Algorithm for generating S-box using trigonometric function
Main Article Content
Abstract
Substitution boxes, commonly known as S-boxes, are one of the most important nonlinear components of modern symmetric-key block encryption algorithms. Their main task is to introduce confusion and nonlinear transformation into the encryption process so that the relationship between plaintext, ciphertext, and secret key becomes difficult to analyze. In Feistel networks and substitution–permutation networks, the S-box plays a central role in strengthening the resistance of a cipher against linear, differential, and algebraic cryptanalysis. This paper presents an algorithm for generating cryptographically strong 8×8 S-boxes using trigonometric transformation. The proposed approach is based on nonlinear numerical behavior produced by trigonometric functions and parameter-controlled transformations. By selecting different values of the control parameters, a large number of candidate S-boxes can be generated. These candidates are then evaluated according to standard cryptographic criteria, including nonlinearity, Strict Avalanche Criterion, Differential Probability, Linear Approximation Probability, and Fixed Point Analysis. The experimental results show that the generated S-box achieves a minimum nonlinearity of 100, a maximum nonlinearity of 112, and an average nonlinearity of 105.5. In addition, the proposed S-box obtains a SAC value of 0.4922, a DP value of 10/256, a LAP value of 0.1328, and zero fixed points. These results indicate that trigonometric transformations can be used as a promising mathematical tool for constructing substitution boxes for block cipher algorithms.
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
References
Feistel, H., Notz, W. A., & Smith, J. L. (1975). Some cryptographic techniques for machine-to-machine data communications. Proceedings of the IEEE, 63(11), 1545–1554. https://doi.org/10.1109/PROC.1975.10005.
Biryukov, A. (2005). Substitution–Permutation (SP) network. In H. C. A. van Tilborg (Ed.), Encyclopedia of Cryptography and Security. Springer.
Abdurakhimov, B., Boykuziev, I., Khudoykulov, Z., & Allanov, O. (2021). Application of the algebraic cryptanalysis method to the Kuznyechik encryption algorithm. In Proceedings of the IEEE International Conference on Science and Communications Technologies: Applications, Trends and Opportunities (ICISCT) (pp. 1–4). IEEE.
Zhang, W., & Pasalic, E. (2014). Highly nonlinear balanced S-boxes with good differential properties. IEEE Transactions on Information Theory, 60(12), 7970–7979.
Wang, Y., Wong, K. W., Li, C., & Li, Y. (2012). A novel method to design S-box based on chaotic map and genetic algorithm. Physics Letters A, 376(6–7), 827–833. https://doi.org/10.1016/ j.physleta.2012.01.009.
Wang, Y., Zhang, Z., Zhang, L. Y., Feng, J., Gao, J., & Lei, P. (2020). A genetic algorithm for constructing bijective substitution boxes with high nonlinearity. Information Sciences, 523, 152–166. https://doi.org/10.1016/j.ins.2020.03.025.
Zhu, D., Tong, X., Zhang, M., & Wang, Z. (2020). A new S-box generation method and advanced design based on combined chaotic system. Symmetry, 12(12), 2087. https://doi.org/10.3390/sym12122087.
Zahid, A.H., Arshad, M.J., Ahmad, M., Alkhayyat, A., Alzahrani, A., & Raza, M.A. (2021). Efficient dynamic S-box generation using linear trigonometric transformation for security applications. IEEE Access, 9, 98460–98475. https://doi.org/10.1109/ACCESS.2021.3095618.
Kim, G., Kim, H., Heo, Y., Jeon, Y., & Kim, J. (2021). Generating cryptographic S-boxes using reinforcement learning. IEEE Access, 9, 83092–83104. https://doi.org/10.1109/ ACCESS.2021.3085861.
Ahmad, M., & Malik, M. (2016). Design of chaotic neural network based method for cryptographic substitution box. In Proceedings of the International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) (pp. 864–868). IEEE. https://doi.org/10.1109/ICEEOT.2016.7754809.
Jakimoski, G., & Kocarev, L. (2001). Chaos and cryptography: Block encryption ciphers based on chaotic maps. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 48(2), 163–169.
Webster, A. F., & Tavares, S. E. (1986). On the design of S-boxes. In Advances in Cryptology - CRYPTO’85 (Lecture Notes in Computer Science, Vol. 218, pp. 523–534). Springer.
Matsui, M. (1994). Linear cryptanalysis method for DES cipher. In T. Helleseth (Ed.), Advances in Cryptology - EUROCRYPT ’93 (Lecture Notes in Computer Science, Vol. 765, pp. 386–397). Springer. https://doi.org/10.1007/3-540-48285-7_33.