{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T06:02:57Z","timestamp":1769148177318,"version":"3.49.0"},"reference-count":27,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2019,1,16]],"date-time":"2019-01-16T00:00:00Z","timestamp":1547596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>The role of substitution boxes is very important in block ciphers. Substitution boxes are utilized to create confusion in the cryptosystem. However, to create both confusion and diffusion in any cryptosystem p-boxes and chaos base substitution boxes are designed. In this work, a simple method is presented that serves both ways. This method is based on composition of the action of symmetric group on Galois field and inversion map. This construction method provides a large number of highly non-linear substitution permutation boxes having the property of confusion as well as diffusion. These substitution permutation boxes have all the cryptography properties. Their utilization in the image encryption application is measured by majority logic criterion. We named these newly designed substitution boxes (S-boxes) as substitution permutation boxes (S-p-boxes), because they serve as both substitution boxes (S-boxes) as well as permutation boxes (p-boxes).<\/jats:p>","DOI":"10.3390\/cryptography3010006","type":"journal-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T02:22:23Z","timestamp":1547778143000},"page":"6","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes"],"prefix":"10.3390","volume":"3","author":[{"given":"Yasir","family":"Naseer","sequence":"first","affiliation":[{"name":"Department of Mathematics, Quaid-i-Azam University, Islamabad 44000, Pakistan"}]},{"given":"Tariq","family":"Shah","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Quaid-i-Azam University, Islamabad 44000, Pakistan"}]},{"given":"Dawood","family":"Shah","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Quaid-i-Azam University, Islamabad 44000, Pakistan"}]},{"given":"Sadam","family":"Hussain","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Quaid-i-Azam University, Islamabad 44000, Pakistan"}]}],"member":"1968","published-online":{"date-parts":[[2019,1,16]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Daemen, J., and Rijmen, V. (2002). The Design of Rijndael-AES: The Advanced Encryption Standard, Springer.","DOI":"10.1007\/978-3-662-04722-4_1"},{"key":"ref_2","first-page":"45","article-title":"A new S-box structure named Affine Power-Affine","volume":"3","author":"Cui","year":"2007","journal-title":"Int. J. Innov. Comput. Inf. Control"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Tran, M.T., Bui, D.K., and Doung, A.D. (2008, January 13\u201317). Gray S-box for advanced encryption standard. Proceedings of the 2008 International Conference on Computational Intelligence and Security, Suzhou, China.","DOI":"10.1109\/CIS.2008.205"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1080\/01611190802653228","article-title":"Advanced differential-style cryptanalysis of the NSA\u2019s Skipjack block cipher","volume":"33","author":"Kim","year":"2009","journal-title":"Cryptologia"},{"key":"ref_5","first-page":"1263","article-title":"A new algorithm to construct secure keys for AES","volume":"5","author":"Hussain","year":"2010","journal-title":"Int. J. Contemp. Math. Sci."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1658","DOI":"10.1186\/s40064-016-3298-7","article-title":"A Highly Non-Linear S-Box Based on A Fractional Linear Transformation","volume":"5","author":"Farwa","year":"2016","journal-title":"Springerplus"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"035001","DOI":"10.1063\/1.4978264","article-title":"An algorithm for the construction of substitution box for block ciphers based on a projective general linear group","volume":"7","author":"Altaleb","year":"2017","journal-title":"AIP Adv."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Ozkaynak, F. (2017). Construction of robust substitution boxes based on chaotic systems. Neural Comput. Appl.","DOI":"10.1007\/s00521-017-3287-y"},{"key":"ref_9","first-page":"14","article-title":"A method for obtaining cryptographically strong 8 \u00d7 8 S-boxes","volume":"2","author":"Shi","year":"2002","journal-title":"Int. Conf. Inf. Netw. Appl."},{"key":"ref_10","first-page":"5101934","article-title":"A novel construction of substitution box coset diagram and a bijective map","volume":"2017","author":"Razaq","year":"2017","journal-title":"Hindawi Secur. Commun. Netw."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/3-540-39799-X_41","article-title":"On the design of S-boxes","volume":"Volume 218","author":"Webster","year":"1986","journal-title":"Advances in Cryptology\u2014CRYPTO \u201985 Proceedings"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.aej.2015.01.003","article-title":"A novel design for the construction of safe S-boxes based on TDERC sequence","volume":"54","author":"Alkhaldi","year":"2015","journal-title":"Alex. Eng. J."},{"key":"ref_13","first-page":"4110","article-title":"Statistical analysis of S-box in image encryption applications based on majority logic criterion","volume":"6","author":"Shah","year":"2011","journal-title":"Int. J. Phys. Sci."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2450","DOI":"10.1016\/j.camwa.2012.05.017","article-title":"Construction of S8 Liu J S-boxes and their applications","volume":"64","author":"Hussain","year":"2012","journal-title":"J. Comput. Math. Appl."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Shah, T., and Shah, D. (2018). Construction of highly nonlinear S-boxes for degree 8 primitive irreducible polynomials over \u21242. Multimed. Tools Appl., 1\u201316.","DOI":"10.1007\/s11042-018-6250-8"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.micpro.2018.12.003","article-title":"A Novel Approach to improve multimedia security utilizing 3D Mixed Chaotic map","volume":"65","author":"Naseer","year":"2019","journal-title":"Microprocess. Microsyst."},{"key":"ref_17","unstructured":"Preneel, B., Dodunekov, S., Rijmen, V., and Nikova, S. (2009). Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, IOS Press."},{"key":"ref_18","first-page":"68","article-title":"Randomness analysis and generation of key-derived s-boxes","volume":"24","author":"Alvarez","year":"2016","journal-title":"Log. J. IGPL"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/0020-0190(95)00156-6","article-title":"Resistance of balanced s-boxes to linear and differential cryptanalysis","volume":"56","author":"Youssef","year":"1995","journal-title":"Inf. Process. Lett."},{"key":"ref_20","unstructured":"Ferguson, N., Lucks, S., Schneier, B., Whiting, D., Bellare, M., Kohno, T., Callas, J., and Walker, J. (2019, January 03). The Skein Hash Function Family, Version 1.3. Available online: http:\/\/www.skein-hash.info\/sites\/default\/files\/skein1.3.pdf."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/j.ins.2018.03.055","article-title":"The unified image encryption algorithm based on chaos and cubic S-Box","volume":"450","author":"Zhang","year":"2018","journal-title":"Inf. Sci."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Zhu, C., Wang, G., and Sun, K. (2018). Cryptanalysis and Improvement on an Image Encryption Algorithm Design Using a Novel Chaos Based S-Box. Symmetry, 10.","DOI":"10.3390\/sym10090399"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s40998-018-0061-9","article-title":"A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)","volume":"42","author":"Khan","year":"2018","journal-title":"Iran. J. Sci. Technol. Trans. Electr. Eng."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Zhu, C., Wang, G., and Sun, K. (2018). Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps. Entropy, 20.","DOI":"10.3390\/e20110843"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Liu, H., Kadir, A., Sun, X., and Li, Y. (2017). Chaos based adaptive double-image encryption scheme using hash function and S-boxes. Multimed. Tools Appl.","DOI":"10.1007\/s11042-016-4288-z"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1007\/s13319-017-0119-x","article-title":"Designing S-Box Based on 4D-4Wing Hyperchaotic System","volume":"8","author":"Islam","year":"2017","journal-title":"3D Res."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Zhu, S., Zhu, C., and Wang, W. (2018). A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256. Entropy, 20.","DOI":"10.3390\/e20090716"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/3\/1\/6\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:26:30Z","timestamp":1760185590000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/3\/1\/6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,16]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,3]]}},"alternative-id":["cryptography3010006"],"URL":"https:\/\/doi.org\/10.3390\/cryptography3010006","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,16]]}}}