{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T19:25:15Z","timestamp":1772133915925,"version":"3.50.1"},"reference-count":29,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2019,3,8]],"date-time":"2019-03-08T00:00:00Z","timestamp":1552003200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>The Advanced Encryption Standard (AES) is widely used in different kinds of security applications. The substitution box (S-box) is the main component of many modern symmetric encryption ciphers that provides confusion between the secret key and ciphertext. The S-box component that is used in AES is fixed. If we construct this component dynamically, the encryption strength of AES would be greater than before. In this manuscript, we used chaotic logistic map, Mobius transformation and symmetric group     S 256     to construct S-box for AES. The idea behind the proposed work is to make supplementary safe S-box. The presented S-box is analyzed for the following analyses: linear approximation probability (LP), nonlinearity (NL), differential approximation probability (DP), strict avalanche criterion (SAC), and bit independence criterion (BIC). The analyses show that the proposed technique is useful in generating high resistance S-box to known attacks.<\/jats:p>","DOI":"10.3390\/sym11030351","type":"journal-article","created":{"date-parts":[[2019,3,8]],"date-time":"2019-03-08T04:58:35Z","timestamp":1552021115000},"page":"351","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":63,"title":["Construction of S-Box Based on Chaotic Map and Algebraic Structures"],"prefix":"10.3390","volume":"11","author":[{"given":"Iqtadar","family":"Hussain","sequence":"first","affiliation":[{"name":"Department of Mathematics, Statistics and Physics, Qatar University, Doha 2713, Qatar"}]},{"given":"Amir","family":"Anees","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, HITEC University, Taxila 47080, Pakistan"}]},{"given":"Temadher Alassiry","family":"Al-Maadeed","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Statistics and Physics, Qatar University, Doha 2713, Qatar"}]},{"given":"Muhammad Tahir","family":"Mustafa","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Statistics and Physics, Qatar University, Doha 2713, Qatar"}]}],"member":"1968","published-online":{"date-parts":[[2019,3,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication Theory of Secrecy Systems","volume":"28","author":"Shannon","year":"1949","journal-title":"Bell Syst. Tech. J."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Daemen, J., and Rijmen, V. (2002). The Design of RijndaeL: AES-The Advanced Encryption Standard, Springer.","DOI":"10.1007\/978-3-662-04722-4_1"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1387","DOI":"10.3390\/e17031387","article-title":"Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing","volume":"17","author":"Shukla","year":"2015","journal-title":"Entropy"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"T-Herrera, E.J., Karp, J., T\u00e1vora, M., and Santos, L.F. (2016). Realistic Many-Body Quantum Systems vs. Full Random Matrices: Static and Dynamical Properties. Entropy, 18.","DOI":"10.3390\/e18100359"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Boeing, G. (2016). Visual Analysis of Nonlinear Dynamical Systems: Chaos, Fractals, Self-Similarity and the Limits of Prediction. Systems, 4.","DOI":"10.3390\/systems4040037"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2771","DOI":"10.1007\/s11277-014-1667-5","article-title":"A Noisy Channel Tolerant Image Encryption Scheme","volume":"77","author":"Ahmed","year":"2014","journal-title":"Wirel. Person. Commun."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Ahmed, F., and Anees, A. (2015). Hash-Based Authentication of Digital Images in Noisy Channels. Robust Image Authentication in the Presence of Noise, Springer.","DOI":"10.1007\/978-3-319-13156-6_1"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1016\/j.chaos.2006.05.011","article-title":"A novel algorithm for image encryption based on mixture of chaotic maps","volume":"35","author":"Behnia","year":"2015","journal-title":"Chaos Solitons Fractals"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"3106","DOI":"10.1016\/j.cnsns.2014.02.011","article-title":"Chaotic substitution for highly autocorrelated data in encryption algorithm","volume":"19","author":"Anees","year":"2014","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1007\/s11071-013-1105-3","article-title":"A technique for digital steganography using chaotic maps","volume":"75","author":"Anees","year":"2014","journal-title":"Nonlinear Dyn."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1083","DOI":"10.1007\/s00521-012-1035-x","article-title":"Analysis of optimized signal processing algorithms for smart antenna system","volume":"23","author":"Gondal","year":"2013","journal-title":"Neural Comput. Appl."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"479","DOI":"10.5560\/zna.2013-0022","article-title":"Application of Mean of Absolute Deviation Method for the Selection of Best Nonlinear Component Based on Video Encryption","volume":"68","author":"Anees","year":"2013","journal-title":"Z. f\u00fcr Naturforsch. A"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1007\/s11277-015-2295-4","article-title":"A Technique for Designing Substitution Box Based on Van der Pol Oscillator","volume":"82","author":"Anees","year":"2015","journal-title":"Wirel. Person. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Anees, A., and Gondal, M.A. (2015). Construction of Nonlinear Component for Block Cipher Based on One-Dimensional Chaotic Map. 3D Res., 6.","DOI":"10.1007\/s13319-015-0049-4"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Anees, A., and Siddiqui, A.M. (2013, January 11\u201312). A technique for digital watermarking in combined spatial and transform domains using chaotic maps. Proceedings of the IEEE 2nd National Conference on Information Assurance (NCIA), Rawalpindi, Pakistan.","DOI":"10.1109\/NCIA.2013.6725335"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Ansari, K.J., Ahmad, I., Mursaleen, M., and Hussain, I. (2018). On Some Statistical Approximation by (p,q)-Bleimann, Butzer and Hahn Operators. Symmetry, 10.","DOI":"10.3390\/sym10120731"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.physd.2018.02.003","article-title":"Geometric chaos indicators and computations of the spherical hypertube manifolds of the spatial circular restricted three-body problem","volume":"373","author":"Guzzo","year":"2018","journal-title":"Phys. D"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1016\/j.chaos.2018.03.034","article-title":"Detecting chaos and predicting in Dow Jones Index","volume":"110","author":"Alves","year":"2018","journal-title":"Chaos Solitons Fractals"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s11071-017-3819-0","article-title":"Nonlinear systems synchronization for modeling two-phase microfluidics flows","volume":"92","author":"Cairone","year":"2018","journal-title":"Nonlinear Dyn."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2","article-title":"Deterministic Nonperiodic Flow","volume":"20","author":"Lorenz","year":"1963","journal-title":"J. Atmos. Sci."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/s00332-014-9194-9","article-title":"Entrainment by Chaos","volume":"24","author":"Akhmet","year":"2014","journal-title":"J. Nonlinear Sci."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1007\/s00332-007-9015-5","article-title":"Chaotic Dynamics of a Delayed Discrete Time Hopfield Network of Two Nonidentical Neurons with no Self-Connections","volume":"18","author":"Kaslik","year":"2008","journal-title":"J. Nonlinear Sci."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1917","DOI":"10.1016\/j.physd.2009.06.021","article-title":"Experimental robust synchronization of hyperchaotic circuits","volume":"238","author":"Buscarino","year":"2009","journal-title":"Phys. D"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1140\/epjp\/i2018-11987-x","article-title":"A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps","volume":"133","author":"Hussain","year":"2018","journal-title":"Eur. Phys. J. Plus"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1609","DOI":"10.1016\/j.cjph.2018.04.013","article-title":"Construction of chaotic quantum magnets and matrix Lorenz systems S-boxes and their applications","volume":"56","author":"Hussain","year":"2018","journal-title":"Chin. J. Phys."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"447","DOI":"10.3233\/JIN-180081","article-title":"A novel algorithm for thermal image encryption","volume":"17","author":"Hussain","year":"2018","journal-title":"J. Integr. Neurosci."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s13319-015-0059-2","article-title":"An Image Encryption Scheme Based on Lorenz System for Low Profile Applications","volume":"6","author":"Anees","year":"2015","journal-title":"3D Res."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/7384.963463","article-title":"Chaos-based cryptography: A brief overview","volume":"1","author":"Kocarev","year":"2001","journal-title":"IEEE Circuits Syst. Mag."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1126\/science.186.4164.645","article-title":"Biological populations with non overlapping generations, stable points, stable cycles, and chaos","volume":"186","author":"May","year":"1974","journal-title":"Science"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/3\/351\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:37:19Z","timestamp":1760186239000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/3\/351"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,8]]},"references-count":29,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2019,3]]}},"alternative-id":["sym11030351"],"URL":"https:\/\/doi.org\/10.3390\/sym11030351","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,8]]}}}