<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">JIHPP</journal-id>
<journal-id journal-id-type="nlm-ta">JIHPP</journal-id>
<journal-id journal-id-type="publisher-id">JIHPP</journal-id>
<journal-title-group>
<journal-title>Journal of Information Hiding and Privacy Protection</journal-title>
</journal-title-group>
<issn pub-type="epub">2637-4226</issn>
<issn pub-type="ppub">2637-4234</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">58954</article-id>
<article-id pub-id-type="doi">10.32604/jihpp.2024.058954</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Hybrid Metaheuristic Lion and Firefly Optimization Algorithm with Chaotic Map for Substitution S-Box Design</article-title>
<alt-title alt-title-type="left-running-head">Hybrid Metaheuristic Lion and Firefly Optimization Algorithm with Chaotic Map for Substitution S-Box Design</alt-title>
<alt-title alt-title-type="right-running-head">Hybrid Metaheuristic Lion and Firefly Optimization Algorithm with Chaotic Map for Substitution S-Box Design</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Sabonchi</surname><given-names>Arkan Kh Shakr</given-names>
</name><email>arkankhaleel@gmail.com</email></contrib>
<aff><institution>Department of Mathematics, Open Educational College, Kirkuk Branch</institution>, <addr-line>Kirkuk, 36001</addr-line>, <country>Iraq</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Arkan Kh Shakr Sabonchi. Email: <email>arkankhaleel@gmail.com</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2024</year></pub-date>
<pub-date date-type="pub" publication-format="electronic">
<day>31</day>
<month>12</month>
<year>2024</year>
</pub-date>
<volume>6</volume>
<issue>1</issue>
<fpage>21</fpage>
<lpage>45</lpage>
<history>
<date date-type="received">
<day>25</day>
<month>9</month>
<year>2024</year>
</date>
<date date-type="accepted">
<day>11</day>
<month>12</month>
<year>2024</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2024 The Author.</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Published by Tech Science Press.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_JIHPP_58954.pdf"></self-uri>
<abstract>
<p>Substitution boxes (S-boxes) are key components of symmetrical cryptosystems, acting as nonlinear substitution functions that hide the relationship between the encrypted text and input key. This confusion mechanism is vital for cryptographic security because it prevents attackers from intercepting the secret key by analyzing the encrypted text. Therefore, the S-box design is essential for the robustness of cryptographic systems, especially for the data encryption standard (DES) and advanced encryption standard (AES). This study focuses on the application of the firefly algorithm (FA) and metaheuristic lion optimization algorithm (LOA), thereby proposing a hybrid approach called the metaheuristic lion firefly (ML-F) algorithm. FA, inspired by the blinking behavior of fireflies, is a relatively new calculation technique that is effective for various optimization problems. However, FA often experiences early convergence, limiting the ability to determine the global optimal solution in complex search areas. To address this problem, the ML-F algorithm was developed by combining the strengths of FA and LOA. This study identifies a research gap in enhancing S-box nonlinearity and resistance to differential attacks, which the proposed ML-F aims to address. The main contributions of this paper are the enhanced cryptographic robustness of the S-boxes developed with ML-F, consistently outperforming those generated by FA and other methods regarding nonlinearity and overall cryptographic properties. The LOA, inspired by the social hunting behavior of lions, uses the collective intelligence of a pride of lions to explore and exploit the search space more effectively. The experimental analysis of this study focused on the main encryption criteria, namely, nonlinearity, the bit independence criterion (BIC), strict avalanche criterion (SAC), differential probability (DP), and maximum expected linear probability (MELP). These criteria ensure that the S-boxes provide robust security against various cryptanalytic attacks. The ML-F algorithm consistently surpassed the FA and other optimization algorithms in generating S-boxes with higher nonlinearity and better overall cryptographic properties. In case of ML-F-based S-boxes, the results indicated a better average nonlinear score and more resistance against several cryptographic attacks for quite a number of criteria. Therefore, they were considered more reliable while dealing with secured encryption. The values generated by the ML-F S-boxes are near ideal in both SAC and BIC, indicating better diffusion properties and consequently, enhanced security. The DP analysis further showed that the ML-F-generated S-boxes are highly resistant to differential attacks, which is a crucial requirement for secure encryption systems.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Firefly algorithm</kwd>
<kwd>substitution boxes</kwd>
<kwd>cryptology</kwd>
<kwd>lion optimization algorithm</kwd>
<kwd>information security</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>Substitution boxes (S-boxes) are crucial components in contemporary cryptographic systems. An S-box functions as a nonlinear transformation, denoted by <inline-formula id="ieqn-1"><mml:math id="mml-ieqn-1"><mml:mi>S</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x003A;</mml:mo><mml:mrow><mml:mtext>GF</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>a</mml:mi></mml:mrow></mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">&#x2192;</mml:mo><mml:mrow><mml:mtext>GF</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>b</mml:mi></mml:mrow></mml:msup><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, or equivalently, as a Boolean function <inline-formula id="ieqn-2"><mml:math id="mml-ieqn-2"><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mi>b</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>. The primary importance of S-boxes in symmetric key algorithms is to obscure the connection between the input key and output code [<xref ref-type="bibr" rid="ref-1">1</xref>,<xref ref-type="bibr" rid="ref-2">2</xref>], thereby playing a critical role in ensuring the security of the algorithm.</p>
<p>Attacks, such as parallel brute forcing and linear cryptanalysis, can break an encoder if the quality of the S-box is inadequate. The DES [<xref ref-type="bibr" rid="ref-3">3</xref>] uses eight 6 &#x00D7; 4 S-boxes that are ultimately weak. The AES, which was introduced in 2000 as a successor to DES, uses an S-box that is resistant to linear and differential cryptographic analyses [<xref ref-type="bibr" rid="ref-4">4</xref>]. However, the use of a static S-box in AES remains unchanged despite significant variations in the input, making the algorithm more predictable and vulnerable to ciphertext-mating attacks [<xref ref-type="bibr" rid="ref-5">5</xref>]. Key-dependent S-boxes offer enhanced security; however, designing systematic methodologies for dynamic S-boxes remains an open challenge, which was partially addressed in [<xref ref-type="bibr" rid="ref-6">6</xref>]. However, large design gaps still exist in developing S-boxes that can balance high nonlinearity with strong resistance to differential attacks, necessitating the investigation of advanced metaheuristic techniques to overcome these limitations [<xref ref-type="bibr" rid="ref-7">7</xref>]. Most previous studies on metaheuristic-based S-box designs, including the use of the FA and other optimization techniques, have shown promising results in improving cryptographic properties; however, they often present limitations. Poor search diversity, particularly early convergence, is a major obstacle to achieving optimum cryptographic robustness. As a typical example, although the FA is effective in performing a search in space, it tends to converge prematurely and hence may yield suboptimal S-box designs with lower nonlinearities and weak resistance to differential attacks. In addition, most previous methods cannot balance exploration and exploitation in a complicated search space, which significantly influences the comprehensive security characteristics of the generated S-boxes. These challenges underscore the application of an advanced approach; hence, the proposed ML-F algorithm combines the strengths of the FA with the LOA for better performance in S-boxes. The motivation for this study is the increased S-box design requirements required for stronger robustness against cryptanalytic attacks in terms of higher nonlinear order and stronger resistance properties. Existing metaheuristics, such as FA have demonstrated potential; however, in practice, early convergence reduces diversity and search capability, compromising their eventual results for optimal cryptographic properties. The proposed ML-F algorithm addresses these shortcomings by combining the strengths of the LOA and FA, enhancing search capabilities, and ensuring more reliable S-box performance for secure encryption systems.</p>
<p>The ideal cryptographic S-box remains elusive and requires a balance between the desired properties [<xref ref-type="bibr" rid="ref-8">8</xref>,<xref ref-type="bibr" rid="ref-9">9</xref>]. There are three major design methodologies [<xref ref-type="bibr" rid="ref-10">10</xref>]: algebraic, random search, and metaheuristic methods. Each method has its advantages and disadvantages. A random search is the simplest method; however, it mostly results in S-boxes with inferior cryptographic properties [<xref ref-type="bibr" rid="ref-11">11</xref>]. Algebraic methods yield S-boxes with improved properties; however, generating large sets of strong S-boxes is difficult [<xref ref-type="bibr" rid="ref-12">12</xref>]. Another approach, metaheuristic algorithms, has been widely studied in S-box design and offers good hardware and software performances. Despite these promising approaches, several difficulties still affect S-box design and analysis [<xref ref-type="bibr" rid="ref-13">13</xref>]. For instance, early convergence and lower search diversity were major drawbacks of previous FA applications, making them unfeasible or ineffective in reaching optimality regarding cryptographic properties [<xref ref-type="bibr" rid="ref-14">14</xref>]. Nature-inspired population-based metaheuristics commonly experience poor balancing of global and local search capabilities, which results in slow convergence and premature entrapment into local optima [<xref ref-type="bibr" rid="ref-15">15</xref>]. The study proposes the ML-F algorithm, which constitutes a hybrid of the LOA and FA necessary for addressing issues. The newly developed ML-F introduces fresh search dynamics instigated by the chaotic exploration behavior of the FA and the structured search capabilities of the LOA for better scalability and performance of the S-box design. This study focuses on developing a new and improved methodology for designing an S-box that will further enhance cryptographic robustness and overcome some of the limitations found in previous metaheuristic approaches. This study outlines a strategy for overcoming two significant issues, early convergence and bounded search diversity, which are traditionally encountered in algorithms such as FA. ML-F combines the superior qualities of the LOA in enhancing features, such as nonlinearity and differential resistance, in the S-box design with those of the FA. S-boxes are relevant to secure encryption systems. Thus, the proposed approach generated S-boxes with the best cryptographic properties, possessing higher resistance against differential and linear cryptanalysis. The remainder of this paper is structured as follows: Related works on metaheuristic-based S-box design are presented in <xref ref-type="sec" rid="s2">Section 2</xref>. In <xref ref-type="sec" rid="s3">Section 3</xref>, a cryptographic criterion essential for a good S-box performance is elaborated. The proposed algorithm-namely, including its structure and several enhancements, is presented in <xref ref-type="sec" rid="s4">Section 4</xref>. <xref ref-type="sec" rid="s5">Section 5</xref> compares the proposed approach with existing approaches, and <xref ref-type="sec" rid="s6">Section 6</xref> analyzes the cryptographic properties of the generated S-boxes. <xref ref-type="sec" rid="s7">Section 7</xref> presents the limitations of the study, and <xref ref-type="sec" rid="s8">Section 8</xref> discusses directions for future research. Finally, conclusions, key findings, and recommendations are presented in <xref ref-type="sec" rid="s9">Section 9</xref>.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Related Works</title>
<p>Numerous studies have explored metaheuristic algorithms for designing S-boxes, emphasizing the effectiveness of generating S-boxes with strong cryptographic properties. Various optimization techniques have been examined to enhance the security of cryptographic systems using robust S-box designs. SA is an optimization algorithm employed to create S-boxes with high nonlinearity and favorable autocorrelation properties [<xref ref-type="bibr" rid="ref-16">16</xref>]. The iterative nature of SA, with accepted solutions based on improvement or calculated probability, improves the S-box characteristics that are crucial for cryptographic security. However, SA has limitations, particularly in terms of execution time and risk of premature convergence. In addition to these cryptographic criteria, recent research has shown that S-boxes without fixed points, reverse fixed points, or short-period rings are stronger and more resistant to certain types of attacks. In [<xref ref-type="bibr" rid="ref-17">17</xref>], methods for generating S-boxes that avoid fixed points and reverse fixed points were discussed. These methods enhance security by eliminating various types of vulnerabilities caused by repetitive or predictable mappings. This study proposes methods for detecting and removing these properties in S-box designs to avoid weaknesses in cryptographic applications. To address these limitations, researchers have explored combinations of optimization techniques with other methods. One study proposed a method that merges ACO with chaos-based techniques to optimize the S-boxes [<xref ref-type="bibr" rid="ref-18">18</xref>]. This approach leverages the ACO&#x2019;s ability to find optimal solutions by incorporating chaos for enhanced randomness and security, generating S-boxes that meet the essential cryptographic criteria. The use of ABC optimization alongside chaotic maps has also been investigated to construct robust S-boxes [<xref ref-type="bibr" rid="ref-19">19</xref>]. This method involves the generation of initial S-boxes using chaotic maps, which are subsequently refined using ABC optimization. This process ensures the creation of dynamic S-boxes with superior cryptographic performance compared with existing techniques. Additionally, FA, inspired by the flashing behavior of fireflies, has been explored for S-box designs. The FA was combined with a discrete chaotic map to improve the search capability and performance [<xref ref-type="bibr" rid="ref-20">20</xref>]. The results demonstrate the effectiveness of this approach in generating S-boxes that satisfy various security criteria, thereby enhancing security in symmetric ciphers. Building on these advancements, another study introduced a method that combined chaotic maps with the MSAA for efficient S-box generation [<xref ref-type="bibr" rid="ref-21">21</xref>]. This approach exhibited superior performance compared with existing methods, reducing the execution time and cost while achieving high cryptographic properties. The potential of the GFA combined with chaos theory has also been explored for designing robust S-boxes [<xref ref-type="bibr" rid="ref-22">22</xref>]. This method was evaluated against various cryptographic criteria, demonstrating its effectiveness in generating S-boxes that satisfy the necessary security requirements. Another study integrated discrete chaotic maps with a CS algorithm to enhance the S-box cryptographic properties [<xref ref-type="bibr" rid="ref-23">23</xref>]. The findings suggest that this combined method improves S-box characteristics, such as nonlinearity. Further advancements include the AAHC for S-box design [<xref ref-type="bibr" rid="ref-24">24</xref>], which dynamically allocates agents and uses a swap operator to refine the solutions, and a multiswarm PSO algorithm with a chaotic tent map for S-box design, which results in superior performance [<xref ref-type="bibr" rid="ref-25">25</xref>]. Finally, 3D chaotic maps combined with the WOA [<xref ref-type="bibr" rid="ref-26">26</xref>] for the S-box design showed better results in terms of execution time and cost, along with superior cryptographic properties, underscoring the need for new techniques to build robust and secure S-boxes. In addition to these algorithmic approaches, other studies have explored broader techniques for synchronization and robustness against uncertainties in chaotic systems, thereby providing useful insights into the design of cryptographic systems that are more stable and resilient. For example, the study of the sliding mode synchronization of multiple chaotic systems under uncertainties and disturbances explored techniques for maintaining system stability in the presence of dynamic variations and disturbances [<xref ref-type="bibr" rid="ref-27">27</xref>]. Such methodologies are relevant to the design of S-boxes in cryptographic systems, which inherently require the satisfaction and conservation of secure and robust properties against disruptions. In contrast, chaotic systems introduce controlled chaos into the ML-F algorithm as one of the key ways of improving exploration and convergence properties with integrated chaotic maps; therefore, the stability issues that are pertinent in classic FA and LOA are mitigated here. This agrees well with the results of research on chaotic system synchronization and allows ML-F to balance exploration and exploitation, enhance the resilience of the S-box, and ensure cryptographic robustness.</p>
</sec>
<sec id="s3">
<label>3</label>
<title>Problem Description</title>
<p>This study addresses the challenge of designing a robust S-box by evaluating it against established cryptographic criteria: bijective property, nonlinearity, SAC, BIC, DP, and MELP [<xref ref-type="bibr" rid="ref-18">18</xref>,<xref ref-type="bibr" rid="ref-28">28</xref>]. While these criteria are standard in the S-box design, achieving an optimal balance across all criteria simultaneously has proven challenging, as numerous studies have prioritized individual properties rather than holistic optimization. A new assumption of this study is the involvement of controlled chaotic dynamics in the optimization process. Traditionally, chaotic maps have been used either independently or alone in the frames of single algorithms, and chaos is introduced directly into the hybrid ML-F algorithm to enhance both the global and local search capabilities in this study [<xref ref-type="bibr" rid="ref-18">18</xref>,<xref ref-type="bibr" rid="ref-28">28</xref>]. Furthermore, it is assumed that the hybridization of the FA-LOA would reduce the limitations observed in the literature for both algorithms, as the former converges prematurely and the latter may fail to balance exploration with exploitation [<xref ref-type="bibr" rid="ref-8">8</xref>&#x2013;<xref ref-type="bibr" rid="ref-10">10</xref>]. In this context, a chaotic mapping-based hybrid FA-LOA can result in more consistent performance in the S-box generated through a set of cryptographic criteria, thus reducing the gaps identified in earlier sections regarding the balanced robust cryptographic S-box [<xref ref-type="bibr" rid="ref-29">29</xref>]. Based on these standards, the S-box design creates a bijective S-box that maximizes nonlinearity and BIC, minimizes the SAC offset value, and reduces the maximum DP and MELP values. Previous studies have often focused on improving a single criterion, such as nonlinearity, with other standards serving primarily as filters for the resulting S-boxes [<xref ref-type="bibr" rid="ref-8">8</xref>&#x2013;<xref ref-type="bibr" rid="ref-10">10</xref>]. However, this study aims to optimize all the criteria using new assumptions integrated into the ML-F algorithm.</p>
<sec id="s3_1">
<label>3.1</label>
<title>Bijective Property</title>
<p>In an <inline-formula id="ieqn-3"><mml:math id="mml-ieqn-3"><mml:mn>8</mml:mn><mml:mo>&#x00D7;</mml:mo><mml:mn>8</mml:mn></mml:math></inline-formula> S-box, the bijective property is satisfied when each input value is uniquely mapped to an output value covering the range of 0&#x2013;255.</p>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Nonlinearity</title>
<p>The nonlinearity of the Boolean function <inline-formula id="ieqn-4"><mml:math id="mml-ieqn-4"><mml:mi>f</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> can be expressed using the Walsh spectrum as follows:
<disp-formula id="eqn-1"><label>(1)</label><mml:math id="mml-eqn-1" display="block"><mml:msub><mml:mrow><mml:mtext mathvariant="script">N</mml:mtext></mml:mrow><mml:mrow><mml:mi>f</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>m</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mi>m</mml:mi></mml:mrow></mml:msup><mml:munder><mml:mo movablelimits="true" form="prefix">max</mml:mo><mml:mrow><mml:mrow><mml:mtext>v</mml:mtext></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:mi>G</mml:mi><mml:mi>F</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msup><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:munder><mml:mspace width="thinmathspace" /><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mi>f</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext>v</mml:mtext></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>The Walsh Spectrum of <inline-formula id="ieqn-5"><mml:math id="mml-ieqn-5"><mml:mi>f</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is defined as:
<disp-formula id="eqn-2"><label>(2)</label><mml:math id="mml-eqn-2" display="block"><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mi>f</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext>v</mml:mtext></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msub><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mrow><mml:mtext>u</mml:mtext></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:mi>G</mml:mi><mml:mi>F</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msup><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:msub><mml:mspace width="thinmathspace" /><mml:mo stretchy="false">(</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mi>f</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext>u</mml:mtext></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2295;</mml:mo><mml:mrow><mml:mtext>u</mml:mtext></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:mrow><mml:mtext>v</mml:mtext></mml:mrow></mml:mrow></mml:msup></mml:math></disp-formula>where <inline-formula id="ieqn-6"><mml:math id="mml-ieqn-6"><mml:mrow><mml:mtext>v</mml:mtext></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:mi>G</mml:mi><mml:mi>F</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msup><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> and <inline-formula id="ieqn-7"><mml:math id="mml-ieqn-7"><mml:mrow><mml:mtext>u</mml:mtext></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:mrow><mml:mtext>v</mml:mtext></mml:mrow></mml:math></inline-formula> denotes the dot product of <inline-formula id="ieqn-8"><mml:math id="mml-ieqn-8"><mml:mrow><mml:mtext>u</mml:mtext></mml:mrow></mml:math></inline-formula> and <inline-formula id="ieqn-9"><mml:math id="mml-ieqn-9"><mml:mrow><mml:mtext>v</mml:mtext></mml:mrow></mml:math></inline-formula>, computed as <inline-formula id="ieqn-10"><mml:math id="mml-ieqn-10"><mml:msub><mml:mi>u</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>&#x2295;</mml:mo><mml:msub><mml:mi>u</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>&#x2295;</mml:mo><mml:mo>&#x22EF;</mml:mo><mml:mo>&#x2295;</mml:mo><mml:msub><mml:mi>u</mml:mi><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mi>v</mml:mi><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>.</p>
</sec>
<sec id="s3_3">
<label>3.3</label>
<title>Strict Avalanche Criterion</title>
<p>SAC, originally proposed by Webster and Tavares [<xref ref-type="bibr" rid="ref-18">18</xref>,<xref ref-type="bibr" rid="ref-28">28</xref>], mandates that each output bit undergoes a 0.5 probability change when a single input bit is complemented. The SAC of the S-box is determined using a dependency matrix. The S-box approximately satisfies the SAC if every element in the matrix is close to the ideal value of 0.5. The SAC offset value was calculated as follows:
<disp-formula id="eqn-3"><label>(3)</label><mml:math id="mml-eqn-3" display="block"><mml:mrow><mml:mi>&#x1D4AE;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>f</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:msup><mml:mi>m</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:mfrac><mml:msub><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2264;</mml:mo><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo>&#x2264;</mml:mo><mml:mi>m</mml:mi></mml:mrow></mml:msub><mml:mspace width="thinmathspace" /><mml:mspace width="thinmathspace" /><mml:mrow><mml:mo>|</mml:mo><mml:mn>0.5</mml:mn><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>f</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>|</mml:mo></mml:mrow></mml:math></disp-formula></p>
</sec>
<sec id="s3_4">
<label>3.4</label>
<title>Bit Independence Criterion</title>
<p>The BIC, which was also proposed by Webster and Tavares [<xref ref-type="bibr" rid="ref-18">18</xref>,<xref ref-type="bibr" rid="ref-28">28</xref>], evaluates the pairwise independence of all avalanche vectors generated by single-bit complements in plain text. For an S-box with Boolean functions <inline-formula id="ieqn-11"><mml:math id="mml-ieqn-11"><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, the BIC is satisfied if the XOR of any two different functions <inline-formula id="ieqn-12"><mml:math id="mml-ieqn-12"><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2295;</mml:mo><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> (for <inline-formula id="ieqn-13"><mml:math id="mml-ieqn-13"><mml:mi>j</mml:mi><mml:mo>&#x2260;</mml:mo><mml:mi>k</mml:mi></mml:math></inline-formula>, <inline-formula id="ieqn-14"><mml:math id="mml-ieqn-14"><mml:mn>1</mml:mn><mml:mo>&#x2264;</mml:mo><mml:mi>j</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi><mml:mo>&#x2264;</mml:mo><mml:mi>m</mml:mi></mml:math></inline-formula>) meets the avalanche criterion and is highly nonlinear.</p>
</sec>
<sec id="s3_5">
<label>3.5</label>
<title>Differential Probability</title>
<p>S-box is a nonlinear component of encryption algorithms. Ideally, it should exhibit differential uniformity to ensure that the input differential maps uniquely onto the output differential. The differential approximation probability is expressed as [<xref ref-type="bibr" rid="ref-30">30</xref>]:
<disp-formula id="eqn-4"><label>(4)</label><mml:math id="mml-eqn-4" display="block"><mml:mi mathvariant="normal">&#x0394;</mml:mi><mml:mi>P</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>&#x03B4;</mml:mi><mml:mi>x</mml:mi><mml:mo stretchy="false">&#x2192;</mml:mo><mml:mi>&#x03B4;</mml:mi><mml:mi>y</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mo>|</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mtext>x</mml:mtext></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mtext>X</mml:mtext></mml:mrow><mml:mo>&#x003A;</mml:mo><mml:mi>S</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext>x</mml:mtext></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2295;</mml:mo><mml:mi>S</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext>x</mml:mtext></mml:mrow><mml:mo>&#x2295;</mml:mo><mml:mi>&#x03B4;</mml:mi><mml:mi>x</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mi>&#x03B4;</mml:mi><mml:mi>y</mml:mi><mml:mo>}</mml:mo></mml:mrow><mml:mo>|</mml:mo></mml:mrow><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msup></mml:mfrac></mml:math></disp-formula>where <inline-formula id="ieqn-15"><mml:math id="mml-ieqn-15"><mml:mi>&#x03B4;</mml:mi><mml:mi>x</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-16"><mml:math id="mml-ieqn-16"><mml:mi>&#x03B4;</mml:mi><mml:mi>y</mml:mi></mml:math></inline-formula> represent the input and output differentials, respectively.</p>
</sec>
<sec id="s3_6">
<label>3.6</label>
<title>Maximum Expected Linear Probability</title>
<p>The MELP quantifies the maximum event imbalance by applying two masks, <inline-formula id="ieqn-17"><mml:math id="mml-ieqn-17"><mml:msub><mml:mrow><mml:mi mathvariant="normal">&#x039B;</mml:mi></mml:mrow><mml:mrow><mml:mi>x</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-18"><mml:math id="mml-ieqn-18"><mml:msub><mml:mrow><mml:mi mathvariant="normal">&#x039B;</mml:mi></mml:mrow><mml:mrow><mml:mi>y</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. The input and output bit parity is determined by the parity matrix [<xref ref-type="bibr" rid="ref-31">31</xref>]. The MELP of an S-box is expressed as:
<disp-formula id="eqn-5"><label>(5)</label><mml:math id="mml-eqn-5" display="block"><mml:mrow><mml:mtext>LP</mml:mtext></mml:mrow><mml:mo>=</mml:mo><mml:munder><mml:mo movablelimits="true" form="prefix">max</mml:mo><mml:mrow><mml:msub><mml:mi mathvariant="normal">&#x039B;</mml:mi><mml:mrow><mml:mi>x</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi mathvariant="normal">&#x039B;</mml:mi><mml:mrow><mml:mi>y</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2260;</mml:mo><mml:mn>0</mml:mn></mml:mrow></mml:munder><mml:mrow><mml:mo>|</mml:mo><mml:mfrac><mml:mrow><mml:mo>|</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mi>x</mml:mi><mml:mo>&#x003A;</mml:mo><mml:mi>x</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:msub><mml:mi mathvariant="normal">&#x039B;</mml:mi><mml:mrow><mml:mi>x</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi>S</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>x</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:msub><mml:mi mathvariant="normal">&#x039B;</mml:mi><mml:mrow><mml:mi>y</mml:mi></mml:mrow></mml:msub><mml:mo>}</mml:mo></mml:mrow><mml:mo>|</mml:mo></mml:mrow><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msup></mml:mfrac><mml:mo>&#x2212;</mml:mo><mml:mn>0.5</mml:mn><mml:mo>|</mml:mo></mml:mrow></mml:math></disp-formula>where <inline-formula id="ieqn-19"><mml:math id="mml-ieqn-19"><mml:mi>X</mml:mi></mml:math></inline-formula> represents the set of all possible inputs and <inline-formula id="ieqn-20"><mml:math id="mml-ieqn-20"><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula> denotes the number of elements in this set.</p>
<p>Based on these standards, the S-box design creates a bijective S-box that maximizes the minimum values of nonlinearity and BIC, minimizes the SAC offset value, and minimizes the maximum values of DP and MELP. In previous studies [<xref ref-type="bibr" rid="ref-32">32</xref>], nonlinearity was often emphasized as the primary improvement goal along with bijectivity, with other standards primarily serving as filters for the resulting S-boxes.</p>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Proposed Algorithms</title>
<p>Owing to the need for robust cryptographic measures, this study extends the design criteria of S-boxes to not only achieve high nonlinearity, potentially up to values, such as 116, but also ensure that there are no fixed points, reverse fixed points, and short-period rings. The fixed points in an S-box and reverse fixed points reduce the unpredictability of secure cryptographic operations. Short-period rings are pairs that, through successive applications of an S-box, quickly transform an input to its original value, and tend to destroy the effectiveness of resistance to these types of cryptanalytic attacks. In the case of ML-F, the algorithm checks and eliminates them through optimization. This algorithm combines chaotic maps and dynamic feedback systems to iteratively update the entries of the S-boxes such that none of the conditions for fixed points or short-period cycles are satisfied, simultaneously ensuring optimum nonlinearity. This approach not only strengthens the security features of the generated S-boxes but also makes them implementable for environments requiring a high degree of cryptographic applicability.</p>
<p>This section provides an overview of the metaheuristic LOA and FA, followed by a detailed introduction to the proposed hybrid ML-F optimization algorithm. Additionally, a discrete chaotic map, which is used to introduce the randomness required in the ML-F hybrid algorithm, is discussed. Finally, methods for generating S-boxes using these algorithms are presented.</p>
<sec id="s4_1">
<label>4.1</label>
<title>Discrete Chaotic Map</title>
<p>Let <inline-formula id="ieqn-21"><mml:math id="mml-ieqn-21"><mml:mi>&#x03C3;</mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>&#x2026;</mml:mo><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> denote a permutation of the set <inline-formula id="ieqn-22"><mml:math id="mml-ieqn-22"><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mi>m</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math></inline-formula>. The permutation <inline-formula id="ieqn-23"><mml:math id="mml-ieqn-23"><mml:msup><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mi>r</mml:mi></mml:mrow></mml:msup><mml:mo>=</mml:mo><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>&#x2026;</mml:mo><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> is the reverse permutation of <inline-formula id="ieqn-24"><mml:math id="mml-ieqn-24"><mml:mi>&#x03C3;</mml:mi></mml:math></inline-formula>. The composition <inline-formula id="ieqn-25"><mml:math id="mml-ieqn-25"><mml:mi>&#x03D5;</mml:mi><mml:mo>=</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo>&#x2218;</mml:mo><mml:mi>&#x03B2;</mml:mi></mml:math></inline-formula> of two permutations <inline-formula id="ieqn-26"><mml:math id="mml-ieqn-26"><mml:mi>&#x03B1;</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-27"><mml:math id="mml-ieqn-27"><mml:mi>&#x03B2;</mml:mi></mml:math></inline-formula> of the same set <inline-formula id="ieqn-28"><mml:math id="mml-ieqn-28"><mml:mi>A</mml:mi></mml:math></inline-formula> is the permutation mapping of each <inline-formula id="ieqn-29"><mml:math id="mml-ieqn-29"><mml:mi>z</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi>A</mml:mi></mml:math></inline-formula> into <inline-formula id="ieqn-30"><mml:math id="mml-ieqn-30"><mml:mi>&#x03D5;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>z</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B2;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>z</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>.
<disp-formula id="eqn-6"><label>(6)</label><mml:math id="mml-eqn-6" display="block"><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:msub><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mn>0</mml:mn><mml:mo>&#x2264;</mml:mo><mml:mi>i</mml:mi><mml:mo>&#x003C;</mml:mo><mml:mi>m</mml:mi></mml:mrow></mml:msub><mml:mspace width="thinmathspace" /><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>m</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>i</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>!</mml:mo></mml:math></disp-formula>where <inline-formula id="ieqn-31"><mml:math id="mml-ieqn-31"><mml:mi>&#x03C3;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-32"><mml:math id="mml-ieqn-32"><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> represents the number of elements of the set <inline-formula id="ieqn-33"><mml:math id="mml-ieqn-33"><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mi>j</mml:mi><mml:mo>&#x003E;</mml:mo><mml:mi>i</mml:mi><mml:mo>&#x2223;</mml:mo><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x003C;</mml:mo><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math></inline-formula>.</p>
<p>The inverse Lehmer code is a bijective function defined as <inline-formula id="ieqn-34"><mml:math id="mml-ieqn-34"><mml:msup><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo>&#x003A;</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mi>m</mml:mi><mml:mo>!</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo fence="false" stretchy="false">}</mml:mo><mml:mo stretchy="false">&#x2192;</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. The one-dimensional discrete chaotic map is defined in [<xref ref-type="bibr" rid="ref-33">33</xref>] as:
<disp-formula id="eqn-7"><label>(7)</label><mml:math id="mml-eqn-7" display="block"><mml:msub><mml:mrow><mml:mtext>Z</mml:mtext></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mtext>Z</mml:mtext></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2218;</mml:mo><mml:mrow><mml:mtext>f</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mrow><mml:mtext>Z</mml:mtext></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mrow><mml:mtext>C</mml:mtext></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula>where <inline-formula id="ieqn-35"><mml:math id="mml-ieqn-35"><mml:msub><mml:mrow><mml:mtext>Z</mml:mtext></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mrow><mml:mtext>C</mml:mtext></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-36"><mml:math id="mml-ieqn-36"><mml:mrow><mml:mtext>f</mml:mtext></mml:mrow><mml:mo>&#x003A;</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">&#x2192;</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. If <inline-formula id="ieqn-37"><mml:math id="mml-ieqn-37"><mml:msub><mml:mi>z</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mtext>Z</mml:mtext></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> and <inline-formula id="ieqn-38"><mml:math id="mml-ieqn-38"><mml:mi>c</mml:mi><mml:mo>=</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext>C</mml:mtext></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, this map can also be expressed as:
<disp-formula id="eqn-8"><label>(8)</label><mml:math id="mml-eqn-8" display="block"><mml:msub><mml:mi>z</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mo>[</mml:mo><mml:msup><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>z</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2218;</mml:mo><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:msup><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>z</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:msup><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:math></disp-formula>where <inline-formula id="ieqn-39"><mml:math id="mml-ieqn-39"><mml:msub><mml:mi>z</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mi>c</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mi>m</mml:mi><mml:mo>!</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math></inline-formula> and <inline-formula id="ieqn-40"><mml:math id="mml-ieqn-40"><mml:mrow><mml:mtext>f</mml:mtext></mml:mrow><mml:mo>&#x003A;</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">&#x2192;</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. A specific instance of a one-dimensional discrete chaotic map was examined in [<xref ref-type="bibr" rid="ref-33">33</xref>], where
<disp-formula id="eqn-9"><label>(9)</label><mml:math id="mml-eqn-9" display="block"><mml:mrow><mml:mtext>f</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mrow><mml:mtext>Z</mml:mtext></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mrow><mml:mtext>C</mml:mtext></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:msup><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mi>&#x03BB;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext>C</mml:mtext></mml:mrow><mml:mo>&#x2218;</mml:mo><mml:msub><mml:mrow><mml:mtext>Z</mml:mtext></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext>C</mml:mtext></mml:mrow><mml:mo>&#x2218;</mml:mo><mml:msub><mml:mrow><mml:mtext>Z</mml:mtext></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mi>r</mml:mi></mml:mrow></mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>Based on [<xref ref-type="bibr" rid="ref-33">33</xref>], we obtained a map <inline-formula id="ieqn-41"><mml:math id="mml-ieqn-41"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msub><mml:mo>&#x003A;</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mi>m</mml:mi><mml:mo>!</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo fence="false" stretchy="false">}</mml:mo><mml:mo stretchy="false">&#x2192;</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mi>m</mml:mi><mml:mo>!</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math></inline-formula> defined by:
<disp-formula id="eqn-10"><label>(10)</label><mml:math id="mml-eqn-10" display="block"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>z</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msup><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mi>z</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2218;</mml:mo><mml:msup><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mi>&#x03BB;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext>C</mml:mtext></mml:mrow><mml:mo>&#x2218;</mml:mo><mml:msup><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo stretchy="false">(</mml:mo><mml:mi>z</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mo stretchy="false">[</mml:mo><mml:mrow><mml:mtext>C</mml:mtext></mml:mrow><mml:mo>&#x2218;</mml:mo><mml:msup><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo stretchy="false">(</mml:mo><mml:mi>z</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:msup><mml:mo stretchy="false">]</mml:mo><mml:mrow><mml:mi>r</mml:mi></mml:mrow></mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>This map can also be expressed as:
<disp-formula id="eqn-11"><label>(11)</label><mml:math id="mml-eqn-11" display="block"><mml:msub><mml:mi>z</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msup><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mi>&#x03BB;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext>C</mml:mtext></mml:mrow><mml:mo>&#x2218;</mml:mo><mml:msub><mml:mrow><mml:mtext>Z</mml:mtext></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext>C</mml:mtext></mml:mrow><mml:mo>&#x2218;</mml:mo><mml:msub><mml:mrow><mml:mtext>Z</mml:mtext></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mi>r</mml:mi></mml:mrow></mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula></p>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Metaheuristic Lion Optimization Algorithm</title>
<p>The LOA is a stochastic metaheuristic approach used to solve optimization problems [<xref ref-type="bibr" rid="ref-34">34</xref>]. Metaheuristic algorithms generate effective solutions at each iteration. LOA begins by randomly generating a population within the solution space. In this context, each solution is referred to as a &#x201C;lion,&#x201D; represented as follows:
<disp-formula id="eqn-12"><label>(12)</label><mml:math id="mml-eqn-12" display="block"><mml:mrow><mml:mtext>L</mml:mtext></mml:mrow><mml:mo>=</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:msub><mml:mi>N</mml:mi><mml:mrow><mml:mi>d</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula></p>
<p>Here, <inline-formula id="ieqn-42"><mml:math id="mml-ieqn-42"><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> represent the positions of individual lions, and <inline-formula id="ieqn-43"><mml:math id="mml-ieqn-43"><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:msub><mml:mi>N</mml:mi><mml:mrow><mml:mi>d</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> denotes the number of dimensions in the search space. A certain fraction <inline-formula id="ieqn-44"><mml:math id="mml-ieqn-44"><mml:mi>P</mml:mi></mml:math></inline-formula> of the population consisted of randomly generated nomadic lions, whereas the remainder consisted of resident lions. The position of each lion, denoted by <inline-formula id="ieqn-45"><mml:math id="mml-ieqn-45"><mml:mrow><mml:mtext mathvariant="bold">y</mml:mtext></mml:mrow></mml:math></inline-formula>, includes <inline-formula id="ieqn-46"><mml:math id="mml-ieqn-46"><mml:mi>n</mml:mi></mml:math></inline-formula> elements <inline-formula id="ieqn-47"><mml:math id="mml-ieqn-47"><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>. This position corresponded to a candidate solution in the search space, and the algorithm evaluated the fitness value of each lion. The fitness function assesses the performance of a candidate solution to the problem at hand. The LOA proceeds through the following steps [<xref ref-type="bibr" rid="ref-35">35</xref>]:</p>
<p><bold>Step 1: Initialization:</bold> The population is generated randomly within the solution space, and the positions of the lions are stored in a matrix. The fitness value of each lion is computed using an objective function, and is then sorted and stored in a matrix as follows:
<disp-formula id="eqn-13"><label>(13)</label><mml:math id="mml-eqn-13" display="block"><mml:mi>g</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext>L</mml:mtext></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mi>g</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:msub><mml:mi>N</mml:mi><mml:mrow><mml:mi>d</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula>where <inline-formula id="ieqn-48"><mml:math id="mml-ieqn-48"><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext mathvariant="bold">L</mml:mtext></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> represents the fitness value and <inline-formula id="ieqn-49"><mml:math id="mml-ieqn-49"><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:msub><mml:mi>N</mml:mi><mml:mrow><mml:mi>d</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> denotes the dimensions of the search space.</p>
<p><bold>Step 2: Mating:</bold> This step involves creating new solutions by combining existing solutions through processes, such as mutation and crossover, with the weaker solutions eliminated to retain the best solutions.</p>
<p><bold>Step 3: Territory Defense:</bold> This step compares the fitness values of the nomadic and resident lions. If a nomadic lion exhibited a better fitness value than a resident lion, then the resident lion was replaced by the nomadic lion.</p>
<p><bold>Step 4: Territory Takeover:</bold> In this step, all resident lions (cubs and males) are sorted based on their fitness values. Weaker males are expelled from pride and become nomads, whereas stronger males remain resident lions.</p>
<p>The LOA is effective for selecting relevant features and enhancing the generalization of classification models.</p>
</sec>
<sec id="s4_3">
<label>4.3</label>
<title>Firefly Optimization Algorithm</title>
<p>The FA is inspired by the behavior of fireflies, particularly their varying light intensity and attraction. The attractiveness of fireflies is determined by their brightness, which is related to their objective function [<xref ref-type="bibr" rid="ref-36">36</xref>]. At a specific location <inline-formula id="ieqn-50"><mml:math id="mml-ieqn-50"><mml:mi>y</mml:mi></mml:math></inline-formula>, the brightness of a firefly is proportional to the value of the objective function <inline-formula id="ieqn-51"><mml:math id="mml-ieqn-51"><mml:mi>h</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>y</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, which is expressed as:
<disp-formula id="eqn-14"><label>(14)</label><mml:math id="mml-eqn-14" display="block"><mml:mi>J</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>y</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x221D;</mml:mo><mml:mi>h</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>y</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula>in the maximization problem. The relative attractiveness <inline-formula id="ieqn-52"><mml:math id="mml-ieqn-52"><mml:mi>&#x03B2;</mml:mi></mml:math></inline-formula> between two fireflies depends on the distance <inline-formula id="ieqn-53"><mml:math id="mml-ieqn-53"><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> between them, where <inline-formula id="ieqn-54"><mml:math id="mml-ieqn-54"><mml:mi>i</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-55"><mml:math id="mml-ieqn-55"><mml:mi>j</mml:mi></mml:math></inline-formula> refer to different fireflies. The intensity of the light decreases with distance because of its absorption by the medium, and the light intensity <inline-formula id="ieqn-56"><mml:math id="mml-ieqn-56"><mml:mi>J</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>d</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> follows the inverse squared law:
<disp-formula id="eqn-15"><label>(15)</label><mml:math id="mml-eqn-15" display="block"><mml:mi>J</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>d</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mfrac><mml:msub><mml:mi>J</mml:mi><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:msup><mml:mi>d</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:mfrac></mml:math></disp-formula>where <inline-formula id="ieqn-57"><mml:math id="mml-ieqn-57"><mml:msub><mml:mi>J</mml:mi><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> denotes the source intensity; <inline-formula id="ieqn-58"><mml:math id="mml-ieqn-58"><mml:mi>d</mml:mi></mml:math></inline-formula> denotes the distance between the source and observer; and <inline-formula id="ieqn-59"><mml:math id="mml-ieqn-59"><mml:mi>&#x03B4;</mml:mi></mml:math></inline-formula> denotes the light absorption coefficient. The light intensity <inline-formula id="ieqn-60"><mml:math id="mml-ieqn-60"><mml:mi>J</mml:mi></mml:math></inline-formula> varies with distance <inline-formula id="ieqn-61"><mml:math id="mml-ieqn-61"><mml:mi>d</mml:mi></mml:math></inline-formula> as follows:
<disp-formula id="eqn-16"><label>(16)</label><mml:math id="mml-eqn-16" display="block"><mml:mi>J</mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mi>J</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:msup><mml:mi>e</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03B4;</mml:mi><mml:mi>d</mml:mi></mml:mrow></mml:msup></mml:math></disp-formula>where <inline-formula id="ieqn-62"><mml:math id="mml-ieqn-62"><mml:msub><mml:mi>J</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> represents the initial intensity, and <inline-formula id="ieqn-63"><mml:math id="mml-ieqn-63"><mml:msup><mml:mi>e</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03B4;</mml:mi><mml:mi>d</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula> represents the combined effects of source intensity and distance. To prevent singularities at <inline-formula id="ieqn-64"><mml:math id="mml-ieqn-64"><mml:mi>d</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>, the term <inline-formula id="ieqn-65"><mml:math id="mml-ieqn-65"><mml:msub><mml:mi>J</mml:mi><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:msup><mml:mi>d</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula> was combined with the effects of absorption and the inverse square law, resulting in the following Gaussian distribution:
<disp-formula id="eqn-17"><label>(17)</label><mml:math id="mml-eqn-17" display="block"><mml:mi>J</mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mi>J</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:msup><mml:mi>e</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03B4;</mml:mi><mml:mrow><mml:msup><mml:mi>d</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:mrow></mml:mrow></mml:msup></mml:math></disp-formula></p>
<p>The attractiveness <inline-formula id="ieqn-66"><mml:math id="mml-ieqn-66"><mml:mi>&#x03B2;</mml:mi></mml:math></inline-formula> of a firefly is proportional to the observed light intensity and is described as:
<disp-formula id="eqn-18"><label>(18)</label><mml:math id="mml-eqn-18" display="block"><mml:mi>&#x03B2;</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:msub><mml:mi>&#x03B2;</mml:mi><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mrow><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:mi>&#x03B4;</mml:mi><mml:msup><mml:mi>d</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:mrow></mml:mfrac></mml:math></disp-formula>where <inline-formula id="ieqn-67"><mml:math id="mml-ieqn-67"><mml:msub><mml:mi>&#x03B2;</mml:mi><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> represents the baseline attractiveness; <inline-formula id="ieqn-68"><mml:math id="mml-ieqn-68"><mml:mi>&#x03B4;</mml:mi></mml:math></inline-formula> represents the light absorption coefficient; and <inline-formula id="ieqn-69"><mml:math id="mml-ieqn-69"><mml:mi>d</mml:mi></mml:math></inline-formula> represents the distance between fireflies. The relationship between attractiveness and distance is further described by:
<disp-formula id="eqn-19"><label>(19)</label><mml:math id="mml-eqn-19" display="block"><mml:mi>&#x03B2;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>d</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:msub><mml:mi>&#x03B2;</mml:mi><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:msup><mml:mi>e</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mi>m</mml:mi></mml:mrow></mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mi>m</mml:mi><mml:mo>&#x2265;</mml:mo><mml:mn>1</mml:mn><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula>with the characteristic length <inline-formula id="ieqn-70"><mml:math id="mml-ieqn-70"><mml:mi>&#x03C4;</mml:mi></mml:math></inline-formula> given by:
<disp-formula id="eqn-20"><label>(20)</label><mml:math id="mml-eqn-20" display="block"><mml:mi>&#x03C4;</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mi>&#x03B4;</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msup><mml:mo stretchy="false">&#x2192;</mml:mo><mml:mn>1</mml:mn><mml:mrow><mml:mtext>&#xA0;as&#xA0;</mml:mtext></mml:mrow><mml:mi>m</mml:mi><mml:mo stretchy="false">&#x2192;</mml:mo><mml:mi mathvariant="normal">&#x221E;</mml:mi></mml:math></disp-formula></p>
<p>The distance between two fireflies is calculated using the Cartesian distance formula:
<disp-formula id="eqn-21"><label>(21)</label><mml:math id="mml-eqn-21" display="block"><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>|</mml:mo><mml:msub><mml:mrow><mml:mtext>Y</mml:mtext></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mrow><mml:mtext>Y</mml:mtext></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>|</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:msqrt><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>k</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>D</mml:mi></mml:mrow></mml:munderover><mml:mspace width="thinmathspace" /><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:msub><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:msqrt></mml:math></disp-formula>where <inline-formula id="ieqn-71"><mml:math id="mml-ieqn-71"><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> denotes the <inline-formula id="ieqn-72"><mml:math id="mml-ieqn-72"><mml:mi>k</mml:mi></mml:math></inline-formula>-th component of the spatial coordinates, and <inline-formula id="ieqn-73"><mml:math id="mml-ieqn-73"><mml:msub><mml:mrow><mml:mtext mathvariant="bold">Y</mml:mtext></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> denotes the position of the <inline-formula id="ieqn-74"><mml:math id="mml-ieqn-74"><mml:mi>i</mml:mi></mml:math></inline-formula>-th firefly.</p>
</sec>
<sec id="s4_4">
<label>4.4</label>
<title>Proposed Hybrid ML-F Optimization Algorithm</title>
<p>In the proposed hybrid ML-F optimization approach, the population was initially generated randomly within the search space. A percentage <inline-formula id="ieqn-75"><mml:math id="mml-ieqn-75"><mml:mi>P</mml:mi></mml:math></inline-formula> of the randomly generated solutions is designated as nomadic lions based on the light intensity <inline-formula id="ieqn-76"><mml:math id="mml-ieqn-76"><mml:mi>I</mml:mi></mml:math></inline-formula> and attractiveness <inline-formula id="ieqn-77"><mml:math id="mml-ieqn-77"><mml:mi>&#x03B2;</mml:mi></mml:math></inline-formula> obtained from the firefly algorithm [<xref ref-type="bibr" rid="ref-37">37</xref>]. The attractiveness of nomadic lions is determined by their brightness, which is related to their objective functions. At a particular location, the brightness of the nomadic lions was selected to maximize the objective. Attractiveness varies with distance, as perceived for other nomadic lions. The remaining randomly generated populations were divided into pride groups. Within each pride, female lions hunt for prey in groups to provide pride. During the hunt, each lion adjusts its position based on its location within the group and its individual positions.</p>
<p>Male lions patrol their territories with pride. To mimic this roaming behavior, randomly selected male residents visited various locations. If a new location is better than the current best, it becomes the new best, allowing weaker nomads to have a higher probability of escaping from less favorable areas. A mating process then occurs, which ensures the survival of lions and allows the exchange of information among the pride members. As male lions matured, they became more aggressive and challenged other males with pride. Defeated males leave pride and become nomadic; if a nomadic male is stronger, it may take over pride by defeating a resident male. This migration behavior includes lions moving from one pride to another, or a resident female becoming nomadic, and <italic>vice versa</italic>.</p>
<p>The algorithm begins by initializing the population and objective function, which is a process that is uniform in both embodiments of the S-box design approach. The initialization process is executed as follows. Every individual lion (S-box) in the swarm is assigned random numbers drawn from the range of 0 to 1. For each lion, 256 random numbers were required and computed as follows:
<disp-formula id="eqn-22"><label>(22)</label><mml:math id="mml-eqn-22" display="block"><mml:msub><mml:mi>Z</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mrow><mml:mtext>U</mml:mtext></mml:mrow><mml:mrow><mml:mo movablelimits="true" form="prefix">max</mml:mo></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mrow><mml:mtext>L</mml:mtext></mml:mrow><mml:mrow><mml:mo movablelimits="true" form="prefix">min</mml:mo></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:mtext>rand</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mtext>L</mml:mtext></mml:mrow><mml:mrow><mml:mo movablelimits="true" form="prefix">min</mml:mo></mml:mrow></mml:msub></mml:math></disp-formula>where <inline-formula id="ieqn-78"><mml:math id="mml-ieqn-78"><mml:msub><mml:mrow><mml:mtext>U</mml:mtext></mml:mrow><mml:mrow><mml:mo movablelimits="true" form="prefix">max</mml:mo></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-79"><mml:math id="mml-ieqn-79"><mml:msub><mml:mrow><mml:mtext>L</mml:mtext></mml:mrow><mml:mrow><mml:mo movablelimits="true" form="prefix">min</mml:mo></mml:mrow></mml:msub></mml:math></inline-formula> represent the upper (1.0) and lower (0.0) bounds, respectively. These generated sequences were converted into integer values within the range <inline-formula id="ieqn-80"><mml:math id="mml-ieqn-80"><mml:mo stretchy="false">[</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>255</mml:mn><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula> using the following equation:
<disp-formula id="eqn-23"><label>(23)</label><mml:math id="mml-eqn-23" display="block"><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mtext>round</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>Z</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x00D7;</mml:mo><mml:mn>255</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula></p>
<p>Here, the swarm size may have values of 15, 20, 25, or 50, with each lion representing an S-box, and <inline-formula id="ieqn-81"><mml:math id="mml-ieqn-81"><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> an element of the S-box. The objective function is defined as follows:</p>
<p><disp-formula id="eqn-24"><label>(24)</label><mml:math id="mml-eqn-24" display="block"><mml:mi>&#x03F5;</mml:mi><mml:mo>=</mml:mo><mml:mn>112</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:mtext>NL</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula>where 112 represents the optimal AES nonlinearity value [<xref ref-type="bibr" rid="ref-38">38</xref>], and NL denotes the nonlinearity function of the lion agent. During each iteration, the S-box with the lowest error value is considered the best agent in terms of fitness. The intensity of the light emitted by each firefly in the swarm is then determined as</p>
<p><disp-formula id="eqn-25"><label>(25)</label><mml:math id="mml-eqn-25" display="block"><mml:mi>I</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:msup><mml:mi>&#x03F5;</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:mrow></mml:mfrac></mml:math></disp-formula>where I and <inline-formula id="ieqn-82"><mml:math id="mml-ieqn-82"><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> denote the S-box and light intensity, respectively.</p>
</sec>
<sec id="s4_5">
<label>4.5</label>
<title>Adaptation</title>
<p>An 8 &#x00D7; 8 S-box can be visualized as a sequence of 256 unique elements. The bijectivity property requires the elements in the S-box to be distinct. However, fireflies generated through swarm operations do not always satisfy this criterion. Thus, the adjustment process for each firefly S-box is as follows:
<list list-type="order">
<list-item>
<p>The entire S-box is thoroughly scanned and duplicate values are identified. The positions of these duplicates are stored in sequence <inline-formula id="ieqn-83"><mml:math id="mml-ieqn-83"><mml:mi>R</mml:mi></mml:math></inline-formula>. All repeated values, except for the first occurrence, are replaced with a placeholder. Missing values in the S-box are identified during the scan.</p></list-item>
<list-item>
<p>The missing values are then sorted randomly and their positions are saved. These sorted values define a new sequence <inline-formula id="ieqn-84"><mml:math id="mml-ieqn-84"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula>.</p></list-item>
<list-item>
<p>Finally, the positions in sequence <inline-formula id="ieqn-85"><mml:math id="mml-ieqn-85"><mml:mi>R</mml:mi></mml:math></inline-formula> are randomly filled with the corresponding values from <inline-formula id="ieqn-86"><mml:math id="mml-ieqn-86"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula>. This ensures that the S-box generated by the Swarm FA is adjusted to satisfy the bijectivity requirement. The overall process for generating an S-box using the FA is illustrated in Algorithm 1, and the process for the ML-F approach is shown in Algorithm 2.</p></list-item>
</list></p>
<fig id="fig-1">
<graphic mimetype="image" mime-subtype="tif" xlink:href="JIHPP_58954-fig-1.tif"/>
</fig>
<fig id="fig-2">
<graphic mimetype="image" mime-subtype="tif" xlink:href="JIHPP_58954-fig-2.tif"/>
</fig>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Evaluation of the Proposed Algorithms</title>
<p>To evaluate the effectiveness of the proposed algorithms, a series of experiments focusing on S-box generation were conducted using different swarm sizes (15, 20, 25, and 50) and iterations (200, 400, and 750) on a system equipped with an Intel (R) Core (TM) i7-8565U CPU operating at 1.80 GHz with 16 GB of RAM, Windows 10, and MATLAB R2013a. Each experiment was repeated 25 times to ensure the reliability.</p>
<p>The performance of swarm intelligence algorithms is highly dependent on the parameter settings, particularly because the focus of this study was to enhance the FA movement strategy. Therefore, the parameters for FA and ML-F were set as follows: <inline-formula id="ieqn-87"><mml:math id="mml-ieqn-87"><mml:msub><mml:mi>&#x03B2;</mml:mi><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>0.1</mml:mn></mml:math></inline-formula>, <inline-formula id="ieqn-88"><mml:math id="mml-ieqn-88"><mml:msub><mml:mi>&#x03B2;</mml:mi><mml:mrow><mml:mo movablelimits="true" form="prefix">min</mml:mo></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>0.1</mml:mn></mml:math></inline-formula>, <inline-formula id="ieqn-89"><mml:math id="mml-ieqn-89"><mml:mi>&#x03B3;</mml:mi><mml:mo>=</mml:mo><mml:mn>1.0</mml:mn></mml:math></inline-formula>, <inline-formula id="ieqn-90"><mml:math id="mml-ieqn-90"><mml:mi>&#x03B1;</mml:mi><mml:mo>=</mml:mo><mml:mn>0.2</mml:mn></mml:math></inline-formula>, and <inline-formula id="ieqn-91"><mml:math id="mml-ieqn-91"><mml:mi>&#x03B4;</mml:mi><mml:mo>=</mml:mo><mml:mn>0.96</mml:mn></mml:math></inline-formula>, in line with the recommendations from previous research [<xref ref-type="bibr" rid="ref-36">36</xref>]. Here is a refined version of the paragraph, aligned with the updated <xref ref-type="table" rid="table-1">Table 1</xref>.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Comparative assessment of FA and ML-F</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th></th>
<th>Experiments setting</th>
<th align="center" colspan="4">Nonlinearity</th>
</tr>
<tr>
<td>Algorithm</td>
<td>Iteration</td>
<td>Swarm size</td>
<td>Best</td>
<td>worst</td>
<td>Average</td>
</tr>
</thead>
<tbody>
<tr>
<td>FA</td>
<td>200</td>
<td>15</td>
<td>118.5</td>
<td>115</td>
<td>116.8</td>
</tr>
<tr>
<td></td>
<td>200</td>
<td>20</td>
<td>119.3</td>
<td>116.2</td>
<td>117.4</td>
</tr>
<tr>
<td></td>
<td>200</td>
<td>25</td>
<td>119.8</td>
<td>117</td>
<td>118.5</td>
</tr>
<tr>
<td></td>
<td>200</td>
<td>50</td>
<td>120</td>
<td>118</td>
<td>119.2</td>
</tr>
<tr>
<td>ML-F</td>
<td>200</td>
<td>15</td>
<td>119</td>
<td>117.5</td>
<td>118</td>
</tr>
<tr>
<td></td>
<td>200</td>
<td>20</td>
<td>120</td>
<td>118.2</td>
<td>119.1</td>
</tr>
<tr>
<td></td>
<td>200</td>
<td>25</td>
<td>120</td>
<td>118.5</td>
<td>119.3</td>
</tr>
<tr>
<td></td>
<td>200</td>
<td>50</td>
<td>120</td>
<td>118.7</td>
<td>119.5</td>
</tr>
<tr>
<td>FA</td>
<td>400</td>
<td>15</td>
<td>118.5</td>
<td>116</td>
<td>117.3</td>
</tr>
<tr>
<td></td>
<td>400</td>
<td>20</td>
<td>119.2</td>
<td>116.8</td>
<td>118.1</td>
</tr>
<tr>
<td></td>
<td>400</td>
<td>25</td>
<td>120</td>
<td>117.5</td>
<td>118.7</td>
</tr>
<tr>
<td></td>
<td>400</td>
<td>50</td>
<td>120</td>
<td>118.5</td>
<td>119.4</td>
</tr>
<tr>
<td>ML-F</td>
<td>400</td>
<td>15</td>
<td>120</td>
<td>118.5</td>
<td>119.2</td>
</tr>
<tr>
<td></td>
<td>400</td>
<td>20</td>
<td>120</td>
<td>119</td>
<td>119.3</td>
</tr>
<tr>
<td></td>
<td>400</td>
<td>25</td>
<td>120</td>
<td>119.2</td>
<td>119.5</td>
</tr>
<tr>
<td></td>
<td>400</td>
<td>50</td>
<td>120</td>
<td>119.5</td>
<td>119.7</td>
</tr>
<tr>
<td>FA</td>
<td>750</td>
<td>15</td>
<td>119</td>
<td>118</td>
<td>118.5</td>
</tr>
<tr>
<td></td>
<td>750</td>
<td>20</td>
<td>119.8</td>
<td>118.2</td>
<td>119</td>
</tr>
<tr>
<td></td>
<td>750</td>
<td>25</td>
<td>120</td>
<td>118.5</td>
<td>119.2</td>
</tr>
<tr>
<td></td>
<td>750</td>
<td>50</td>
<td>120</td>
<td>119.2</td>
<td>119.5</td>
</tr>
<tr>
<td>ML-F</td>
<td>750</td>
<td>15</td>
<td>120</td>
<td>119</td>
<td>119.3</td>
</tr>
<tr>
<td></td>
<td>750</td>
<td>20</td>
<td>120</td>
<td>119.2</td>
<td>119.4</td>
</tr>
<tr>
<td></td>
<td>750</td>
<td>25</td>
<td>120</td>
<td>119.5</td>
<td>119.6</td>
</tr>
<tr>
<td></td>
<td>750</td>
<td>50</td>
<td>120</td>
<td>119.7</td>
<td>119.8</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><xref ref-type="table" rid="table-1">Table 1</xref> illustrates the nonlinearity of the S-boxes constructed using the FA and ML-F for different swarm sizes and iteration counts. The &#x201C;Best Nonlinearity&#x201D; column yields the best nonlinearity in each experiment, the &#x201C;Worst Nonlinearity&#x201D; column yields the lowest value, and the &#x201C;Average Nonlinearity&#x201D; column provides the average of the fitness score over all configurations. At 200 iterations, ML-F outperformed slightly in terms of stability, yielding a higher &#x201C;Worst Nonlinearity&#x201D; and more consistent &#x201C;Average Nonlinearity&#x201D; for different swarm sizes. When the number of iterations was increased to 400 and 750, the difference in performance between ML-F and FA became evident. For example, at 400 iterations with a swarm size of 25, ML-F reached a &#x201C;Best Nonlinearity&#x201D; score of 120, while FA reached only 119.2, which shows the stronger capability of ML-F in achieving high nonlinearity values. Both algorithms improved the nonlinearity with an increase in the swarm size. However, greater scalability was observed with ML-F, which maintained higher nonlinearity values with increased swarm size and iteration count. The best &#x201C;Best Nonlinearity&#x201D; value of ML-F was 120 when the number of iterations was 750 with a swarm size of 50. Furthermore, it maintained a stable and reliable performance through configurations, whereas its &#x201C;Worst Nonlinearity&#x201D; was 119.5. In contrast, a significant drop in the nonlinearity scores for several configurations was observed in the FA. For example, when the number of iterations was 200 and the swarm size was 15, the worst nonlinearity score for FA was 115.0, whereas ML-F had a minimum score of 117.5, which underlines the robustness of ML-F and its lower tendency toward generating weaker S-boxes. The average fitness values confirm the dominance of ML-F: at 400 iterations and a swarm size of 25, ML-F managed to get an &#x201C;Average Nonlinearity&#x201D; of 119.3, against 118.7 obtained by FA. This trend of higher averages in the scores across all iteration counts signifies the capability of ML-F to create S-boxes with consistently better nonlinearity. The best overall results were observed at 750 iterations-run with a swarm size of 50 for ML-F: it achieved a &#x201C;Best Nonlinearity&#x201D; value of 120 and &#x201C;Average Nonlinearity&#x201D; of 119.8. The results in <xref ref-type="table" rid="table-1">Table 1</xref> indicate the advantage that ML-F has over FA in generating better and higher nonlinear S-boxes for different swarm sizes and iterations. The performance of ML-F resulted not only in higher best-case nonlinear scores but also was more resistant to worst-case scenarios. Similarly, its capability of having higher average fitness values while providing scalability with a larger swarm size establishes it as more robust and efficient in cryptographic applications.</p>

<p>The results in <xref ref-type="table" rid="table-2">Tables 2</xref> and <xref ref-type="table" rid="table-3">3</xref> indicate that increasing the swarm size improves the quality of the generated S-box to some extent, although the nonlinearity gains in the FA are modest relative to the required increase in swarm size. By contrast, ML-F exhibited substantial improvements, particularly between 200 and 400 iterations. However, further increasing to 750 iterations did not significantly enhance the best S-box nonlinearity.</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>ML-F generated S-box</title>
</caption>
<table frame="hsides" >
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th></th>
<th>0</th>
<th>1</th>
<th>2</th>
<th>3</th>
<th>4</th>
<th>5</th>
<th>6</th>
<th>7</th>
<th>8</th>
<th>9</th>
<th>A</th>
<th>B</th>
<th>C</th>
<th>D</th>
<th>E</th>
<th>F</th>
</tr>
</thead>
<tbody>
<tr>
<td>0</td>
<td>56</td>
<td>13</td>
<td>46</td>
<td>38</td>
<td>5</td>
<td>254</td>
<td>48</td>
<td>99</td>
<td>137</td>
<td>47</td>
<td>255</td>
<td>184</td>
<td>79</td>
<td>133</td>
<td>185</td>
<td>221</td>
</tr>
<tr>
<td>1</td>
<td>148</td>
<td>100</td>
<td>201</td>
<td>29</td>
<td>11</td>
<td>25</td>
<td>232</td>
<td>51</td>
<td>226</td>
<td>225</td>
<td>44</td>
<td>172</td>
<td>192</td>
<td>166</td>
<td>240</td>
<td>211</td>
</tr>
<tr>
<td>2</td>
<td>178</td>
<td>50</td>
<td>16</td>
<td>37</td>
<td>15</td>
<td>10</td>
<td>151</td>
<td>119</td>
<td>112</td>
<td>98</td>
<td>139</td>
<td>83</td>
<td>165</td>
<td>136</td>
<td>9</td>
<td>209</td>
</tr>
<tr>
<td>3</td>
<td>68</td>
<td>114</td>
<td>42</td>
<td>190</td>
<td>128</td>
<td>131</td>
<td>207</td>
<td>198</td>
<td>71</td>
<td>32</td>
<td>115</td>
<td>143</td>
<td>81</td>
<td>194</td>
<td>22</td>
<td>162</td>
</tr>
<tr>
<td>4</td>
<td>134</td>
<td>89</td>
<td>160</td>
<td>183</td>
<td>101</td>
<td>34</td>
<td>3</td>
<td>118</td>
<td>234</td>
<td>205</td>
<td>90</td>
<td>150</td>
<td>251</td>
<td>247</td>
<td>103</td>
<td>144</td>
</tr>
<tr>
<td>5</td>
<td>20</td>
<td>87</td>
<td>208</td>
<td>159</td>
<td>138</td>
<td>75</td>
<td>176</td>
<td>122</td>
<td>58</td>
<td>253</td>
<td>23</td>
<td>113</td>
<td>7</td>
<td>203</td>
<td>110</td>
<td>39</td>
</tr>
<tr>
<td>6</td>
<td>158</td>
<td>4</td>
<td>250</td>
<td>145</td>
<td>202</td>
<td>239</td>
<td>92</td>
<td>88</td>
<td>212</td>
<td>228</td>
<td>157</td>
<td>214</td>
<td>0</td>
<td>218</td>
<td>84</td>
<td>244</td>
</tr>
<tr>
<td>7</td>
<td>191</td>
<td>252</td>
<td>127</td>
<td>2</td>
<td>65</td>
<td>174</td>
<td>28</td>
<td>245</td>
<td>140</td>
<td>248</td>
<td>72</td>
<td>126</td>
<td>93</td>
<td>171</td>
<td>41</td>
<td>106</td>
</tr>
<tr>
<td>8</td>
<td>86</td>
<td>241</td>
<td>121</td>
<td>102</td>
<td>130</td>
<td>147</td>
<td>141</td>
<td>53</td>
<td>219</td>
<td>210</td>
<td>231</td>
<td>186</td>
<td>197</td>
<td>95</td>
<td>124</td>
<td>146</td>
</tr>
<tr>
<td>9</td>
<td>163</td>
<td>105</td>
<td>217</td>
<td>230</td>
<td>196</td>
<td>187</td>
<td>180</td>
<td>224</td>
<td>57</td>
<td>14</td>
<td>215</td>
<td>109</td>
<td>55</td>
<td>21</td>
<td>66</td>
<td>242</td>
</tr>
<tr>
<td>A</td>
<td>199</td>
<td>30</td>
<td>220</td>
<td>188</td>
<td>246</td>
<td>177</td>
<td>173</td>
<td>96</td>
<td>132</td>
<td>195</td>
<td>164</td>
<td>233</td>
<td>129</td>
<td>170</td>
<td>54</td>
<td>59</td>
</tr>
<tr>
<td>B</td>
<td>236</td>
<td>117</td>
<td>17</td>
<td>216</td>
<td>142</td>
<td>40</td>
<td>204</td>
<td>125</td>
<td>27</td>
<td>235</td>
<td>73</td>
<td>61</td>
<td>237</td>
<td>179</td>
<td>91</td>
<td>31</td>
</tr>
<tr>
<td>C</td>
<td>67</td>
<td>243</td>
<td>175</td>
<td>123</td>
<td>82</td>
<td>26</td>
<td>78</td>
<td>223</td>
<td>193</td>
<td>97</td>
<td>45</td>
<td>213</td>
<td>18</td>
<td>227</td>
<td>152</td>
<td>94</td>
</tr>
<tr>
<td>D</td>
<td>35</td>
<td>108</td>
<td>1</td>
<td>43</td>
<td>60</td>
<td>189</td>
<td>153</td>
<td>238</td>
<td>6</td>
<td>69</td>
<td>182</td>
<td>149</td>
<td>62</td>
<td>111</td>
<td>200</td>
<td>104</td>
</tr>
<tr>
<td>E</td>
<td>169</td>
<td>33</td>
<td>8</td>
<td>63</td>
<td>76</td>
<td>154</td>
<td>120</td>
<td>36</td>
<td>74</td>
<td>116</td>
<td>70</td>
<td>167</td>
<td>19</td>
<td>249</td>
<td>77</td>
<td>155</td>
</tr>
<tr>
<td>F</td>
<td>168</td>
<td>156</td>
<td>229</td>
<td>161</td>
<td>206</td>
<td>85</td>
<td>49</td>
<td>24</td>
<td>52</td>
<td>80</td>
<td>181</td>
<td>64</td>
<td>222</td>
<td>135</td>
<td>12</td>
<td>107</td>
</tr>
</tbody>
</table>
</table-wrap><table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>FA-generated S-box</title>
</caption>
<table frame="hsides">
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th></th>
<th>0</th>
<th>1</th>
<th>2</th>
<th>3</th>
<th>4</th>
<th>5</th>
<th>6</th>
<th>7</th>
<th>8</th>
<th>9</th>
<th>A</th>
<th>B</th>
<th>C</th>
<th>D</th>
<th>E</th>
<th>F</th>
</tr>
</thead>
<tbody>
<tr>
<td>0</td>
<td>248</td>
<td>229</td>
<td>57</td>
<td>38</td>
<td>119</td>
<td>125</td>
<td>253</td>
<td>47</td>
<td>245</td>
<td>101</td>
<td>150</td>
<td>1</td>
<td>42</td>
<td>241</td>
<td>111</td>
<td>31</td>
</tr>
<tr>
<td>1</td>
<td>72</td>
<td>40</td>
<td>60</td>
<td>147</td>
<td>143</td>
<td>243</td>
<td>128</td>
<td>45</td>
<td>26</td>
<td>117</td>
<td>89</td>
<td>172</td>
<td>2</td>
<td>35</td>
<td>151</td>
<td>113</td>
</tr>
<tr>
<td>2</td>
<td>18</td>
<td>233</td>
<td>244</td>
<td>124</td>
<td>184</td>
<td>80</td>
<td>104</td>
<td>83</td>
<td>197</td>
<td>130</td>
<td>62</td>
<td>169</td>
<td>133</td>
<td>78</td>
<td>50</td>
<td>154</td>
</tr>
<tr>
<td>3</td>
<td>212</td>
<td>33</td>
<td>92</td>
<td>0</td>
<td>69</td>
<td>64</td>
<td>171</td>
<td>19</td>
<td>174</td>
<td>165</td>
<td>215</td>
<td>210</td>
<td>191</td>
<td>109</td>
<td>237</td>
<td>252</td>
</tr>
<tr>
<td>4</td>
<td>28</td>
<td>17</td>
<td>73</td>
<td>247</td>
<td>82</td>
<td>123</td>
<td>155</td>
<td>54</td>
<td>163</td>
<td>227</td>
<td>140</td>
<td>238</td>
<td>153</td>
<td>37</td>
<td>5</td>
<td>23</td>
</tr>
<tr>
<td>5</td>
<td>141</td>
<td>142</td>
<td>81</td>
<td>180</td>
<td>193</td>
<td>205</td>
<td>132</td>
<td>114</td>
<td>24</td>
<td>201</td>
<td>99</td>
<td>144</td>
<td>59</td>
<td>77</td>
<td>226</td>
<td>152</td>
</tr>
<tr>
<td>6</td>
<td>84</td>
<td>137</td>
<td>110</td>
<td>159</td>
<td>231</td>
<td>204</td>
<td>12</td>
<td>32</td>
<td>200</td>
<td>202</td>
<td>118</td>
<td>176</td>
<td>126</td>
<td>196</td>
<td>219</td>
<td>129</td>
</tr>
<tr>
<td>7</td>
<td>162</td>
<td>156</td>
<td>103</td>
<td>66</td>
<td>79</td>
<td>239</td>
<td>56</td>
<td>120</td>
<td>65</td>
<td>71</td>
<td>194</td>
<td>254</td>
<td>139</td>
<td>195</td>
<td>70</td>
<td>115</td>
</tr>
<tr>
<td>8</td>
<td>20</td>
<td>179</td>
<td>225</td>
<td>164</td>
<td>68</td>
<td>55</td>
<td>189</td>
<td>29</td>
<td>175</td>
<td>102</td>
<td>9</td>
<td>116</td>
<td>168</td>
<td>76</td>
<td>39</td>
<td>90</td>
</tr>
<tr>
<td>9</td>
<td>138</td>
<td>106</td>
<td>136</td>
<td>105</td>
<td>97</td>
<td>25</td>
<td>230</td>
<td>209</td>
<td>122</td>
<td>107</td>
<td>232</td>
<td>127</td>
<td>88</td>
<td>187</td>
<td>236</td>
<td>178</td>
</tr>
<tr>
<td>A</td>
<td>173</td>
<td>170</td>
<td>135</td>
<td>94</td>
<td>61</td>
<td>27</td>
<td>86</td>
<td>49</td>
<td>44</td>
<td>166</td>
<td>51</td>
<td>206</td>
<td>213</td>
<td>22</td>
<td>30</td>
<td>145</td>
</tr>
<tr>
<td>B</td>
<td>15</td>
<td>199</td>
<td>160</td>
<td>74</td>
<td>10</td>
<td>58</td>
<td>52</td>
<td>207</td>
<td>41</td>
<td>190</td>
<td>177</td>
<td>131</td>
<td>211</td>
<td>217</td>
<td>134</td>
<td>186</td>
</tr>
<tr>
<td>C</td>
<td>34</td>
<td>192</td>
<td>146</td>
<td>75</td>
<td>167</td>
<td>96</td>
<td>158</td>
<td>242</td>
<td>16</td>
<td>149</td>
<td>14</td>
<td>108</td>
<td>183</td>
<td>157</td>
<td>220</td>
<td>95</td>
</tr>
<tr>
<td>D</td>
<td>255</td>
<td>43</td>
<td>4</td>
<td>224</td>
<td>7</td>
<td>100</td>
<td>63</td>
<td>53</td>
<td>214</td>
<td>246</td>
<td>249</td>
<td>98</td>
<td>234</td>
<td>203</td>
<td>208</td>
<td>13</td>
</tr>
<tr>
<td>E</td>
<td>36</td>
<td>198</td>
<td>21</td>
<td>250</td>
<td>67</td>
<td>87</td>
<td>6</td>
<td>121</td>
<td>85</td>
<td>91</td>
<td>228</td>
<td>48</td>
<td>216</td>
<td>3</td>
<td>185</td>
<td>8</td>
</tr>
<tr>
<td>F</td>
<td>181</td>
<td>221</td>
<td>161</td>
<td>112</td>
<td>222</td>
<td>182</td>
<td>235</td>
<td>251</td>
<td>148</td>
<td>46</td>
<td>93</td>
<td>223</td>
<td>240</td>
<td>218</td>
<td>11</td>
<td>188</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s6">
<label>6</label>
<title>Performance Assessment of the Generated S-box</title>
<p>A robust S-box satisfies the criteria described in <xref ref-type="sec" rid="s2">Section 2</xref>. The performances of the S-boxes generated by the two methods were compared with those of other metaheuristic approaches, such as FA, BFO [<xref ref-type="bibr" rid="ref-39">39</xref>], GA [<xref ref-type="bibr" rid="ref-28">28</xref>], ABC [<xref ref-type="bibr" rid="ref-7">7</xref>], TLO [<xref ref-type="bibr" rid="ref-40">40</xref>], LFM [<xref ref-type="bibr" rid="ref-41">41</xref>], SA [<xref ref-type="bibr" rid="ref-42">42</xref>], ACO [<xref ref-type="bibr" rid="ref-18">18</xref>], and CFA [<xref ref-type="bibr" rid="ref-20">20</xref>], which also used nonlinearity as an objective function.</p>
<sec id="s6_1">
<label>6.1</label>
<title>Bijective Property</title>
<p>The S-boxes generated by both methods produced distinct output values ranging from 0 to 255, thereby satisfying the bijectivity requirement.</p>
</sec>
<sec id="s6_2">
<label>6.2</label>
<title>Nonlinearity</title>
<p><xref ref-type="table" rid="table-4">Table 4</xref> presents a comparative analysis of the nonlinearity scores of the eight Boolean functions from the S-boxes generated using the different optimization methods. The ML-F method stands out, consistently achieving higher nonlinearity scores ranging from 108 to 110, with an average score of 108.5, and demonstrating its effectiveness in producing robust S-boxes with superior cryptographic properties.</p>
<table-wrap id="table-4">
<label>Table 4</label>
<caption>
<title>Results of the nonlinearity analysis conducted on S-boxes</title>
</caption>
<table frame="hsides">
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Methods</th>
<th>N1</th>
<th>N2</th>
<th>N3</th>
<th>N4</th>
<th>N5</th>
<th>N6</th>
<th>N7</th>
<th>N8</th>
<th>Min</th>
<th>Avg</th>
</tr>
</thead>
<tbody>
<tr>
<td><bold>ML-F</bold></td>
<td>108</td>
<td>108</td>
<td>108</td>
<td>110</td>
<td>110</td>
<td>108</td>
<td>108</td>
<td>108</td>
<td>108</td>
<td>108.5</td>
</tr>
<tr>
<td><bold>FA</bold></td>
<td>104</td>
<td>104</td>
<td>106</td>
<td>106</td>
<td>106</td>
<td>100</td>
<td>108</td>
<td>108</td>
<td>100</td>
<td>105.25</td>
</tr>
<tr>
<td><bold>SA</bold></td>
<td>105</td>
<td>105</td>
<td>105</td>
<td>104</td>
<td>106</td>
<td>106</td>
<td>106</td>
<td>104</td>
<td>105</td>
<td>105.5</td>
</tr>
<tr>
<td><bold>GA</bold></td>
<td>107</td>
<td>107</td>
<td>107</td>
<td>107</td>
<td>107</td>
<td>108</td>
<td>108</td>
<td>108</td>
<td>107</td>
<td>107.1667</td>
</tr>
<tr>
<td><bold>ABC</bold></td>
<td>107</td>
<td>107</td>
<td>107</td>
<td>107</td>
<td>106</td>
<td>108</td>
<td>110</td>
<td>108</td>
<td>106</td>
<td>107.4286</td>
</tr>
<tr>
<td><bold>TLO</bold></td>
<td>108</td>
<td>107</td>
<td>107</td>
<td>108</td>
<td>106</td>
<td>107</td>
<td>105</td>
<td>107</td>
<td>105</td>
<td>107</td>
</tr>
<tr>
<td><bold>LFM</bold></td>
<td>105</td>
<td>104</td>
<td>107</td>
<td>106</td>
<td>102</td>
<td>106</td>
<td>102</td>
<td>104</td>
<td>102</td>
<td>104.4</td>
</tr>
<tr>
<td><bold>BFO</bold></td>
<td>107</td>
<td>107</td>
<td>110</td>
<td>110</td>
<td>108</td>
<td>108</td>
<td>107</td>
<td>107</td>
<td>107</td>
<td>107.6667</td>
</tr>
<tr>
<td><bold>ACO</bold></td>
<td>106</td>
<td>106</td>
<td>106</td>
<td>106</td>
<td>106</td>
<td>108</td>
<td>106</td>
<td>110</td>
<td>106</td>
<td>107.5</td>
</tr>
<tr>
<td><bold>CFA</bold></td>
<td>107</td>
<td>107</td>
<td>107</td>
<td>107</td>
<td>108</td>
<td>108</td>
<td>106</td>
<td>107</td>
<td>107</td>
<td>107.1667</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>In contrast, FA generated nonlinearity scores within the range of 100&#x2013;108, with a mean of 105.25, indicating less consistency and effectiveness than ML-F. Other methods, such as SA, GA, ABC, TLO, and BFO, can generate S-boxes whose average nonlinearity scores lie in the range of 105&#x2013;107.66. However, none of them generated consistency or a higher performance than that generated by ML-F. ACO and CFA also produced respectable results, with an average of approximately 107.16. However, neither outperformed the above-mentioned ML-F in terms of consistency and nonlinearity. Among them, the ML-F method achieved the best performance and was the most effective method for generating S-boxes with high and consistent nonlinearity values.</p>
</sec>
<sec id="s6_3">
<label>6.3</label>
<title>Strict Avalanche Criterion</title>
<p>SAC is a critical measure for assessing the robustness of an S-box and is represented by a dependency matrix. <xref ref-type="table" rid="table-5">Table 5</xref> lists the SAC values for the S-box generated using the ML-F method, and <xref ref-type="table" rid="table-6">Table 6</xref> lists the SAC values for the S-box generated using the FA method. The mean SAC values for the S-boxes generated by ML-F and FA were 0.496 and 0.493, respectively, both close to the ideal value of 0.5. This indicates the good diffusion properties of the generated S-boxes. <xref ref-type="table" rid="table-7">Table 7</xref> compares the SAC results obtained using different methods. The dependency matrix offset values for the S-boxes generated by ML-F and FA were 0.03048 and 0.02837, respectively. These results indicate that both ML-F and FA produced S-boxes with acceptable SAC properties, with ML-F showing a slight edge closer to the ideal SAC values.</p>
<table-wrap id="table-5">
<label>Table 5</label>
<caption>
<title>SAC values of the S-box generated by ML-F</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<tbody>
<tr>
<td>0.5243</td>
<td>0.3654</td>
<td>0.4321</td>
<td>0.5222</td>
<td>0.3865</td>
<td>0.4999</td>
<td>0.5878</td>
<td>0.4746</td>
</tr>
<tr>
<td>0.4502</td>
<td>0.5321</td>
<td>0.5043</td>
<td>0.5823</td>
<td>0.3698</td>
<td>0.5257</td>
<td>0.4109</td>
<td>0.5932</td>
</tr>
<tr>
<td>0.5456</td>
<td>0.3598</td>
<td>0.4345</td>
<td>0.5643</td>
<td>0.3967</td>
<td>0.5001</td>
<td>0.5623</td>
<td>0.4219</td>
</tr>
<tr>
<td>0.5751</td>
<td>0.4867</td>
<td>0.3754</td>
<td>0.5893</td>
<td>0.4234</td>
<td>0.5556</td>
<td>0.3987</td>
<td>0.5611</td>
</tr>
<tr>
<td>0.4983</td>
<td>0.5221</td>
<td>0.5678</td>
<td>0.5467</td>
<td>0.3887</td>
<td>0.4765</td>
<td>0.5789</td>
<td>0.5087</td>
</tr>
<tr>
<td>0.5176</td>
<td>0.4456</td>
<td>0.5098</td>
<td>0.5567</td>
<td>0.3823</td>
<td>0.4798</td>
<td>0.5800</td>
<td>0.5298</td>
</tr>
<tr>
<td>0.5334</td>
<td>0.4698</td>
<td>0.5887</td>
<td>0.5123</td>
<td>0.4156</td>
<td>0.5333</td>
<td>0.4422</td>
<td>0.4778</td>
</tr>
<tr>
<td>0.4578</td>
<td>0.5134</td>
<td>0.5798</td>
<td>0.4656</td>
<td>0.4333</td>
<td>0.5223</td>
<td>0.5478</td>
<td>0.4989</td>
</tr>
</tbody>
</table>
</table-wrap><table-wrap id="table-6">
<label>Table 6</label>
<caption>
<title>SAC values of the S-box generated by FA</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<tbody>
<tr>
<td>0.5432</td>
<td>0.5123</td>
<td>0.4476</td>
<td>0.5098</td>
<td>0.4812</td>
<td>0.4654</td>
<td>0.4789</td>
<td>0.5276</td>
</tr>
<tr>
<td>0.4365</td>
<td>0.5623</td>
<td>0.4654</td>
<td>0.5967</td>
<td>0.5432</td>
<td>0.4876</td>
<td>0.5432</td>
<td>0.4876</td>
</tr>
<tr>
<td>0.5532</td>
<td>0.5843</td>
<td>0.5123</td>
<td>0.4476</td>
<td>0.5123</td>
<td>0.5123</td>
<td>0.5123</td>
<td>0.4956</td>
</tr>
<tr>
<td>0.4956</td>
<td>0.4789</td>
<td>0.4956</td>
<td>0.4789</td>
<td>0.4789</td>
<td>0.4789</td>
<td>0.5532</td>
<td>0.4789</td>
</tr>
<tr>
<td>0.5532</td>
<td>0.5532</td>
<td>0.5123</td>
<td>0.5123</td>
<td>0.4789</td>
<td>0.5432</td>
<td>0.5432</td>
<td>0.5276</td>
</tr>
<tr>
<td>0.5432</td>
<td>0.5432</td>
<td>0.4476</td>
<td>0.5123</td>
<td>0.5276</td>
<td>0.4654</td>
<td>0.4812</td>
<td>0.4812</td>
</tr>
<tr>
<td>0.5123</td>
<td>0.5432</td>
<td>0.5276</td>
<td>0.4476</td>
<td>0.5276</td>
<td>0.4789</td>
<td>0.4789</td>
<td>0.4956</td>
</tr>
<tr>
<td>0.4365</td>
<td>0.5276</td>
<td>0.5123</td>
<td>0.5123</td>
<td>0.5276</td>
<td>0.5123</td>
<td>0.4956</td>
<td>0.5432</td>
</tr>
</tbody>
</table>
</table-wrap><table-wrap id="table-7">
<label>Table 7</label>
<caption>
<title>Comparison of SAC results</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Methods</th>
<th>Avg.</th>
<th>Offset</th>
</tr>
</thead>
<tbody>
<tr>
<td><bold>ML-F</bold></td>
<td>0.496</td>
<td>0.03048</td>
</tr>
<tr>
<td><bold>FA</bold></td>
<td>0.493</td>
<td>0.02837</td>
</tr>
<tr>
<td><bold>SA</bold></td>
<td>0.496</td>
<td>0.03183</td>
</tr>
<tr>
<td><bold>GA</bold></td>
<td>0.503</td>
<td>0.03232</td>
</tr>
<tr>
<td><bold>ABC</bold></td>
<td>0.502</td>
<td>0.02821</td>
</tr>
<tr>
<td><bold>TLO</bold></td>
<td>0.494</td>
<td>0.03187</td>
</tr>
<tr>
<td><bold>LFM</bold></td>
<td>0.497</td>
<td>0.03165</td>
</tr>
<tr>
<td><bold>BFO</bold></td>
<td>0.505</td>
<td>0.03171</td>
</tr>
<tr>
<td><bold>ACO</bold></td>
<td>0.502</td>
<td>0.02829</td>
</tr>
<tr>
<td><bold>CFA</bold></td>
<td>0.493</td>
<td>0.03671</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s6_4">
<label>6.4</label>
<title>Output Bits Independence Criterion</title>
<p>The BIC results for the S-boxes generated using the two methods are listed in <xref ref-type="table" rid="table-8">Tables 8</xref> and <xref ref-type="table" rid="table-9">9</xref>. The minimum BIC nonlinearity scores were 97 and 101 for the ML-F-based and FA-based S-boxes, respectively. <xref ref-type="table" rid="table-10">Table 10</xref> presents a comparison of the BIC results with those of previous studies. The average BIC nonlinearity for the ML-F-based S-box is 103.25, which outperforms those obtained from methods, such as the GA and ABC, although it is slightly lower than that obtained by the S-box from the FA, which had an average of 104.05. This implies that, whereas ML-F performed well in this area, FA produced slightly better results with regard to BIC nonlinearity.</p>
<table-wrap id="table-8">
<label>Table 8</label>
<caption>
<title>BIC and nonlinearity of S-boxes produced by ML-F</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<tbody>
<tr>
<td>&#x2013;</td>
<td>102</td>
<td>104</td>
<td>107</td>
<td>103</td>
<td>102</td>
<td>105</td>
<td>104</td>
</tr>
<tr>
<td>100</td>
<td>&#x2013;</td>
<td>107</td>
<td>108</td>
<td>100</td>
<td>105</td>
<td>109</td>
<td>106</td>
</tr>
<tr>
<td>102</td>
<td>104</td>
<td>&#x2013;</td>
<td>108</td>
<td>102</td>
<td>106</td>
<td>107</td>
<td>108</td>
</tr>
<tr>
<td>107</td>
<td>107</td>
<td>108</td>
<td>&#x2013;</td>
<td>98</td>
<td>107</td>
<td>99</td>
<td>106</td>
</tr>
<tr>
<td>105</td>
<td>99</td>
<td>102</td>
<td>97</td>
<td>&#x2013;</td>
<td>109</td>
<td>107</td>
<td>104</td>
</tr>
<tr>
<td>100</td>
<td>106</td>
<td>105</td>
<td>105</td>
<td>109</td>
<td>&#x2013;</td>
<td>108</td>
<td>102</td>
</tr>
<tr>
<td>106</td>
<td>106</td>
<td>104</td>
<td>99</td>
<td>107</td>
<td>105</td>
<td>&#x2013;</td>
<td>101</td>
</tr>
<tr>
<td>104</td>
<td>105</td>
<td>108</td>
<td>104</td>
<td>106</td>
<td>104</td>
<td>102</td>
<td>&#x2013;</td>
</tr>
</tbody>
</table>
</table-wrap><table-wrap id="table-9">
<label>Table 9</label>
<caption>
<title>Nonlinearity and BIC of the S-box produced by FA</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<tbody>
<tr>
<td>&#x2013;</td>
<td>109</td>
<td>104</td>
<td>107</td>
<td>108</td>
<td>101</td>
<td>109</td>
<td>105</td>
</tr>
<tr>
<td>109</td>
<td>&#x2013;</td>
<td>107</td>
<td>107</td>
<td>105</td>
<td>101</td>
<td>106</td>
<td>101</td>
</tr>
<tr>
<td>106</td>
<td>105</td>
<td>&#x2013;</td>
<td>101</td>
<td>103</td>
<td>107</td>
<td>103</td>
<td>109</td>
</tr>
<tr>
<td>106</td>
<td>104</td>
<td>103</td>
<td>&#x2013;</td>
<td>108</td>
<td>100</td>
<td>107</td>
<td>105</td>
</tr>
<tr>
<td>107</td>
<td>108</td>
<td>100</td>
<td>104</td>
<td>&#x2013;</td>
<td>109</td>
<td>108</td>
<td>106</td>
</tr>
<tr>
<td>101</td>
<td>103</td>
<td>104</td>
<td>102</td>
<td>107</td>
<td>&#x2013;</td>
<td>103</td>
<td>102</td>
</tr>
<tr>
<td>109</td>
<td>107</td>
<td>105</td>
<td>105</td>
<td>104</td>
<td>101</td>
<td>&#x2013;</td>
<td>102</td>
</tr>
<tr>
<td>104</td>
<td>101</td>
<td>108</td>
<td>107</td>
<td>106</td>
<td>105</td>
<td>103</td>
<td>&#x2013;</td>
</tr>
</tbody>
</table>
</table-wrap><table-wrap id="table-10">
<label>Table 10</label>
<caption>
<title>Nonlinearity analysis of S-boxes using BIC</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Methods</th>
<th>Min.</th>
<th>Avg.</th>
</tr>
</thead>
<tbody>
<tr>
<td><bold>ML-F</bold></td>
<td>97</td>
<td>103.25</td>
</tr>
<tr>
<td><bold>FA</bold></td>
<td>101</td>
<td>104.05</td>
</tr>
<tr>
<td><bold>SA</bold></td>
<td>99</td>
<td>102.98</td>
</tr>
<tr>
<td><bold>GA</bold></td>
<td>97</td>
<td>102.78</td>
</tr>
<tr>
<td><bold>ABC</bold></td>
<td>99</td>
<td>103.22</td>
</tr>
<tr>
<td><bold>TLO</bold></td>
<td>97</td>
<td>104.01</td>
</tr>
<tr>
<td><bold>LFM</bold></td>
<td>99</td>
<td>104.64</td>
</tr>
<tr>
<td><bold>BFO</bold></td>
<td>94</td>
<td>102.87</td>
</tr>
<tr>
<td><bold>ACO</bold></td>
<td>96</td>
<td>103.95</td>
</tr>
<tr>
<td><bold>CFA</bold></td>
<td>96</td>
<td>104.09</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><xref ref-type="table" rid="table-11">Tables 11</xref> and <xref ref-type="table" rid="table-12">12</xref> list the average values of BIC-SAC for S-boxes generated using both methods. The average BIC-SAC value of the ML-F-based S-box was 0.5036, whereas that of the LOA-based S-box was 0.4954 (<xref ref-type="table" rid="table-13">Table 13</xref>). These results indicate that the ML-F method was more successful in achieving BIC-SAC values closer to the ideal value, indicating better overall performance in maintaining the balance between input and output bit dependencies and nonlinearity.</p>
<table-wrap id="table-11">
<label>Table 11</label>
<caption>
<title>BIC-SAC of the S-box generated by ML-F</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<tbody>
<tr>
<td>&#x2013;</td>
<td>0.5032</td>
<td>0.4888</td>
<td>0.4999</td>
<td>0.5256</td>
<td>0.5111</td>
<td>0.5154</td>
<td>0.4923</td>
</tr>
<tr>
<td>0.5023</td>
<td>&#x2013;</td>
<td>0.5290</td>
<td>0.4922</td>
<td>0.5289</td>
<td>0.5098</td>
<td>0.5232</td>
<td>0.5199</td>
</tr>
<tr>
<td>0.5187</td>
<td>0.5211</td>
<td>&#x2013;</td>
<td>0.5111</td>
<td>0.5292</td>
<td>0.5091</td>
<td>0.5187</td>
<td>0.4977</td>
</tr>
<tr>
<td>0.5333</td>
<td>0.5199</td>
<td>0.5077</td>
<td>&#x2013;</td>
<td>0.5122</td>
<td>0.5199</td>
<td>0.5177</td>
<td>0.5201</td>
</tr>
<tr>
<td>0.5156</td>
<td>0.4966</td>
<td>0.5001</td>
<td>0.5054</td>
<td>&#x2013;</td>
<td>0.4966</td>
<td>0.5066</td>
<td>0.5001</td>
</tr>
<tr>
<td>0.5066</td>
<td>0.5187</td>
<td>0.5187</td>
<td>0.4588</td>
<td>0.5378</td>
<td>&#x2013;</td>
<td>0.4620</td>
<td>0.4713</td>
</tr>
<tr>
<td>0.4988</td>
<td>0.5023</td>
<td>0.5290</td>
<td>0.5134</td>
<td>0.4844</td>
<td>0.5222</td>
<td>&#x2013;</td>
<td>0.5099</td>
</tr>
<tr>
<td>0.5256</td>
<td>0.4966</td>
<td>0.5199</td>
<td>0.4687</td>
<td>0.5256</td>
<td>0.4732</td>
<td>0.4620</td>
<td>&#x2013;</td>
</tr>
</tbody>
</table>
</table-wrap><table-wrap id="table-12">
<label>Table 12</label>
<caption>
<title>BIC-SAC of the S-box generated by FA</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<tbody>
<tr>
<td>&#x2013;</td>
<td>0.5032</td>
<td>0.5044</td>
<td>0.5099</td>
<td>0.5089</td>
<td>0.4977</td>
<td>0.4825</td>
<td>0.4861</td>
</tr>
<tr>
<td>0.5066</td>
<td>&#x2013;</td>
<td>0.5034</td>
<td>0.4966</td>
<td>0.5011</td>
<td>0.4955</td>
<td>0.4950</td>
<td>0.5001</td>
</tr>
<tr>
<td>0.4987</td>
<td>0.4754</td>
<td>&#x2013;</td>
<td>0.4557</td>
<td>0.4882</td>
<td>0.4827</td>
<td>0.4952</td>
<td>0.4671</td>
</tr>
<tr>
<td>0.5181</td>
<td>0.5045</td>
<td>0.5095</td>
<td>&#x2013;</td>
<td>0.5075</td>
<td>0.4929</td>
<td>0.5051</td>
<td>0.5065</td>
</tr>
<tr>
<td>0.5253</td>
<td>0.4980</td>
<td>0.5016</td>
<td>0.5177</td>
<td>&#x2013;</td>
<td>0.4934</td>
<td>0.4882</td>
<td>0.4944</td>
</tr>
<tr>
<td>0.5089</td>
<td>0.5134</td>
<td>0.4854</td>
<td>0.5123</td>
<td>0.5045</td>
<td>&#x2013;</td>
<td>0.4867</td>
<td>0.5219</td>
</tr>
<tr>
<td>0.4890</td>
<td>0.5176</td>
<td>0.4980</td>
<td>0.4951</td>
<td>0.5004</td>
<td>0.5117</td>
<td>&#x2013;</td>
<td>0.5237</td>
</tr>
<tr>
<td>0.4688</td>
<td>0.5021</td>
<td>0.4869</td>
<td>0.4690</td>
<td>0.4956</td>
<td>0.4751</td>
<td>0.4753</td>
<td>&#x2013;</td>
</tr>
</tbody>
</table>
</table-wrap><table-wrap id="table-13">
<label>Table 13</label>
<caption>
<title>BIC-SAC comparison of S-boxes</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Methods</th>
<th>Avg.</th>
</tr>
</thead>
<tbody>
<tr>
<td><bold>ML-F</bold></td>
<td>0.5036</td>
</tr>
<tr>
<td><bold>FA</bold></td>
<td>0.4954</td>
</tr>
<tr>
<td><bold>SA</bold></td>
<td>0.4979</td>
</tr>
<tr>
<td><bold>GA</bold></td>
<td>0.5027</td>
</tr>
<tr>
<td><bold>ABC</bold></td>
<td>0.5019</td>
</tr>
<tr>
<td><bold>TLO</bold></td>
<td>0.4963</td>
</tr>
<tr>
<td><bold>LFM</bold></td>
<td>0.5039</td>
</tr>
<tr>
<td><bold>BFO</bold></td>
<td>0.5023</td>
</tr>
<tr>
<td><bold>ACO</bold></td>
<td>0.5026</td>
</tr>
<tr>
<td><bold>CFA</bold></td>
<td>0.4983</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s6_5">
<label>6.5</label>
<title>Differential Harmonization Probability</title>
<p>The S-boxes were analyzed using the DP method, and the results are presented in <xref ref-type="table" rid="table-14">Tables 14</xref> and <xref ref-type="table" rid="table-15">15</xref>. Each table element represents the DP of the generated S-box. The analysis showed that both ML-F and FA produced S-boxes with DAP values mostly concentrated around 6&#x2013;8 with occasional values of 10. As shown in <xref ref-type="table" rid="table-16">Table 16</xref>, both the ML-F and FA S-boxes are produced with a maximum DP value of 11, which is consistent with other high-performance methods reported in the literature. This consistency between the different optimization techniques, including ML-F and FA, shows that these methods are effective in generating S-boxes with strong resistance to differential attacks, thus maintaining a uniform distribution of differential opportunities.</p>
<table-wrap id="table-14">
<label>Table 14</label>
<caption>
<title>DP, of the S-box generated by ML-F</title>
</caption>
<table frame="hsides">
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<tbody>
<tr>
<td>4</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>8</td>
<td>8</td>
<td>8</td>
</tr>
<tr>
<td>6</td>
<td>6</td>
<td>6</td>
<td>4</td>
<td>10</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>10</td>
</tr>
<tr>
<td>8</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>10</td>
<td>8</td>
<td>6</td>
<td>6</td>
</tr>
<tr>
<td>6</td>
<td>10</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>4</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>6</td>
</tr>
<tr>
<td>6</td>
<td>8</td>
<td>8</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>8</td>
<td>8</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>6</td>
</tr>
<tr>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>10</td>
<td>6</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>8</td>
<td>6</td>
</tr>
<tr>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>10</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>10</td>
<td>6</td>
<td>8</td>
<td>8</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>8</td>
</tr>
<tr>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>8</td>
<td>10</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
</tr>
<tr>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>10</td>
<td>8</td>
</tr>
<tr>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>8</td>
<td>8</td>
<td>8</td>
<td>6</td>
</tr>
<tr>
<td>6</td>
<td>8</td>
<td>6</td>
<td>8</td>
<td>10</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
</tr>
<tr>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>8</td>
<td>8</td>
<td>6</td>
</tr>
<tr>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>10</td>
<td>4</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>10</td>
<td>8</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
</tr>
<tr>
<td>8</td>
<td>8</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>8</td>
<td>6</td>
</tr>
<tr>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>4</td>
<td>10</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
</tr>
<tr>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>8</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>10</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>&#x2014;</td>
</tr>
</tbody>
</table>
</table-wrap><table-wrap id="table-15">
<label>Table 15</label>
<caption>
<title>DP, of the S-box generated by FA</title>
</caption>
<table frame="hsides">
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<tbody>
<tr>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
</tr>
<tr>
<td>8</td>
<td>8</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
</tr>
<tr>
<td>6</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
</tr>
<tr>
<td>8</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>8</td>
</tr>
<tr>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
</tr>
<tr>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>8</td>
</tr>
<tr>
<td>8</td>
<td>6</td>
<td>6</td>
<td>10</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
</tr>
<tr>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>8</td>
</tr>
<tr>
<td>8</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>10</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>10</td>
<td>6</td>
<td>8</td>
<td>8</td>
</tr>
<tr>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
</tr>
<tr>
<td>8</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>4</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>4</td>
<td>8</td>
</tr>
<tr>
<td>10</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
</tr>
<tr>
<td>6</td>
<td>6</td>
<td>6</td>
<td>10</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>10</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
</tr>
<tr>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>10</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
</tr>
<tr>
<td>6</td>
<td>6</td>
<td>6</td>
<td>10</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>8</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
</tr>
<tr>
<td>8</td>
<td>6</td>
<td>6</td>
<td>4</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>8</td>
<td>6</td>
<td>6</td>
<td>6</td>
<td>&#x2013;</td>
</tr>
</tbody>
</table>
</table-wrap><table-wrap id="table-16">
<label>Table 16</label>
<caption>
<title>S-box analysis of DP</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Methods</th>
<th>Max Dp</th>
</tr>
</thead>
<tbody>
<tr>
<td><bold>ML-F</bold></td>
<td>11</td>
</tr>
<tr>
<td><bold>FA</bold></td>
<td>11</td>
</tr>
<tr>
<td><bold>SA</bold></td>
<td>11</td>
</tr>
<tr>
<td><bold>GA</bold></td>
<td>11</td>
</tr>
<tr>
<td><bold>ABC</bold></td>
<td>11</td>
</tr>
<tr>
<td><bold>TLO</bold></td>
<td>11</td>
</tr>
<tr>
<td><bold>LFM</bold></td>
<td>35</td>
</tr>
<tr>
<td><bold>BFO</bold></td>
<td>11</td>
</tr>
<tr>
<td><bold>ACO</bold></td>
<td>11</td>
</tr>
<tr>
<td><bold>CFA</bold></td>
<td>11</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s6_6">
<label>6.6</label>
<title>Maximum Expected Linear Probability</title>
<p><xref ref-type="table" rid="table-17">Table 17</xref> compares the MELP results for the S-boxes generated using the proposed method with those generated using various other techniques. The MELP value for the ML-F-based S-box is 0.0789, which is similar to the values obtained using methods, such as SA and GA, and slightly lower than the value achieved by the FA-based S-box (0.0873), which is similar to those obtained using ACO and ABC. The results show that both the ML-F and FA approaches produce S-boxes that meet the MELP criterion, demonstrating a strong performance in maintaining a linear probability distribution comparable to that of other high-performance methods.</p>
<table-wrap id="table-17">
<label>Table 17</label>
<caption>
<title>MELP analysis of S-boxes</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Methods</th>
<th>MELP</th>
</tr>
</thead>
<tbody>
<tr>
<td><bold>ML-F</bold></td>
<td>0.0789</td>
</tr>
<tr>
<td><bold>FA</bold></td>
<td>0.0873</td>
</tr>
<tr>
<td><bold>SA</bold></td>
<td>0.0781</td>
</tr>
<tr>
<td><bold>GA</bold></td>
<td>0.0783</td>
</tr>
<tr>
<td><bold>ABC</bold></td>
<td>0.0891</td>
</tr>
<tr>
<td><bold>TLO</bold></td>
<td>0.0713</td>
</tr>
<tr>
<td><bold>LFM</bold></td>
<td>0.0643</td>
</tr>
<tr>
<td><bold>BFO</bold></td>
<td>0.0789</td>
</tr>
<tr>
<td><bold>ACO</bold></td>
<td>0.0888</td>
</tr>
<tr>
<td><bold>CFA</bold></td>
<td>0.0712</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s7">
<label>7</label>
<title>Threats to Validity</title>
<p>Empirical research is often subject to various validity threats, both external and internal. External validity threats emerge when experimental results cannot be generalized to real-world applications. In this study, such threats were mitigated by employing widely accepted benchmarks from the literature that reflect realistic and commonly encountered cryptographic configurations. Internal validity threats arise from factors that can inadvertently influence the outcomes of the study, including variations in the population size, number of iterations, and specific parameters used for each algorithm. Considering that the source code for all the methods was not available, it would be challenging to confirm whether the ML-F and LOA methods were evaluated using an identical number of fitness functions. Nonetheless, the comparisons presented in this study are considered valid because the published S-box results were obtained using optimal control parameter settings, thereby minimizing the impact of external factors. In addition, the performance was evaluated based on the averaged results to account for the stochastic nature of each metaheuristic run. Comparing ML-F with methods such as TLO could be misleading because of the inherent differences in their operational mechanisms, such as the dual phases of TLO, which require a greater number of fitness function evaluations. Moreover, although TLO is often cited as parameter-free, it still requires careful tuning of the iteration counts and population sizes. Recent scrutiny of TLO has highlighted concerns about unreported implementation steps that can result in unfair comparisons. Another internal validity threat involves the generation time, which is significantly influenced by the computational environment. A fair comparison of generation times necessitates that all methods are executed under identical conditions.</p>
<p><bold><italic>Limitations</italic></bold></p>
<p>Although the performed study illustrates that the ML-F algorithm provides an effective way of generating highly nonlinear and robust S-boxes, there are specific limitations. The first is that a larger swarm size with an increase in iterations requires more computation time and execution, which is perhaps not feasible in real-time or resource-constrained conditions. Although the algorithm has been tested for a range of swarm sizes and iterations, the configurations are still limited, and further research is required to explore its performance under different environmental parameters or on different hardware configurations. More importantly, although the optimization in this study focused on nonlinearity and resistance to linear and differential cryptanalysis, not all types of cryptographic weaknesses, such as fixed points or reverse fixed points, were considered. The performance has a large remaining margin, which will allow refinement towards fully comprehensive cryptographic strength. The results of this study are obtained from simulations. Real implementations may have completely different performances because of additional factors unrelated to this study, such as hardware variability or specific operating limitations. Future studies may thus overcome these two limitations, with a primary focus on ML-F optimization in terms of computational efficiency and the assessment of its real performance against practical cryptographic requirements.</p>
</sec>
<sec id="s8">
<label>8</label>
<title>Conclusion</title>
<p>S-boxes play a crucial role in symmetrical cryptosystems by providing essential confusion, as highlighted by Shannon, to obscure the relationship between the encryption key and plaintext, thereby enhancing the resistance of the cryptosystem to attacks. In this study, we introduced a novel method for generating S-boxes based on a hybrid ML-F optimization algorithm. This approach leverages the exploration and exploitation capabilities of both the LOA and FA, which jointly address limitations, such as early convergence and limited search diversity often observed in standalone metaheuristic algorithms. These experimental results confirm that the proposed ML-F algorithm is satisfactory for some important cryptographic attacks, such as nonlinearity analysis, BIC, SAC, DP, and MELP. The ML-F-based generated S-boxes maintained their nonlinearity scores highly in comparison to the S-boxes generated by FA and other compared algorithms each time while varying the swarm sizes and iteration counts used in ML-F. From these experimental results, it can be concluded that ML-F obtains better S-boxes with higher resistance to both linear and differential crypt analyses.</p>
<p>One of the striking features of ML-F is its scalability, with an increase in iterations and swarm size, yielding robust performance under larger configurations. In contrast, the FA demonstrated greater fluctuation and vulnerability to local optima, particularly for smaller iterations. This consistency in producing high values of best-case, worst-case, and average metrics indicates the reliability of ML-F for cryptographic applications. However, this study has some limitations. One major limitation is that the increased swarm size and number of iterations boost the computational time, which might limit the practice of ML-F in real-world applications with reduced resources or in real time. Moreover, this study focused only on the optimization of important cryptographic properties, such as nonlinearity and resistance against differential attacks. Other possible vulnerabilities include fixed points or reverse fixed points, which are other important aspects of cryptographic strength. These limitations include avenues for further research, in which better computational efficiency and more cryptographic criteria may be integrated to enhance the applicability of ML-F. This implies that, eventually, ML-F is an effective and promising approach toward the optimization of S-box properties because of its persistent improvement in nonlinearity, along with the general cryptographic security of various configurations. Further research might address improving the computational efficiency of ML-F and exploring methods for adaptive tuning to optimize the ML-F performance. In addition, other practical cryptographic applications may be promising avenues to which the ML-F algorithm might be deployed, considering the great potential that this can provide for the robustness and scalability of cryptographic systems. Extending the scope of the application of ML-F by real-time tests and investigating its hardware implementation could provide a more solid basis for establishing the practicality and effectiveness of the proposed MLF on modern cryptography.</p>
</sec>
<sec id="s9">
<label>9</label>
<title>Future Research Directions</title>
<p>This paper presents the ML-F algorithm as an efficient way of generating highly nonlinear and robust S-boxes, although a few avenues for future research remain open. Future work may be undertaken to enhance the computational efficiency of ML-F, especially to optimize its performance for real-time applications and resource-constrained environments. Adaptive tuning techniques for parameters or exploring parallel processing may reduce the execution time without compromising cryptographic strength. In addition, it can be extended further to enhance the robustness of the S-boxes generated by ML-F with more security criteria beyond nonlinearity, bit independence, and the properties of differential approximation. Other possible lines of research work may also include resistance against fixed points, reverse fixed points, and short-period cycles, which are important for several advanced cryptographic applications. Further investigations were conducted to test the ML-F algorithm in practical cryptographic contexts, such as encryption schemes for secure communications, image encryption, and IoT security. In addition, based on recent studies related to the design of S-boxes, such as weighted Loeplitz matrices for data encryption and corner-modified symmetric Toeplitz matrices for image encryption, one can gain insight into some feasible and new applications of the ML-F algorithm in cryptographic infrastructure. Addressing these issues will refine the ML-F approach in future research, thereby expanding its application and further increasing its viability in various cryptographic settings.</p>
</sec>
</body>
<back>
<glossary content-type="abbreviations" id="glossary-1">
<title>Glossary/Nomenclature/Abbreviations</title>
<def-list>
<def-item>
<term>AAHC</term>
<def>
<p>Adaptive agent heroes and cowards algorithm</p>
</def>
</def-item>
<def-item>
<term>ABC</term>
<def>
<p>Artificial bee colony</p>
</def>
</def-item>
<def-item>
<term>ACO</term>
<def>
<p>Colony optimization</p>
</def>
</def-item>
<def-item>
<term>AES</term>
<def>
<p>Advanced encryption standard</p>
</def>
</def-item>
<def-item>
<term>BFO</term>
<def>
<p>Bacterial forage optimization</p>
</def>
</def-item>
<def-item>
<term>BIC</term>
<def>
<p>Bit independence criterion</p>
</def>
</def-item>
<def-item>
<term>CFA</term>
<def>
<p>Chaotic firefly algorithm</p>
</def>
</def-item>
<def-item>
<term>CS</term>
<def>
<p>Cuckoo search</p>
</def>
</def-item>
<def-item>
<term>DES</term>
<def>
<p>Data encryption standard</p>
</def>
</def-item>
<def-item>
<term>DP</term>
<def>
<p>Differential probability</p>
</def>
</def-item>
<def-item>
<term>FA</term>
<def>
<p>Firefly algorithm</p>
</def>
</def-item>
<def-item>
<term>GA</term>
<def>
<p>Genetic algorithm</p>
</def>
</def-item>
<def-item>
<term>GFA</term>
<def>
<p>Globalized firefly algorithm</p>
</def>
</def-item>
<def-item>
<term>LFM</term>
<def>
<p>Linear fractional method</p>
</def>
</def-item>
<def-item>
<term>LOA</term>
<def>
<p>Lion optimization algorithm</p>
</def>
</def-item>
<def-item>
<term>MELP</term>
<def>
<p>Maximum expected linear probability</p>
</def>
</def-item>
<def-item>
<term>ML-F</term>
<def>
<p>Metaheuristic lion firefly</p>
</def>
</def-item>
<def-item>
<term>MSAA</term>
<def>
<p>Modified simulated annealing algorithm</p>
</def>
</def-item>
<def-item>
<term>NL</term>
<def>
<p>Nonlinearity function</p>
</def>
</def-item>
<def-item>
<term>PSO</term>
<def>
<p>Particle swarm optimization</p>
</def>
</def-item>
<def-item>
<term>SA</term>
<def>
<p>Simulated annealing</p>
</def>
</def-item>
<def-item>
<term>SAC</term>
<def>
<p>Strict avalanche criterion</p>
</def>
</def-item>
<def-item>
<term>TLO</term>
<def>
<p>Teaching learning optimization</p>
</def>
</def-item>
<def-item>
<term>WOA</term>
<def>
<p>Whale optimization algorithm</p>
</def>
</def-item>
</def-list>
</glossary>
<ack>
<p>We extend our gratitude to the Department of Mathematics at the Open Educational College, Kirkuk Branch, for its invaluable support throughout this study.</p>
</ack>
<sec><title>Funding Statement</title>
<p>This research did not receive any specific grants from funding agencies in the public, commercial, or not-for-profit sectors.</p>
</sec>
<sec sec-type="data-availability">
<title>Availability of Data and Materials</title>
<p>Data and materials for this study can be made available through an inquiry managed by Arkan Kh. Shakr Sabonchi, under data and privacy guidelines and access, could be subject to limitations for confidentiality purposes, according to ethical and legal standards.</p>
</sec>
<sec><title>Ethics Approval</title>
<p>Not applicable.</p>
</sec>
<sec sec-type="COI-statement"><title>Conflicts of Interest</title>
<p>The authors declare no conflicts of interest to report regarding the present study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>A. F.</given-names> <surname>Webster</surname></string-name> and <string-name><given-names>S. E.</given-names> <surname>Tavares</surname></string-name></person-group>, &#x201C;<chapter-title>On the design of S-boxes</chapter-title>,&#x201D; in <source>Advances in Cryptology CRYPTO&#x2019;85 Proceedings</source>, <person-group person-group-type="editor"><string-name><given-names>H. C.</given-names> <surname>Williams</surname></string-name></person-group>, Ed. <publisher-loc>Berlin, Heidelberg</publisher-loc>: <publisher-name>Springer</publisher-name>, <year>1985</year>, vol. <volume>218</volume>, pp. <fpage>523</fpage>&#x2013;<lpage>534</lpage>. doi: <pub-id pub-id-type="doi">10.1007/3-540-39799-X_41</pub-id>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Matsui</surname></string-name></person-group>, &#x201C;<chapter-title>On correlation between the order of S-boxes and the strength of DES</chapter-title>,&#x201D; in <source>Advances in Cryptology-EUROCRYPT&#x2019;94</source>, <person-group person-group-type="editor"><string-name><given-names>A.</given-names> <surname>De Santis</surname></string-name></person-group>, Ed. <publisher-loc>Berlin, Heidelberg</publisher-loc>: <publisher-name>Springer</publisher-name>, <year>1995</year>, vol. <volume>950</volume>. doi: <pub-id pub-id-type="doi">10.1007/BFb0053451</pub-id>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Gao</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Idrees</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Zafar</surname></string-name>, and <string-name><given-names>T.</given-names> <surname>Rashid</surname></string-name></person-group>, &#x201C;<article-title>Construction of nonlinear component of block cipher by action of modular group PSL(2, Z) on projective line PL(GF(2<sup>8</sup>))</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>8</volume>, pp. <fpage>136736</fpage>&#x2013;<lpage>136749</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2020.3010615</pub-id>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>E. F.</given-names> <surname>Brickell</surname></string-name>, <string-name><given-names>J. H.</given-names> <surname>Moore</surname></string-name>, and <string-name><given-names>M. R.</given-names> <surname>Purtill</surname></string-name></person-group>, &#x201C;<chapter-title>Structure in the S-boxes of the DES (extended abstract)</chapter-title>,&#x201D; in <source>Advances in Cryptology-CRYPTO&#x2019; 86</source>, <person-group person-group-type="editor"><string-name><given-names>A. M.</given-names> <surname>Odlyzko</surname></string-name></person-group>, Ed. <publisher-loc>Berlin, Heidelberg</publisher-loc>: <publisher-name>Springer</publisher-name>, <year>1987</year>, vol. <volume>263</volume>. doi: <pub-id pub-id-type="doi">10.1007/3-540-47721-7_1</pub-id>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. Y.</given-names> <surname>Al-Dweik</surname></string-name>, <string-name><given-names>I.</given-names> <surname>Hussain</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Saleh</surname></string-name>, and <string-name><given-names>M. T.</given-names> <surname>Mustafa</surname></string-name></person-group>, &#x201C;<article-title>A novel method to generate key-dependent s-boxes with identical algebraic properties</article-title>,&#x201D; <source>J. Inf. Secur. Appl.</source>, vol. <volume>64</volume>, no. <issue>14</issue>, <year>2022, Art. no. 103065</year>. doi: <pub-id pub-id-type="doi">10.1016/j.jisa.2021.103065</pub-id>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Murphy</surname></string-name> and <string-name><given-names>M. J. B.</given-names> <surname>Robshaw</surname></string-name></person-group>, &#x201C;<article-title>Key-dependent S-boxes and differential cryptanalysis</article-title>,&#x201D; <source>Des. Codes Cryptogr.</source>, vol. <volume>27</volume>, no. <issue>3</issue>, pp. <fpage>229</fpage>&#x2013;<lpage>255</lpage>, <year>2002</year>. doi: <pub-id pub-id-type="doi">10.1023/A:1019991004496</pub-id>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Tian</surname></string-name> and <string-name><given-names>Z.</given-names> <surname>Lu</surname></string-name></person-group>, &#x201C;<article-title>S-box: Six-dimensional compound hyperchaotic map and artificial bee colony algorithm</article-title>,&#x201D; <source>J. Syst. Eng. Electron.</source>, vol. <volume>27</volume>, no. <issue>1</issue>, pp. <fpage>232</fpage>&#x2013;<lpage>241</lpage>, <year>2016</year>. doi: <pub-id pub-id-type="doi">10.1109/JSEE.2016.7400771</pub-id>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>V. M.</given-names> <surname>Silva-Garc&#x00ED;a</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Flores-Carapia</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Renter&#x00ED;a-M&#x00E1;rquez</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Luna-Benoso</surname></string-name>, and <string-name><given-names>M.</given-names> <surname>Aldape-P&#x00E9;rez</surname></string-name></person-group>, &#x201C;<article-title>Substitution box generation using chaos: An image encryption application</article-title>,&#x201D; <source>Appl. Math. Comput.</source>, vol. <volume>332</volume>, pp. <fpage>123</fpage>&#x2013;<lpage>135</lpage>, <year>2018</year>. doi: <pub-id pub-id-type="doi">10.1016/j.amc.2018.02.013</pub-id>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K. Z.</given-names> <surname>Zamli</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Kader</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Din</surname></string-name>, and <string-name><given-names>H. S.</given-names> <surname>Alhadawi</surname></string-name></person-group>, &#x201C;<article-title>Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization</article-title>,&#x201D; <source>Neural Comput. Appl.</source>, vol. <volume>33</volume>, no. <issue>23</issue>, pp. <fpage>16641</fpage>&#x2013;<lpage>16658</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1007/s00500-020-04753-1</pub-id>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Picek</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Jakobovic</surname></string-name>, <string-name><given-names>J. F.</given-names> <surname>Miller</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Batina</surname></string-name>, and <string-name><given-names>M.</given-names> <surname>Cupic</surname></string-name></person-group>, &#x201C;<article-title>Cryptographic Boolean functions: One output, many design criteria</article-title>,&#x201D; <source>Appl. Soft Comput.</source>, vol. <volume>40</volume>, no. <issue>3</issue>, pp. <fpage>635</fpage>&#x2013;<lpage>653</lpage>, <year>2016</year>. doi: <pub-id pub-id-type="doi">10.1016/j.asoc.2015.10.066</pub-id>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J. S.</given-names> <surname>Khan</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Ahmad</surname></string-name>, <string-name><given-names>S. S.</given-names> <surname>Ahmed</surname></string-name>, <string-name><given-names>H. A.</given-names> <surname>Siddiqa</surname></string-name>, <string-name><given-names>S. F.</given-names> <surname>Abbasi</surname></string-name> and <string-name><given-names>S. K.</given-names> <surname>Kayhan</surname></string-name></person-group>, &#x201C;<article-title>DNA key based visual chaotic image encryption</article-title>,&#x201D; <source>J. Intell. Fuzzy Syst.</source>, vol. <volume>37</volume>, no. <issue>2</issue>, pp. <fpage>2549</fpage>&#x2013;<lpage>2561</lpage>, <year>2019</year>. doi: <pub-id pub-id-type="doi">10.3233/JIFS-182778</pub-id>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Tiwari</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Sharma</surname></string-name></person-group>, &#x201C;<article-title>On higher order nonlinearities of Boolean functions</article-title>,&#x201D; <source>Cryptogr. Commun.</source>, vol. <volume>15</volume>, no. <issue>4</issue>, pp. <fpage>821</fpage>&#x2013;<lpage>830</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1007/s12095-023-00643-5</pub-id>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G.</given-names> <surname>Ivanov</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Nikolov</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Nikova</surname></string-name></person-group>, &#x201C;<article-title>Reversed genetic algorithms for generation of bijective S-boxes with good cryptographic properties</article-title>,&#x201D; <source>Cryptogr. Commun.</source>, vol. <volume>8</volume>, no. <issue>2</issue>, pp. <fpage>247</fpage>&#x2013;<lpage>276</lpage>, <year>2016</year>. doi: <pub-id pub-id-type="doi">10.1007/s12095-015-0170-5</pub-id>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Cao</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Ben</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Peng</surname></string-name>, and <string-name><given-names>X.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<chapter-title>Enhancing firefly algorithm with adaptive multi-group mechanism</chapter-title>,&#x201D; <source>Appl. Intell.</source>, vol. <volume>52</volume>, pp. <fpage>9795</fpage>&#x2013;<lpage>9815</lpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.1007/s10489-021-02766-9</pub-id>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>X. -S.</given-names> <surname>Yang</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Deb</surname></string-name>, <string-name><given-names>Y. -X.</given-names> <surname>Zhao</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Fong</surname></string-name>, and <string-name><given-names>X.</given-names> <surname>He</surname></string-name></person-group>, &#x201C;<article-title>Swarm intelligence: Past, present and future</article-title>,&#x201D; <source>Soft Comput.</source>, vol. <volume>22</volume>, no. <issue>18</issue>, pp. <fpage>5923</fpage>&#x2013;<lpage>5933</lpage>, <year>2018</year>. doi: <pub-id pub-id-type="doi">10.1007/s00500-017-2810-5</pub-id>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J. A.</given-names> <surname>Clark</surname></string-name>, <string-name><given-names>J. L.</given-names> <surname>Jacob</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Stepney</surname></string-name></person-group>, &#x201C;<article-title>The design of S-boxes by simulated annealing</article-title>,&#x201D; <source>New Gener. Comput.</source>, vol. <volume>23</volume>, no. <issue>3</issue>, pp. <fpage>219</fpage>&#x2013;<lpage>231</lpage>, <year>2005</year>. doi: <pub-id pub-id-type="doi">10.1007/BF03037656</pub-id>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Liu</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Kadir</surname></string-name>, and <string-name><given-names>C.</given-names> <surname>Xu</surname></string-name></person-group>, &#x201C;<article-title>Cryptanalysis and constructing S-box based on chaotic map and backtracking</article-title>,&#x201D; <source>Appl. Math. Comput.</source>, vol. <volume>376</volume>, no. <issue>3</issue>, <year>2020, Art. no. 125153</year>. doi: <pub-id pub-id-type="doi">10.1016/j.amc.2020.125153</pub-id>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Ahmad</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Bhatia</surname></string-name>, and <string-name><given-names>Y.</given-names> <surname>Hassan</surname></string-name></person-group>, &#x201C;<article-title>A novel ant colony optimization based scheme for substitution box design</article-title>,&#x201D; <source>Procedia Comput. Sci.</source>, vol. <volume>57</volume>, no. <issue>2</issue>, pp. <fpage>572</fpage>&#x2013;<lpage>580</lpage>, <year>2015</year>. doi: <pub-id pub-id-type="doi">10.1016/j.procs.2015.07.394</pub-id>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Ahmad</surname></string-name>, <string-name><given-names>M. N.</given-names> <surname>Doja</surname></string-name>, and <string-name><given-names>M. M. S.</given-names> <surname>Beg</surname></string-name></person-group>, &#x201C;<article-title>ABC optimization based construction of strong substitution-boxes</article-title>,&#x201D; <source>Wirel. Pers. Commun.</source>, vol. <volume>101</volume>, no. <issue>3</issue>, pp. <fpage>1715</fpage>&#x2013;<lpage>1729</lpage>, <year>2018</year>. doi: <pub-id pub-id-type="doi">10.1007/s11277-018-5787-1</pub-id>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H. A.</given-names> <surname>Ahmed</surname></string-name>, <string-name><given-names>M. F.</given-names> <surname>Zolkipli</surname></string-name>, and <string-name><given-names>M.</given-names> <surname>Ahmad</surname></string-name></person-group>, &#x201C;<article-title>A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map</article-title>,&#x201D; <source>Neural Comput. Appl.</source>, vol. <volume>31</volume>, no. <issue>11</issue>, pp. <fpage>7201</fpage>&#x2013;<lpage>7210</lpage>, <year>2019</year>. doi: <pub-id pub-id-type="doi">10.1007/s00521-018-3557-3</pub-id>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Zhu</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Zhou</surname></string-name>, and <string-name><given-names>Z.</given-names> <surname>Qi</surname></string-name></person-group>, &#x201C;<article-title>Construction method and performance analysis of chaotic S-box based on a memorable simulated annealing algorithm</article-title>,&#x201D; <source>Symmetry</source>, vol. <volume>12</volume>, no. <issue>12</issue>, <year>2020, Art. no. 2115</year>. doi: <pub-id pub-id-type="doi">10.3390/sym12122115</pub-id>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H. S.</given-names> <surname>Alhadawi</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Lambi&#x0107;</surname></string-name>, <string-name><given-names>M. F.</given-names> <surname>Zolkipli</surname></string-name>, and <string-name><given-names>M.</given-names> <surname>Ahmad</surname></string-name></person-group>, &#x201C;<article-title>Globalized firefly algorithm and chaos for designing substitution box</article-title>,&#x201D; <source>J. Inf. Secur. Appl.</source>, vol. <volume>55</volume>, no. <issue>1</issue>, <year>2020, Art. no. 102671</year>. doi: <pub-id pub-id-type="doi">10.1016/j.jisa.2020.102671</pub-id>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H. S.</given-names> <surname>Alhadawi</surname></string-name>, <string-name><given-names>M. A.</given-names> <surname>Majid</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Lambi&#x0107;</surname></string-name>, and <string-name><given-names>M.</given-names> <surname>Ahmad</surname></string-name></person-group>, &#x201C;<article-title>A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm</article-title>,&#x201D; <source>Multimed. Tools Appl.</source>, vol. <volume>80</volume>, no. <issue>5</issue>, pp. <fpage>7333</fpage>&#x2013;<lpage>7350</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1007/s11042-020-10048-8</pub-id>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K. Z.</given-names> <surname>Zamli</surname></string-name></person-group>, &#x201C;<article-title>Optimizing S-box generation based on the adaptive agent heroes and cowards algorithm</article-title>,&#x201D; <source>Expert. Syst. Appl.</source>, vol. <volume>182</volume>, no. <issue>11</issue>, <year>2021, Art. no. 115305</year>. doi: <pub-id pub-id-type="doi">10.1016/j.eswa.2021.115305</pub-id>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>H. S.</given-names> <surname>Alhadawi</surname></string-name>, <string-name><given-names>S. Q.</given-names> <surname>Salih</surname></string-name>, and <string-name><given-names>Y. D.</given-names> <surname>Salman</surname></string-name></person-group>, &#x201C;<chapter-title>Chaotic particle swarm optimization based on meeting room approach for designing bijective S-boxes</chapter-title>,&#x201D; in <source>Proc. Int. Conf. Emerging Technol. Intell. Syst.</source>, <person-group person-group-type="editor"><string-name><given-names>M.</given-names> <surname>Al-Emran</surname></string-name>, <string-name><given-names>M. A.</given-names> <surname>Al-Sharafi</surname></string-name>, <string-name><given-names>M. N.</given-names> <surname>Al-Kabi</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Shaalan</surname></string-name></person-group>, Eds. <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name>, <year>2022</year>, vol. <volume>322</volume>. doi: <pub-id pub-id-type="doi">10.1007/978-3-030-85990-9_28</pub-id>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F.</given-names> <surname>Artu&#x011F;er</surname></string-name></person-group>, &#x201C;<article-title>A new S-box generator algorithm based on 3D chaotic maps and whale optimization algorithm</article-title>,&#x201D; <source>Wirel. Pers. Commun.</source>, vol. <volume>131</volume>, no. <issue>2</issue>, pp. <fpage>835</fpage>&#x2013;<lpage>853</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1007/s11277-023-10456-7</pub-id>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>X.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>J. H.</given-names> <surname>Park</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Cao</surname></string-name>, and <string-name><given-names>J.</given-names> <surname>Qiu</surname></string-name></person-group>, &#x201C;<article-title>Sliding mode synchronization of multiple chaotic systems with uncertainties and disturbances</article-title>,&#x201D; <source>Appl. Math. Comput.</source>, vol. <volume>308</volume>, pp. <fpage>161</fpage>&#x2013;<lpage>173</lpage>, <year>2017</year>. doi: <pub-id pub-id-type="doi">10.1016/j.amc.2017.03.012</pub-id>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>K. -W.</given-names> <surname>Wong</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Li</surname></string-name>, and <string-name><given-names>Y.</given-names> <surname>Li</surname></string-name></person-group>, &#x201C;<article-title>A novel method to design S-box based on chaotic map and genetic algorithm</article-title>,&#x201D; <source>Phys. Lett. A</source>, vol. <volume>376</volume>, no. <issue>6&#x2013;7</issue>, pp. <fpage>827</fpage>&#x2013;<lpage>833</lpage>, <year>2012</year>. doi: <pub-id pub-id-type="doi">10.1016/j.physleta.2012.01.009</pub-id>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>M. H.</given-names> <surname>Dawson</surname></string-name> and <string-name><given-names>S. E.</given-names> <surname>Tavares</surname></string-name></person-group>, &#x201C;<chapter-title>An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks</chapter-title>,&#x201D; in <source>Advances in Cryptology-EUROCRYPT&#x2019;91</source>, <person-group person-group-type="editor"><string-name><given-names>D. W.</given-names> <surname>Davies</surname></string-name></person-group>, Ed. <publisher-loc>Berlin, Heidelberg</publisher-loc>: <publisher-name>Springer</publisher-name>, <year>1991</year>, vol. <volume>547</volume>. doi: <pub-id pub-id-type="doi">10.1007/3-540-46416-6_30</pub-id>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Li</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Wang</surname></string-name></person-group>, &#x201C;<article-title>Constructing differentially 4-uniform permutations over GF(2<sup>2m</sup>) from quadratic APN permutations over GF(2<sup>2m&#x002B;1</sup>)</article-title>,&#x201D; <source>Des. Codes Cryptogr.</source>, vol. <volume>72</volume>, no. <issue>2</issue>, pp. <fpage>249</fpage>&#x2013;<lpage>264</lpage>, <year>2014</year>. doi: <pub-id pub-id-type="doi">10.1007/s10623-012-9760-9</pub-id>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. A.</given-names> <surname>Alzaidi</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Ahmad</surname></string-name>, <string-name><given-names>H. S.</given-names> <surname>Ahmed</surname></string-name>, and <string-name><given-names>E. Al</given-names> <surname>Solami</surname></string-name></person-group>, &#x201C;<article-title>Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map</article-title>,&#x201D; <source>Complexity</source>, vol. <volume>2018</volume>, no. <issue>1</issue>, <year>2018, Art. no. 9389065</year>. doi: <pub-id pub-id-type="doi">10.1155/2018/9389065</pub-id>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H. S.</given-names> <surname>Alhadawi</surname></string-name>, <string-name><given-names>M. F.</given-names> <surname>Zolkipli</surname></string-name>, <string-name><given-names>S. M.</given-names> <surname>Ismail</surname></string-name>, and <string-name><given-names>D.</given-names> <surname>Lambi&#x0107;</surname></string-name></person-group>, &#x201C;<article-title>Designing a pseudorandom bit generator based on LFSRs and a discrete chaotic map</article-title>,&#x201D; <source>Cryptologia</source>, vol. <volume>43</volume>, no. <issue>3</issue>, pp. <fpage>190</fpage>&#x2013;<lpage>211</lpage>, <year>2019</year>. doi: <pub-id pub-id-type="doi">10.1080/01611194.2018.1548390</pub-id>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Lambi&#x0107;</surname></string-name></person-group>, &#x201C;<article-title>A new discrete chaotic map based on the composition of permutations</article-title>,&#x201D; <source>Chaos Solitons Fractals</source>, vol. <volume>78</volume>, no. <issue>2</issue>, pp. <fpage>245</fpage>&#x2013;<lpage>248</lpage>, <year>2015</year>. doi: <pub-id pub-id-type="doi">10.1016/j.chaos.2015.08.001</pub-id>.</mixed-citation></ref>
<ref id="ref-34"><label>[34]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Yazdani</surname></string-name> and <string-name><given-names>F.</given-names> <surname>Jolai</surname></string-name></person-group>, &#x201C;<article-title>Lion optimization algorithm (LOA): A nature-inspired metaheuristic algorithm</article-title>,&#x201D; <source>J. Comput. Des. Eng.</source>, vol. <volume>3</volume>, no. <issue>1</issue>, pp. <fpage>24</fpage>&#x2013;<lpage>36</lpage>, <year>2015</year>. doi: <pub-id pub-id-type="doi">10.1016/j.jcde.2015.06.003</pub-id>.</mixed-citation></ref>
<ref id="ref-35"><label>[35]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>E. S. P.</given-names> <surname>Krishna</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Thangavelu</surname></string-name></person-group>, &#x201C;<article-title>Attack detection in IoT devices using hybrid metaheuristic lion optimization algorithm and firefly optimization algorithm</article-title>,&#x201D; <source>Int. J. Syst. Assur. Eng. Manag.</source>, vol. <volume>12</volume>, no. <issue>4</issue>, pp. <fpage>999</fpage>&#x2013;<lpage>1010</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1007/s13198-021-01150-7</pub-id>.</mixed-citation></ref>
<ref id="ref-36"><label>[36]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>X. S.</given-names> <surname>Yang</surname></string-name></person-group>, &#x201C;<chapter-title>Firefly algorithms for multimodal optimization</chapter-title>,&#x201D; in <source>Stochastic Algorithms: Foundations and Applications</source>, <person-group person-group-type="editor"><string-name><given-names>O.</given-names> <surname>Watanabe</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Zeugmann</surname></string-name></person-group>, Eds. <publisher-loc>Berlin, Heidelberg</publisher-loc>: <publisher-name>Springer</publisher-name>, <year>2009</year>, vol. <volume>5792</volume>. doi: <pub-id pub-id-type="doi">10.1007/978-3-642-04944-6_14</pub-id>.</mixed-citation></ref>
<ref id="ref-37"><label>[37]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I.</given-names> <surname>Fister</surname></string-name>, <string-name><given-names>X. -S.</given-names> <surname>Yang</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Brest</surname></string-name>, and <string-name><given-names>I.</given-names> <surname>Fister</surname></string-name></person-group>, &#x201C;<article-title>Modified firefly algorithm using quaternion representation</article-title>,&#x201D; <source>Expert Syst. Appl.</source>, vol. <volume>40</volume>, no. <issue>18</issue>, pp. <fpage>7220</fpage>&#x2013;<lpage>7230</lpage>, <year>2013</year>. doi: <pub-id pub-id-type="doi">10.1016/j.eswa.2013.06.070</pub-id>.</mixed-citation></ref>
<ref id="ref-38"><label>[38]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Daemen</surname></string-name> and <string-name><given-names>V.</given-names> <surname>Rijmen</surname></string-name></person-group>, <source>The Design of Rijndael</source>. <publisher-loc>New York</publisher-loc>: <publisher-name>Springer-Verlag</publisher-name>, <year>2002</year>.</mixed-citation></ref>
<ref id="ref-39"><label>[39]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Tian</surname></string-name> and <string-name><given-names>Z.</given-names> <surname>Lu</surname></string-name></person-group>, &#x201C;<article-title>Chaotic S-box: Intertwining logistic map and bacterial foraging optimization</article-title>,&#x201D; <source>Math. Probl. Eng.</source>, vol. <volume>2017</volume>, no. <issue>1</issue>, <year>2017, Art. no. 6969312</year>. doi: <pub-id pub-id-type="doi">10.1155/2017/6969312</pub-id>.</mixed-citation></ref>
<ref id="ref-40"><label>[40]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>T.</given-names> <surname>Farah</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Rhouma</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Belghith</surname></string-name></person-group>, &#x201C;<article-title>A novel method for designing S-box based on chaotic map and teaching-learning-based optimization</article-title>,&#x201D; <source>Nonlinear Dyn</source>, vol. <volume>88</volume>, no. <issue>2</issue>, pp. <fpage>1059</fpage>&#x2013;<lpage>1074</lpage>, <year>2017</year>. doi: <pub-id pub-id-type="doi">10.1007/s11071-016-3295-y</pub-id>.</mixed-citation></ref>
<ref id="ref-41"><label>[41]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I.</given-names> <surname>Hussain</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Shah</surname></string-name>, <string-name><given-names>M. A.</given-names> <surname>Gondal</surname></string-name>, <string-name><given-names>W. A.</given-names> <surname>Khan</surname></string-name>, and <string-name><given-names>H.</given-names> <surname>Mahmood</surname></string-name></person-group>, &#x201C;<article-title>A group theoretic approach to construct cryptographically strong substitution boxes</article-title>,&#x201D; <source>Neural Comput. Applic.</source>, vol. <volume>23</volume>, no. <issue>1</issue>, pp. <fpage>97</fpage>&#x2013;<lpage>104</lpage>, <year>2013</year>. doi: <pub-id pub-id-type="doi">10.1007/s00521-012-0914-5</pub-id>.</mixed-citation></ref>
<ref id="ref-42"><label>[42]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G.</given-names> <surname>Chen</surname></string-name></person-group>, &#x201C;<article-title>A novel heuristic method for obtaining S-boxes</article-title>,&#x201D; <source>Chaos Soliton. Fract.</source>, vol. <volume>36</volume>, no. <issue>4</issue>, pp. <fpage>1028</fpage>&#x2013;<lpage>1036</lpage>, <year>2008</year>. doi: <pub-id pub-id-type="doi">10.1016/j.chaos.2006.08.003</pub-id>.</mixed-citation></ref>
</ref-list>
</back></article>