue>):<fpage>13985</fpage>&#x2013;<lpage>97</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s00500-022-07443-8</pub-id>.</mixed-citation></ref>
<ref id="ref-59"><label>[59]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gautam</surname> <given-names>A</given-names></string-name>, <string-name><surname>Gaba</surname> <given-names>GS</given-names></string-name>, <string-name><surname>Miglani</surname> <given-names>R</given-names></string-name>, <string-name><surname>Pasricha</surname> <given-names>R</given-names></string-name></person-group>. <article-title>Application of chaotic functions for construction of strong substitution boxes</article-title>. <source>Indian J Sci Technol</source>. <year>2015</year>;<volume>8</volume>(<issue>28</issue>):<fpage>1</fpage>&#x2013;<lpage>5</lpage>. doi:<pub-id pub-id-type="doi">10.17485/ijst/2015/v8i28/71759</pub-id>.</mixed-citation></ref>
<ref id="ref-60"><label>[60]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wen</surname> <given-names>H</given-names></string-name>, <string-name><surname>Feng</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Bai</surname> <given-names>C</given-names></string-name>, <string-name><surname>Lin</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>X</given-names></string-name>, <string-name><surname>Feng</surname> <given-names>W</given-names></string-name></person-group>. <article-title>Frequency-domain image encryption based on IWT and 3D S-box</article-title>. <source>Phys Scr</source>. <year>2024</year>;<volume>99</volume>(<issue>5</issue>):<fpage>055254</fpage>. doi:<pub-id pub-id-type="doi">10.1088/1402-4896/ad30ec</pub-id>.</mixed-citation></ref>
<ref id="ref-61"><label>[61]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Haider</surname> <given-names>T</given-names></string-name>, <string-name><surname>Azam</surname> <given-names>NA</given-names></string-name>, <string-name><surname>Hayat</surname> <given-names>U</given-names></string-name></person-group>. <article-title>Substitution box generator with enhanced cryptographic properties and minimal computation time</article-title>. <source>Expert Syst Appl</source>. <year>2024</year>;<volume>241</volume>:<fpage>122779</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.eswa.2023.122779</pub-id>.</mixed-citation></ref>
<ref id="ref-62"><label>[62]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhao</surname> <given-names>M</given-names></string-name>, <string-name><surname>Yuan</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Li</surname> <given-names>L</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>XB</given-names></string-name></person-group>. <article-title>A novel efficient S-box design algorithm based on a new chaotic map and permutation</article-title>. <source>Multim Tools Appl</source>. <year>2024</year>;<volume>83</volume>(<issue>24</issue>):<fpage>64899</fpage>&#x2013;<lpage>918</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11042-023-17720-9</pub-id>.</mixed-citation></ref>
<ref id="ref-63"><label>[63]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhou</surname> <given-names>L</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>H</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>X</given-names></string-name>, <string-name><surname>Yuan</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhu</surname> <given-names>W</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>M</given-names></string-name></person-group>. <article-title>A smart agriculture image protection scheme based on annealing algorithm and affine transformation is optimized for S-box generated by chaos</article-title>. <source>Nonlin Dynam</source>. <year>2025</year>;<volume>113</volume>(<issue>10</issue>):<fpage>12263</fpage>&#x2013;<lpage>87</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11071-024-10677-w</pub-id>.</mixed-citation></ref>
<ref id="ref-64"><label>[64]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Su</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Tong</surname> <given-names>X</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>M</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>Z</given-names></string-name></person-group>. <article-title>A new S-box three-layer optimization method and its application</article-title>. <source>Nonlin Dynam</source>. <year>2023</year>;<volume>111</volume>(<issue>3</issue>):<fpage>2841</fpage>&#x2013;<lpage>67</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11071-022-07956-9</pub-id>.</mixed-citation></ref>
<ref id="ref-65"><label>[65]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dimitrov</surname> <given-names>MM</given-names></string-name></person-group>. <article-title>A framework for fine-grained nonlinearity optimization of Boolean and vectorial Boolean functions</article-title>. <source>IEEE Access</source>. <year>2021</year>;<volume>9</volume>:<fpage>124910</fpage>&#x2013;<lpage>20</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2021.3110761</pub-id>.</mixed-citation></ref>
<ref id="ref-66"><label>[66]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Duong</surname> <given-names>PP</given-names></string-name>, <string-name><surname>Dang</surname> <given-names>TK</given-names></string-name>, <string-name><surname>Hoang</surname> <given-names>TT</given-names></string-name>, <string-name><surname>Pham</surname> <given-names>CK</given-names></string-name></person-group>. <article-title>Compact 8-bit S-boxes based on multiplication in a galois field GF (2<sup>4</sup>)</article-title>. <source>Cryptography</source>. <year>2025</year>;<volume>9</volume>(<issue>2</issue>):<fpage>21</fpage>. doi:<pub-id pub-id-type="doi">10.3390/cryptography9020021</pub-id>.</mixed-citation></ref>
<ref id="ref-67"><label>[67]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Duong</surname> <given-names>PP</given-names></string-name>, <string-name><surname>Pham</surname> <given-names>CK</given-names></string-name></person-group>. <article-title>Constructing 8&#x00D7; 8 S-boxes with optimal boolean function nonlinearity</article-title>. <source>Cryptography</source>. <year>2025</year>;<volume>9</volume>(<issue>4</issue>):<fpage>67</fpage>. doi:<pub-id pub-id-type="doi">10.3390/cryptography9040067</pub-id>.</mixed-citation></ref>
<ref id="ref-68"><label>[68]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pub</surname> <given-names>NF</given-names></string-name></person-group>. <article-title>197: advanced encryption standard (AES)</article-title>. <source>Fed Inf Process Stand Publ</source>. <year>2001</year>;<volume>197</volume>:<fpage>0311</fpage>.</mixed-citation></ref>
<ref id="ref-69"><label>[69]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Rukhin</surname> <given-names>A</given-names></string-name>, <string-name><surname>Soto</surname> <given-names>J</given-names></string-name>, <string-name><surname>Nechvatal</surname> <given-names>J</given-names></string-name>, <string-name><surname>Smid</surname> <given-names>M</given-names></string-name>, <string-name><surname>Barker</surname> <given-names>E</given-names></string-name></person-group>. <source>A statistical test suite for random and pseudorandom number generators for cryptographic applications</source>. <publisher-loc>Gaithersburg, MD, USA</publisher-loc>: <publisher-name>National Institute of Standards and Technology</publisher-name>; <year>2001</year>.</mixed-citation></ref>
</ref-list>
</back></article>