{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T15:01:53Z","timestamp":1776956513516,"version":"3.51.4"},"reference-count":65,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T00:00:00Z","timestamp":1680134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Scientific Research Deanship at the University of Ha\u2019il, Saudi Arabia","award":["RG-21 137"],"award-info":[{"award-number":["RG-21 137"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>In this paper, we propose a new method for drawing a cryptographically strong substitution box using the Lorenz system and quantum genetic algorithm techniques. We used the chaotic function to generate an initial random sequence of bits and the quantum crossover to provide a new and improved substitution box with increased non-linearity. The aim of the proposed algorithm was to generate a strong and secure substitution box that can be utilized in symmetric cryptosystems. The use of chaotic Boolean functions, genetic algorithm techniques, and the quantum crossover helped achieve this goal, and statistical tests further confirmed the randomness and efficiency of the generated substitution box. The results of the statistical test suite showed that the substitution box produced by the proposed algorithm is a \u201cpass\u201d in terms of randomness and has strong cryptographic properties. The tests include a frequency (monobit) test, a frequency test within a block, a linear complexity test, an approximate entropy test, and a cumulative sums test among others. The p-values obtained in the tests indicate that the randomness of the generated substitution box meets the requirements of a cryptographically secure substitution box.<\/jats:p>","DOI":"10.3390\/sym15040833","type":"journal-article","created":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T03:17:35Z","timestamp":1680146255000},"page":"833","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["A Novel Strong S-Box Design Using Quantum Crossover and Chaotic Boolean Functions for Symmetric Cryptosystems"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0581-7178","authenticated-orcid":false,"given":"Haitham","family":"Alsaif","sequence":"first","affiliation":[{"name":"College of Engineering, University of Ha\u2019il, Ha\u2019il City 2240, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8759-0151","authenticated-orcid":false,"given":"Ramzi","family":"Guesmi","sequence":"additional","affiliation":[{"name":"ISLAI B\u00e9ja, University of Jendouba, Beja 9000, Tunisia"},{"name":"Laboratory of Electronics and Information Technology, National Engineering School of Sfax, Sfax University, Sfax 3038, Tunisia"}]},{"given":"Anwar","family":"Kalghoum","sequence":"additional","affiliation":[{"name":"CRISTAL LAB, National School of Computer Science, Manouba 2010, Tunisia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6819-3695","authenticated-orcid":false,"given":"Badr M.","family":"Alshammari","sequence":"additional","affiliation":[{"name":"College of Engineering, University of Ha\u2019il, Ha\u2019il City 2240, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8221-2610","authenticated-orcid":false,"given":"Tawfik","family":"Guesmi","sequence":"additional","affiliation":[{"name":"College of Engineering, University of Ha\u2019il, Ha\u2019il City 2240, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2023,3,30]]},"reference":[{"key":"ref_1","unstructured":"Rijmen, V. (2000). Efficient Implementation of the Rijndael S-Box, Katholieke Universiteit Leuven, Department of Electrical Engineering ESAT."},{"key":"ref_2","unstructured":"Mister, S., and Adams, C. (,  1996). Practical S-box design. Proceedings of the Workshop on Selected Areas in Cryptography, SAC, Kingston, ON, Canada. Available online: https:\/\/sacworkshop.org\/SAC-history.html."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Carlet, C., Crama, Y., and Hammer, P.L. (2010). Boolean Functions for Cryptography and Error-Correcting Codes, Universiry of Paris.","DOI":"10.1017\/CBO9780511780448.011"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"045202","DOI":"10.1103\/PhysRevE.80.045202","article-title":"Boolean chaos","volume":"80","author":"Zhang","year":"2009","journal-title":"Phys. Rev. E"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Jiang, Z., and Ding, Q. (2021). Construction of an S-box based on chaotic and bent functions. Symmetry, 13.","DOI":"10.3390\/sym13040671"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Tito-Corrioso, O., Borges-Trenard, M.A., Borges-Quintana, M., Rojas, O., and Sosa-G\u00f3mez, G. (2021). Study of Parameters in the Genetic Algorithm for the Attack on Block Ciphers. Symmetry, 13.","DOI":"10.3390\/sym13050806"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"7201","DOI":"10.1007\/s00521-018-3557-3","article-title":"A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map","volume":"31","author":"Ahmed","year":"2019","journal-title":"Neural Comput. Appl."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1715","DOI":"10.1007\/s11277-018-5787-1","article-title":"ABC optimization based construction of strong substitution-boxes","volume":"101","author":"Ahmad","year":"2018","journal-title":"Wirel. Pers. Commun."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Akhtar, T., Din, N., and Uddin, J. (2019, January 12\u201314). Substitution box design based on chaotic maps and cuckoo search algorithm. Proceedings of the 2019 International Conference on Advanced Communication Technologies and Networking (CommNet), Rabat, Morocco.","DOI":"10.1109\/COMMNET.2019.8742391"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Guesmi, R., Farah, M.A.B., Kachouri, A., and Samet, M. (2014, January 10\u201313). A novel design of Chaos based S-Boxes using genetic algorithm techniques. Proceedings of the 2014 IEEE\/ACS 11th International Conference on Computer Systems and Applications (AICCSA), Doha, Qatar.","DOI":"10.1109\/AICCSA.2014.7073265"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1016\/j.ins.2021.07.036","article-title":"An effective method to improve nonlinearity value of substitution boxes based on random selection","volume":"576","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Guesmi, R., Farah, M.A.B., Kachouri, A., and Samet, M. (2015, January 16\u201319). Chaos-based designing of a highly nonlinear S-box using Boolean functions. Proceedings of the 2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15), Mahdia, Tunisia.","DOI":"10.1109\/SSD.2015.7348106"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"3041","DOI":"10.1007\/s11071-019-05413-8","article-title":"An image encryption scheme based on a new hybrid chaotic map and optimized substitution box","volume":"99","author":"Farah","year":"2020","journal-title":"Nonlinear Dyn."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"131","DOI":"10.4018\/IJRSDA.2018040107","article-title":"Random search based efficient chaotic substitution box design for image encryption","volume":"5","author":"Ahmad","year":"2018","journal-title":"Int. J. Rough Sets Data Anal."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1007\/s00521-016-2511-5","article-title":"A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutation","volume":"29","author":"Khan","year":"2018","journal-title":"Neural Comput. Appl."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"13157","DOI":"10.1007\/s11042-020-10440-4","article-title":"A new image encryption scheme with Feistel like structure using chaotic S-box and Rubik cube based P-box","volume":"80","author":"Mousavi","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/s11071-017-3874-6","article-title":"A novel scheme for image encryption using substitution box and chaotic system","volume":"91","author":"Ullah","year":"2018","journal-title":"Nonlinear Dyn."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1140\/epjp\/s13360-020-00187-0","article-title":"A new algorithm for the construction of substitution box by using chaotic map","volume":"135","author":"Shafique","year":"2020","journal-title":"Eur. Phys. J. Plus"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Artu\u011fer, F., and \u00d6zkaynak, F. (2020). A novel method for performance improvement of chaos-based substitution boxes. Symmetry, 12.","DOI":"10.3390\/sym12040571"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Zahid, A.H., and Arshad, M.J. (2019). An innovative design of substitution-boxes using cubic polynomial mapping. Symmetry, 11.","DOI":"10.3390\/sym11030437"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1550147719895957","DOI":"10.1177\/1550147719895957","article-title":"An efficient construction of key-dependent substitution box based on chaotic sine map","volume":"15","author":"Usama","year":"2019","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"9389065","DOI":"10.1155\/2018\/9389065","article-title":"Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map","volume":"2018","author":"Alzaidi","year":"2018","journal-title":"Complexity"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Lawnik, M., and Berezowski, M. (2022). New chaotic system: M-map and its application in chaos-based cryptography. Symmetry, 14.","DOI":"10.3390\/sym14050895"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Zhu, D., Tong, X., Zhang, M., and Wang, Z. (2020). A new S-box generation method and advanced design based on combined chaotic system. Symmetry, 12.","DOI":"10.3390\/sym12122087"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Wan, P.Y., Liao, T.L., Yan, J.J., and Tsai, H.H. (2019). Discrete sliding mode control for chaos synchronization and its application to an improved El-Gamal cryptosystem. Symmetry, 11.","DOI":"10.3390\/sym11070843"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1007\/s11071-015-2173-3","article-title":"A novel image encryption scheme based on multiple chaotic S-boxes","volume":"82","author":"Khan","year":"2015","journal-title":"Nonlinear Dyn."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2407","DOI":"10.1007\/s11071-016-3199-x","article-title":"A novel method of S-box design based on discrete chaotic map","volume":"87","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s13319-017-0119-x","article-title":"Designing S-box based on 4D-4wing hyperchaotic system","volume":"8","author":"Islam","year":"2017","journal-title":"3D Res."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Gabr, M., Younis, H., Ibrahim, M., Alajmy, S., Khalid, I., Azab, E., Elias, R., and Alexan, W. (2022). Application of DNA Coding, the Lorenz Differential Equations and a Variation of the Logistic Map in a Multi-Stage Cryptosystem. Symmetry, 14.","DOI":"10.3390\/sym14122559"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Alexan, W., ElBeltagy, M., and Aboshousha, A. (2022). Rgb image encryption through cellular automata, s-box and the lorenz system. Symmetry, 14.","DOI":"10.3390\/sym14030443"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/18.6037","article-title":"A spectral characterization of correlation-immune combining functions","volume":"34","author":"Xiao","year":"1988","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_32","unstructured":"Pasalic, E. (2003). On Boolean Functions in Symmetric-Key Ciphers, Lund University."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1103\/RevModPhys.73.357","article-title":"Quantum-state engineering with Josephson-junction devices","volume":"73","author":"Makhlin","year":"2001","journal-title":"Rev. Mod. Phys."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"4091","DOI":"10.1103\/PhysRevLett.74.4091","article-title":"Quantum computations with cold trapped ions","volume":"74","author":"Cirac","year":"1995","journal-title":"Phys. Rev. Lett."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"161203","DOI":"10.1103\/PhysRevB.74.161203","article-title":"Room-temperature manipulation and decoherence of a single spin in diamond","volume":"74","author":"Hanson","year":"2006","journal-title":"Phys. Rev. B"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1080\/00018730701223200","article-title":"Ultracold atomic gases in optical lattices: Mimicking condensed matter physics and beyond","volume":"56","author":"Lewenstein","year":"2007","journal-title":"Adv. Phys."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1038\/s41586-019-1666-5","article-title":"Quantum supremacy using a programmable superconducting processor","volume":"574","author":"Arute","year":"2019","journal-title":"Nature"},{"key":"ref_38","unstructured":"Gruska, J. (1999). Quantum Computing, McGraw-Hill."},{"key":"ref_39","unstructured":"Barnum, H., Bernstein, H.J., and Spector, L. (1999). A quantum circuit for OR. arXiv."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Leier, A., and Banzhaf, W. (2003, January 12\u201316). Evolving Hogg\u2019s quantum algorithm using linear-tree GP. Proceedings of the Genetic and Evolutionary Computation\u2014GECCO 2003: Genetic and Evolutionary Computation Conference, Chicago, IL, USA.","DOI":"10.1007\/3-540-45105-6_48"},{"key":"ref_41","first-page":"231","article-title":"QGA: A quantum genetic algorithm","volume":"12","author":"Malossini","year":"2008","journal-title":"IEEE Trans. Neural Netw. Publ. IEEE Neural Netw. Counc."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1109\/TEVC.2007.905006","article-title":"Quantum genetic optimization","volume":"12","author":"Malossini","year":"2008","journal-title":"IEEE Trans. Evol. Comput."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"3105","DOI":"10.1109\/TIT.2006.876253","article-title":"Algebraic immunity for cryptographically significant Boolean functions: Analysis and construction","volume":"52","author":"Carlet","year":"2006","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_44","unstructured":"Webster, A., and Tavares, S. (1985, January 18\u201322). On the design of S-boxes in Advances in Cryptology. Proceedings of the CRYPTO\u2019 85, Santa Barbara, CA, USA."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","article-title":"Differential cryptanalysis of DES-like cryptosystems","volume":"4","author":"Biham","year":"1991","journal-title":"J. Cryptol."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Holland, J.H. (1992). Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence, MIT Press.","DOI":"10.7551\/mitpress\/1090.001.0001"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2","article-title":"Deterministic nonperiodic flow","volume":"20","author":"Lorenz","year":"1963","journal-title":"J. Atmos. Sci."},{"key":"ref_48","unstructured":"Weisstein, E.W. (2023, March 20). Logistic Equation. Available online: https:\/\/mathworld.wolfram.com\/."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1109\/83.236536","article-title":"A generalized Gaussian image model for edge-preserving MAP estimation","volume":"2","author":"Bouman","year":"1993","journal-title":"IEEE Trans. Image Process."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Aharonov, D., Kitaev, A., and Nisan, N. (1998, January 24\u201326). Quantum circuits with mixed states. Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, Dallas, TX, USA.","DOI":"10.1145\/276698.276708"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Wang, J., Zhu, Y., Zhou, C., and Qi, Z. (2020). Construction method and performance analysis of chaotic S-box based on a memorable simulated annealing algorithm. Symmetry, 12.","DOI":"10.3390\/sym12122115"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Alshammari, B.M., Guesmi, R., Guesmi, T., Alsaif, H., and Alzamil, A. (2021). Implementing a symmetric lightweight cryptosystem in highly constrained IoT devices by using a chaotic S-box. Symmetry, 13.","DOI":"10.3390\/sym13010129"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Tian, P., and Su, R. (2022). A Novel Virtual Optical Image Encryption Scheme Created by Combining Chaotic S-Box with Double Random Phase Encoding. Sensors, 22.","DOI":"10.3390\/s22145325"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1007\/s11071-020-05503-y","article-title":"A new discrete-space chaotic map based on the multiplication of integer numbers and its application in S-box design","volume":"100","year":"2020","journal-title":"Nonlinear Dyn."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"39753","DOI":"10.1007\/s11042-022-12828-w","article-title":"A new steganographic algorithm based on coupled chaotic maps and a new chaotic S-box","volume":"81","author":"Hematpour","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1007\/s11071-016-3099-0","article-title":"A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system","volume":"87","author":"Zengin","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"2150152","DOI":"10.1142\/S0218127421501522","article-title":"A novel lightweight block encryption algorithm based on combined chaotic S-box","volume":"31","author":"Tong","year":"2021","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1007\/s11071-021-06308-3","article-title":"Design and application of an S-box using complete Latin square","volume":"104","author":"Hua","year":"2021","journal-title":"Nonlinear Dyn."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"15703","DOI":"10.1007\/s10489-022-03174-3","article-title":"An image encryption algorithm using a dynamic S-box and chaotic maps","volume":"52","author":"Zheng","year":"2022","journal-title":"Appl. Intell."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1007\/s11760-016-1007-1","article-title":"A new S-box construction method based on the fractional-order chaotic Chen system","volume":"11","year":"2017","journal-title":"Signal Image Video Process."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/81.904880","article-title":"Chaos and cryptography: Block encryption ciphers based on chaotic maps","volume":"48","author":"Jakimoski","year":"2001","journal-title":"IEEE Trans. Circuits Syst. Fundam. Theory Appl."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Crocetti, L., Nannipieri, P., Di Matteo, S., Fanucci, L., and Saponara, S. (2023). Review of Methodologies and Metrics for Assessing the Quality of Random Number Generators. Electronics, 12.","DOI":"10.3390\/electronics12030723"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"de la Fraga, L.G., and Ovilla-Mart\u00ednez, B. (2023). Generating Even More Chaotic Instances in Hardware. Electronics, 12.","DOI":"10.3390\/electronics12020332"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Smid, M., and Barker, E. (2001). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, Booz-Allen and Hamilton Inc.. Technical Report.","DOI":"10.6028\/NIST.SP.800-22"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Bassham, L.E., Rukhin, A.L., Soto, J., Nechvatal, J.R., Smid, M.E., Barker, E.B., Leigh, S.D., Levenson, M., Vangel, M., and Banks, D.L. (2010). SP 800-22 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, National Institute of Standards & Technology.","DOI":"10.6028\/NIST.SP.800-22r1a"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/15\/4\/833\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:06:48Z","timestamp":1760123208000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/15\/4\/833"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,30]]},"references-count":65,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2023,4]]}},"alternative-id":["sym15040833"],"URL":"https:\/\/doi.org\/10.3390\/sym15040833","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,30]]}}}