{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T12:09:33Z","timestamp":1747915773409,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T00:00:00Z","timestamp":1665964800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T00:00:00Z","timestamp":1665964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s13198-022-01766-3","type":"journal-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T20:35:25Z","timestamp":1666038925000},"page":"2963-2970","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A new S-box design by applying Swarm Intelligence based technique"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1262-6970","authenticated-orcid":false,"given":"Maiya","family":"Din","sequence":"first","affiliation":[]},{"given":"Saibal K.","family":"Pal","sequence":"additional","affiliation":[]},{"given":"S. K.","family":"Muttoo","sequence":"additional","affiliation":[]},{"given":"Sushila","family":"Madan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,17]]},"reference":[{"key":"1766_CR1","unstructured":"Stinson DR (2013) Cryptography: Theory and Practice. 3rd Edition, Chapman & Hall\/CRC Publication, 593p"},{"key":"1766_CR2","doi-asserted-by":"crossref","unstructured":"Bogdanov A, Knudsen LR, Leander G, Paar C et al (2007) PRESENT-Ultra Lightweight Block Cipher. In Proc. Of the 9th Intl Workshop on Cryptographic Hardware and Embedded Systems, CHES \u201907, Springer-Verlag, pp\u00a0450\u2013466","DOI":"10.1007\/978-3-540-74735-2_31"},{"issue":"1","key":"1766_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J of Cryptology 4(1):3\u201372","journal-title":"J of Cryptology"},{"key":"1766_CR4","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/81.904880","volume":"48","author":"G Jakimoski","year":"2001","unstructured":"Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circuits Systems 48:163","journal-title":"IEEE Trans Circuits Systems"},{"key":"1766_CR5","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.chaos.2004.04.023","volume":"23","author":"G Tang","year":"2005","unstructured":"Tang G, Liao XF, Chen Y (2005) A novel method for designing S-boxes based on chaotic maps. Chaos Solitons Fractals 23:413\u2013419","journal-title":"Chaos Solitons Fractals"},{"issue":"3","key":"1766_CR6","doi-asserted-by":"publisher","first-page":"1791","DOI":"10.1007\/s11071-012-0573-1","volume":"70","author":"I Hussain","year":"2012","unstructured":"Hussain I, Shah T, Gondal M (2012) A Novel approach for designing substitution boxes based on nonlinear chaotic algorithm. Nonlinear Dyn 70(3):1791\u20131794","journal-title":"Nonlinear Dyn"},{"issue":"6","key":"1766_CR7","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1016\/j.physleta.2012.01.009","volume":"376","author":"Y Wang","year":"2012","unstructured":"Wang Y, Wong K-W, Li C, Li Y (2012) A novel method to design S-box based on chaotic map and genetic algorithm. Phy Letter A 376(6):827\u2013833","journal-title":"Phy Letter A"},{"key":"1766_CR8","doi-asserted-by":"crossref","unstructured":"Ahmad M, Bhatia D, Hassan Y (2015) A novel ant colony optimization based scheme for substitution box design, Proc. Computer Science, 57,572\u2013580","DOI":"10.1016\/j.procs.2015.07.394"},{"issue":"2","key":"1766_CR9","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1007\/s11071-016-3295-y","volume":"88","author":"T Farah","year":"2017","unstructured":"Farah T, Rhouma R, Belghith S (2017) A novel method for designing S-box based on chaotic map and Teaching-Learning-Based Optimization. Nonlinear Dyn 88(2):1059\u20131074","journal-title":"Nonlinear Dyn"},{"key":"1766_CR10","doi-asserted-by":"publisher","first-page":"7201","DOI":"10.1007\/s00521-018-3557-3","volume":"31","author":"HA Ahmed","year":"2018","unstructured":"Ahmed HA, Zolkipli MF, Ahmad M (2018) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Nat Comput Appl 31:7201\u20137210. https:\/\/doi.org\/10.1007\/s00521-018-3557-3","journal-title":"Nat Comput Appl"},{"key":"1766_CR11","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.swevo.2013.06.001","volume":"13","author":"I Fister","year":"2013","unstructured":"Fister I, Fister I Jr, Yang X-S, Brest J (2013) A comprehensive review of firefly algorithm. Swarm Evol Computing 13:34\u201346","journal-title":"Swarm Evol Computing"},{"issue":"2","key":"1766_CR12","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1504\/IJBIC.2010.032124","volume":"2","author":"X-S Yang","year":"2010","unstructured":"Yang X-S (2010) Firefly algorithm, stochastic test functions and design optimization. Int J Bio-Inspired Computing 2(2):78\u201384","journal-title":"Int J Bio-Inspired Computing"},{"issue":"3","key":"1766_CR13","doi-asserted-by":"publisher","first-page":"1180","DOI":"10.1016\/j.asoc.2011.09.017","volume":"12","author":"X-S Yang","year":"2012","unstructured":"Yang X-S, Hosseini SSS, Gandomi AH (2012) Firefly algorithm for solving non-convex economic dispatch problems with value loading effect. Appl Soft Computing 12(3):1180\u20131186","journal-title":"Appl Soft Computing"},{"issue":"3","key":"1766_CR14","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.swevo.2011.06.003","volume":"1","author":"J Senthilnath","year":"2011","unstructured":"Senthilnath J, Omkar S, Mani V (2011) Clustering using firefly algorithm; performance study. Swarm Evol Computing 1(3):164\u2013171","journal-title":"Swarm Evol Computing"},{"key":"1766_CR15","volume-title":"Studies in computational intelligence","author":"X-S Yang","year":"2014","unstructured":"Yang X-S (2014) Cuckoo Search and firefly algorithm. Studies in computational intelligence, vol 516. Springer, Switzerland"},{"issue":"1","key":"1766_CR16","first-page":"89","volume":"18","author":"A Gandomi","year":"2013","unstructured":"Gandomi A, Yang X-S, Talatahari S et al (2013) Firefly algorithm with chaos, Common Nonlinear. Sci Numer Simul 18(1):89\u201398","journal-title":"Sci Numer Simul"},{"key":"1766_CR17","doi-asserted-by":"crossref","unstructured":"Yang X-S (2015) Analysis of firefly algorithm and automatic parameter tuning. Inemerging research on swarm intelligence and algorithm optimization, IGI Global,36\u201349","DOI":"10.4018\/978-1-4666-6328-2.ch002"},{"key":"1766_CR18","doi-asserted-by":"crossref","unstructured":"Yang X-S (2009) Firefly algorithms for multimodal optimization. International Symposium on Stochastic Algorithms, 169-178p","DOI":"10.1007\/978-3-642-04944-6_14"},{"key":"1766_CR19","unstructured":"Yang XS, Cui Z, Xiao R, Gandomi AH (2013) Swarm Intelligence and Bio-Inspired Computations: Theory and Applications. Elsevier Publication, p 450"},{"key":"1766_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-71078-3_1","volume-title":"Cryptography and cryptanalysis through computational intelligence","author":"EC Laskari","year":"2007","unstructured":"Laskari EC, Meletiou GC, Stamatiou YC, Vrahatis MN (2007) Cryptography and cryptanalysis through computational intelligence, vol 57. Springer, Berlin, Heidelberg, pp 1\u201349. https:\/\/doi.org\/10.1007\/978-3-540-71078-3_1"},{"key":"1766_CR21","doi-asserted-by":"crossref","unstructured":"Din M, Pal SK, Muttoo SK (2018) A Review of Computational Swarm Intelligence Techniques for Solving Crypto Problems, Proceeding of International Conference SoCTA-2017, AISC, 742, 193\u2013204, Springer Publication","DOI":"10.1007\/978-981-13-0589-4_18"},{"key":"1766_CR22","doi-asserted-by":"crossref","unstructured":"Din M, Pal SK, Muttoo SK (2019) Applying PSO based Technique for Analysis of Geffe Generator Cryptosystem, Proceeding of International Conference ICHSA-2018, AISC, 741, 741\u2013749, Springer Publication","DOI":"10.1007\/978-981-13-0761-4_71"},{"key":"1766_CR23","doi-asserted-by":"crossref","unstructured":"Din M, Pal SK, Muttoo SK (2019) Analysis of RC4 Crypts using PSO based Swarm Technique, Proceeding of International Conference ICHSA-2018, AISC, 741, 1049\u20131056, Springer Publication","DOI":"10.1007\/978-981-13-0761-4_98"},{"key":"1766_CR24","doi-asserted-by":"crossref","unstructured":"Webster A, Tavares S (1986) On the design of S-boxes. In: Advances in cryptology: Proc of CRYPTO85. Lecture notes in computer science, 523 \u2013 34","DOI":"10.1007\/3-540-39799-X_41"},{"key":"1766_CR25","doi-asserted-by":"crossref","unstructured":"Asim M, Jeoti V (2008) Efficient and simple method for designing chaotic S-boxes. ETRI J. x1, 170\u2013172","DOI":"10.4218\/etrij.08.0207.0188"},{"issue":"3","key":"1766_CR26","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/s11071-013-0987-4","volume":"74","author":"F Ozkaynak","year":"2013","unstructured":"Ozkaynak F, Yavuz S (2013) Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn 74(3):551\u2013557","journal-title":"Nonlinear Dyn"},{"key":"1766_CR27","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.chaos.2013.11.001","volume":"58","author":"D Lambic","year":"2014","unstructured":"Lambic D (2014) A novel method of S-box design based on chaotic map and composition method. Chaos Solitons and Fractals 58:16\u201321","journal-title":"Chaos Solitons and Fractals"},{"key":"1766_CR28","doi-asserted-by":"crossref","unstructured":"Ahmad M, Ahmad F, Nasim Z, Bano Z, Zafar S (2015) Designing chaos based strong substitution box. Proc. of eighth international conference on contemporary computing (IC3).","DOI":"10.1109\/IC3.2015.7346660"},{"key":"1766_CR29","doi-asserted-by":"crossref","unstructured":"Ahmad M, Seeru F, Siddiqi AM, Masood S (2018) Dynamic 9 \u00d7 9 substitution-boxes using Chaos-based heuristic search. : soft computing: theories and applications. Springer, pp 839\u2013851","DOI":"10.1007\/978-981-10-5687-1_75"},{"key":"1766_CR30","doi-asserted-by":"publisher","unstructured":"Alhadawi HS, Majid MA, Lambic D, Ahmad M (2020) A novel method of S-box design based on discrete chaotic maps and Cuckoo search algorithm, Multimedia Tools and Applications, part of Springer Nature-2020. https:\/\/doi.org\/10.1007\/s11042-020-10048-8","DOI":"10.1007\/s11042-020-10048-8"},{"issue":"7","key":"1766_CR31","doi-asserted-by":"publisher","first-page":"525","DOI":"10.3390\/e20070525","volume":"20","author":"E Al Solami","year":"2018","unstructured":"Al Solami E, Ahmad M, Volos C, Doja M, Beg M (2018) A new hyper chaotic system-based design for efficient Bijective substitution-boxes. Entropy 20(7):525","journal-title":"Entropy"},{"key":"1766_CR32","doi-asserted-by":"crossref","unstructured":"Matsui M (1993) Linear cryptanalysis method for DES cipher,Workshop on the theory and application of cryptographic techniques,386\u2013397","DOI":"10.1007\/3-540-48285-7_33"},{"key":"1766_CR33","doi-asserted-by":"crossref","unstructured":"Dawson M, Tavares SE (1991) An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks,Workshop on the theory and application of cryptographic techniques,352\u2013367","DOI":"10.1007\/3-540-46416-6_30"},{"key":"1766_CR34","doi-asserted-by":"crossref","unstructured":"Wang Y, Xie Q, Wu Y, Du B (2009) A software for S-box performance analysis and test, Proc. International Conference on Electronic commerce and business intelligence, 125\u2013128","DOI":"10.1109\/ECBI.2009.15"},{"key":"1766_CR35","doi-asserted-by":"crossref","unstructured":"Bennis F, Bhattacharjya RK (eds) (2020) Nature-Inspired Methods for Meta-heuristics Optimization \u2013 Modeling and Optimization in Science and Technology. Springer Nature Switzerland AG, p 488","DOI":"10.1007\/978-3-030-26458-1"},{"issue":"4","key":"1766_CR36","doi-asserted-by":"publisher","first-page":"1867","DOI":"10.1007\/s11071-015-2283-y","volume":"82","author":"G Liu","year":"2015","unstructured":"Liu G, Yang W, Liu W, Dai Y (2015) Designing S-boxes based on 3-D four-wing autonomous chaotic system. Nonlinear Dyn 82(4):1867\u20131877","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"1766_CR37","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1007\/s11071-016-3099-0","volume":"87","author":"Z Cavuoglu Unal","year":"2017","unstructured":"Cavuoglu Unal Z, Ahmet PI, Kacar Sezgin (2017) A novel approach for strong S-box generation algorithm design based on chaotic scaled Zhongtang system. Nonlinear Dyn 87(2):1081\u20131094","journal-title":"Nonlinear Dyn"},{"issue":"4","key":"1766_CR38","doi-asserted-by":"publisher","first-page":"2407","DOI":"10.1007\/s11071-016-3199-x","volume":"87","author":"D Lambic","year":"2017","unstructured":"Lambic D (2017) A novel method of S-box design based on discrete chaotic map. Nonlinear Dyn 87(4):2407\u20132413","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"1766_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00521-017-3287-y","volume":"31","author":"F Ozkaynak","year":"2019","unstructured":"Ozkaynak F (2019) Construction of robust substitution boxes based on chaotic systems. Neural Comput Appl 31(3):1\u201310. DOI: https:\/\/doi.org\/10.1007\/s00521-017-3287-y","journal-title":"Neural Comput Appl"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-022-01766-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-022-01766-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-022-01766-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T06:21:35Z","timestamp":1670221295000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-022-01766-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,17]]},"references-count":39,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["1766"],"URL":"https:\/\/doi.org\/10.1007\/s13198-022-01766-3","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"type":"print","value":"0975-6809"},{"type":"electronic","value":"0976-4348"}],"subject":[],"published":{"date-parts":[[2022,10,17]]},"assertion":[{"value":"7 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This is submitted that- Consent of the authors of this paper has been taken for submitting the paper to the IJSA Journal. There is no conflict of interest (financial\/ non-financial) among the co-authors due to submission of the paper in the journal.- The submitted research work did not involve human participants and\/ or animals.- The corresponding author has intimated to the concerned organization before submission of the paper to the IJSA journal.- The reported work in the paper submitted for publication in the IJSA Journal is original. Proper citations to the previously reported work have been given.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance of ethical standards"}}]}}