An Efficient Substitution Box design with a chaotic logistic map and Linear Congruential Generator for secure communication in Smart cities




Security, smart city, Cryptography, Encryption, AES, s-box


The study provides a unique method for creating an efficient substitution box (S-box) for advanced encryption standards using a Chaotic Logistic Map (CLM) and a Linear Congruential Generator (LCG) (AES) for secure communications in a smart city. The Pseudo-Random Number Generator (PRNG), which is further examined, is constructed using an extensive search of reasonable possibilities for the initial seed and set parameters. Using statistical testing, the performance analysis of the new S-box is assessed. Additionally, the resilience of differential, as well as linear cryptanalysis, is shown. It is derived using other features, including nonlinearity, the Bit Independence Criterion (BIC), and the Strict Avalanche Criterion (SAC). The suggested S-box has good potential and is usable for symmetric key cryptography, according to the features of the new S-cryptographic box.


Download data is not yet available.

Author Biography

Noshina Tariq, Air University

Department of Avionics Engineering, Air University, Islamabad, Pakistan


Tirumala, S. S., Nepal, N., & Ray, S. K. (2022). Raspberry pi-based intelligent cyber defense systems for SMEs and smart-homes: An exploratory study. EAI Endorsed Transactions on Smart Cities, 6(18), e4-e4. DOI:

Namasivayam, B. (2022). AI for Healthy Meal Preparation in Smart Cities. EAI Endorsed Transactions on Smart Cities, 6(4), e1-e1. DOI:

McCurdy, A., Peoples, C., Moore, A., & Zoualfaghari, M. (2021). Waste Management in Smart Cities: A Survey on Public Perception and the Implications for Service Level Agreements. EAI Endorsed Transactions on Smart Cities, 5(16).

Sajid, A., Shah, S. W., & Magsi, T. (2022). Comprehensive Survey on Smart Cities Architectures and Protocols. EAI Endorsed Transactions on Smart Cities, 6(18). DOI:

Daemen J, Rijmen V. The Design of RIJNDAEL: AES The Advanced Encryption Standard.SpringerVerlag: Berlin, 2002. DOI:

Khan, M., Azam, N. A. (2015). Right-translated AES gray S-boxes. Security and Communication Networks, 8(9), 1627-1635. DOI:

Ferguson N, Schroeppel R, Whiting D. A simple algebraic representation of Rijndael. In Selected Areas in Cryptography SAC01, LNCS2259, 2001; 103?11. DOI:

Shannon, C.E., 1949. Communication theory of secrecy systems. The Bell system technical journal, 28(4), pp.656-715. DOI:

Jakimoski, G., Kocarev, L.: Chaos and cryptography: Block encryption ciphers based on chaotic maps. IEEE Trans. Circuits Syst. 48(2), 163 (2001) DOI:

G. Tang, X. Liao, Y. Chen, A novel method for designing S-boxes based on chaotic maps, Chaos Solitons Fractals 23 (2005) 41319 DOI:

Muhammad Asif Gondal, Abdul Raheem, Iqtadar Hussain, A scheme for obtaining secure S-Boxes based on chaotic baker map, 3D Res. 5 (August)(2014) 17 DOI:

Hussain, I., Shah, T., Gondal, MA and Mahmood, H., 2013. An efficient approach for the construction of LFT S-boxes using chaotic logistic map. Nonlinear Dynamics, 71(1), pp.133-140. DOI:

Hua, Z., Li, J., Chen, Y., and Yi, S., 2021. Design and application of an S-box using a complete Latin square. Nonlinear Dynamics, 104(1), pp.807- 825. DOI:

Lu, Q., Zhu, C. and Deng, X., 2020. An efficient image encryption scheme based on the LSS chaotic map and single S-box. IEEE Access, 8, pp.25664-25678. DOI:

Belazi, A. and Abd El-Latif, A.A., 2017. A simple yet efficient S-box method based on chaotic sine map. Optik, 130, pp.1438-1444. DOI:

Radwan, A.G., 2013. On some generalized discrete logistic maps. Journal of advanced research, 4(2), pp.163-171. DOI:

Marsaglia, G., 1972. The structure of linear congruential sequences. In Applications of number theory to numerical analysis (pp. 249-285). Academic Press. DOI:

Zamli, K. Z., Kader, A., Din, F., Alhadawi, H. S. (2021). Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization. Neural Computing and Applications, 1-18 DOI:

Javeed, A., Shah, T. (2020). Design of an S-box using RabinovichFabrikant system of differential equations perceiving third order nonlinearity. Multimedia Tools and Applications, 79(9), 6649-6660 DOI:

Wang, Y., Xie, Q., Wu, Y., Du, B. (2009, June). A software for Xbox performance analysis and test. In 2009 International Conference on Electronic Commerce and Business Intelligence (pp. 125-128). IEEE DOI:

Pedro Miguel Sosa. Calculating nonlinearity of boolean functions with Walsh-Hadamard transform. 2016

A. Webster, S. Tavares, On the design of S-boxes Advances in Cryptology: Proc. of Crypto?5, Santa Barbara, USA. Lecture

M. Matsui, Linear cryptanalysis method of DES cipher Advances in Cryptology, Proc. Eurocrypt?3. LNCS, vol. 765, Springer, Berlin, 1994, pp. 386 DOI:

Anees, A. and Ahmed, Z., 2015. A technique for designing substitution box based on van der pol oscillator. Wireless Personal Communications, 82(3), pp.1497-1503. DOI:

Khan, M., Shah, T. and Batool, S.I., 2016. Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Computing and Applications, 27(3), pp.677-685. DOI:

Khan, M. and Asghar, Z., 2018. A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural computing and applications, 29(4), pp.993-999 DOI:

Kim, J., Phan, R. C. W. (2009, June). A cryptanalytic view of the NSA's Skipjack block cipher design. In International Conference on Information Security and Assurance (pp. 368-381). Springer, Berlin, Heidelberg DOI:

Yahya, M., Abdullah, S., Almagrabi, A. O., & Botmart, T. (2022). Analysis of S-Box Based on Image Encryption Application Using Complex Fuzzy Credibility Frank Aggregation Operators. IEEE Access, 10, 88858-88871. DOI:

Heron, S. (2009). Advanced encryption standard (AES). Network Security, 2009(12), 8-12. DOI:

Hassan, M. Abul, et al. "Energy efficient hierarchical based fish eye state routing protocol for flying ad-hoc networks." Indonesian Journal of Electrical Engineering and Computer Science 21.1 (2021): 465-471. DOI:

Hassan, Muhammad Abul, et al. "Unmanned Aerial Vehicles Routing Formation using fisheye state routing for flying ad-hoc networks." the 4th international conference on future networks and distributed systems (ICFNDS). 2020. DOI:

Javed, Abdul Rehman, et al. "Integration of blockchain technology and federated learning in vehicular (IoT) networks: A comprehensive survey." Sensors 22.12 (2022): 4394. DOI:

Sajid, Faiqa, et al. "Secure and Efficient Data Storage Operations by Using Intelligent Classification Technique and RSA Algorithm in IoT-Based Cloud Computing." Scientific Programming 2022 (2022). DOI:

Ali, Sher, et al. "New Trends and Advancement in Next Generation Mobile Wireless Communication (6G): A Survey." Wireless Communications and Mobile Computing 2021 (2021). DOI:




How to Cite

M. A. Hashmi and Noshina Tariq, “An Efficient Substitution Box design with a chaotic logistic map and Linear Congruential Generator for secure communication in Smart cities ”, EAI Endorsed Trans Smart Cities, vol. 7, no. 1, p. e6, Mar. 2023.