Abstract
Given growing concerns regarding data security, we develop an enhanced Advanced Encryption Standard (AES) by incorporating chaotic mapping techniques and implement it within a secure data transmission scheme, thereby strengthening protection mechanisms for both data storage and transmission processes. First, we developed a new 2D enhanced hyperchaotic map (2D-EHM) by combining classical 1D chaotic maps and conducted dynamic testing and analysis using bifurcation diagrams, phase diagrams, Lyapunov exponent graphs, and sample entropy. The results demonstrate that the 2D-EHM exhibits stronger chaotic properties compared to existing chaotic maps. Subsequently, we optimized each step of the AES algorithm by incorporating the proposed chaotic map. The enhanced AES achieves higher security at every stage of the encryption process and utilizes two different strong S-Boxes, effectively addressing the issues related to fixed points, reverse fixed points, and short periodic cycles. Based on this, we designed a secure data transmission scheme. Finally, we conducted a security analysis of the data encryption algorithm, and the results confirm the feasibility and effectiveness of our approach.
1. Introduction
In recent years, the rapid advancement of financial technology has transformed the global financial services landscape. From mobile payments and blockchain to high-frequency trading, the scale of financial data transmission and the demand for real-time processing have grown exponentially [1]. The advent of financial technology has revolutionized financial services and forged a new era of convenience and innovation [2]. Digital platforms ranging from mobile banking apps to blockchain-based exchanges have fundamentally reshaped how consumers and businesses manage financial activities, conduct cross-border communications and investments, and have also expanded access to financial services for more social groups [3].
However, this in-depth digital transformation has introduced severe and prominent security challenges: a major concern is the growing vulnerability of financial data to breaches, as the prevalence of online transactions and digital storage of sensitive information has escalated the risk of unauthorized access by cybercriminals, underscoring an urgent need for robust security measures in an increasingly interconnected world [4].
The massive adoption of mobile payments, blockchain technology, high-frequency trading systems, and cross-border settlement platforms has further led to an exponential increase in the volume and frequency of financial data transmission [5]. According to the Bank for International Settlements (BIS), the global daily value of cross-border payments exceeded $6.6 trillion in 2022, with over 70% of these transactions relying on real-time data transmission. Against this backdrop, the confidentiality, integrity, and real-time nature of data have become critical security requirements for financial infrastructure. Meanwhile, the digitalization of the financial system has brought severe security threats: IBM’s “2023 Cost of a Data Breach Report” indicates that the average cost of a single data breach incident in the financial sector reaches $5.97 million, topping all other sectors, with over 40% of breaches attributed to transmission link attacks. Thus, building an efficient, secure, and compliant financial data transmission mechanism has become a core concern for both academia and industry.
AES and RSA, as the most classic symmetric and asymmetric encryption algorithms, have been widely adopted in the field of financial data security [6]. AES is renowned for its high security, efficiency, and scalability, making it a popular choice for safeguarding sensitive data in financial transactions. On the other hand, RSA is typically used for securely exchanging encryption keys, allowing users to share keys over insecure channels, thereby protecting any sensitive information transmitted during a transaction. Both algorithms provide effective data protection suitable for secure data storage and real-time transaction processing [7]. Secure communication channels, digital signatures, and key exchange mechanisms are crucial for verifying identities and safeguarding financial transactions. These mechanisms play a vital role in protecting sensitive financial information across various fintech platforms, including mobile payment applications, online banking portals, and cryptocurrency exchanges.
To further enhance the security and efficiency of financial data encryption, researchers have conducted in-depth research on optimized and hybrid encryption schemes based on traditional algorithms. Kuppuswamy et al. [6] proposed a novel symmetric key algorithm (SSK) and combined it with RSA to construct a hybrid encryption system, which uses RSA for key exchange and SSK for data encryption and decryption to balance security and efficiency in financial communications and transactions. Manna et al. [8] proposed a hybrid cryptosystem combining private and public key models, where the private key itself is encrypted by RSA public key encryption; the scheme is considered to have enhanced security because the shared key intercepted during transmission between senders and receivers is invalid, and it can handle both data transmission and file encryption. Kumar et al. [9] enhanced the AES algorithm for financial data security by increasing the number of encryption rounds to 16 and extending the key length to 320 bits. Tobi et al. [10] introduced the “Image Analysis Encryption Algorithm” to address the challenges of traditional encryption technologies such as RSA and AES in the quantum computing era; this algorithm transforms structured financial data into encrypted images and employs chaotic encryption and fractal analysis to enhance security.
More recently, elliptic curve cryptography (ECC) has emerged as a highly efficient alternative to RSA for key exchange [11]. Its growing popularity in modern cryptographic applications stems from its high efficiency, strong security, and resilience against various attacks, which is primarily due to the inherent difficulty of solving the elliptic curve discrete logarithm problem (ECDLP). With significantly smaller key sizes than RSA, ECC is particularly suitable for resource-constrained environments such as mobile payment applications, which are critical in fintech scenarios. The widespread application potential of ECC is further evidenced by related research: Adhikari et al. [12] introduced a PRNG based on large prime ECs, which extracts the least significant 8 bits of the y-coordinate from generated curve points to produce pseudo-random numbers; Hayat et al. [13] proposed another EC-based PRNG, though their approach of generating and sorting all curve points leads to high computational costs.
In addition, chaotic maps have emerged as a compelling and promising area of research in the field of cryptography (Feng et al. [14]). They are characterized by intricate dynamics, including remarkable sensitivity to initial conditions, non-linearity, and strong randomness, and these distinctive properties make chaotic maps particularly effective for cryptographic applications, prompting researchers to explore their various applications in data security [15,16]. For example, Podder et al. [17] proposed a financial security encryption algorithm based on the Logistic map, which incorporates a dual confusion process followed by a diffusion process: a divide-rotate algorithm is employed in the first confusion phase, a pixel shifting algorithm in the second, and a pseudo-random sequence generator is used to produce chaotic values for image diffusion. Kadeer [18] introduced a 2D hyperchaotic map with strong chaotic performance, which was further utilized to develop an S-Box construction algorithm and a word-wise stream cipher for enhancing data security. Yu et al. [19] further explored the application of chaotic systems in information security by proposing a multiscroll Hopfield Neural Network based on a non-polynomial memristor; they realized its hardware implementation via FPGA and designed a dedicated image encryption circuit, which provides a valuable hardware reference for the engineering application of chaotic systems in cryptographic scenarios.
However, most existing algorithms, including AES, still exhibit critical shortcomings. For instance, encryption schemes employing S-Boxes often suffer from weak S-Box designs characterized by fixed points (e.g., ), reverse fixed points (e.g., ), and short periodic cycles, significantly undermining cryptographic security. Symmetric encryption algorithms face inherent challenges in secure key exchange mechanisms. While RSA remains viable for key exchange, its reliance on excessively long keys results in prohibitive computational overhead, rendering encryption speeds three orders of magnitude slower than symmetric counterparts—thus limiting its utility primarily to key negotiation. Furthermore, most chaos-based cryptographic systems adopt 1D chaotic maps (e.g., logistic, sine, and quadratic maps), which exhibit insufficient randomness, non-ergodic behavior, and limited chaotic range. Across most parameter ranges, these maps fail to demonstrate sensitivity to initial conditions, a hallmark of robust chaotic dynamics.
To address the aforementioned critical issues in current financial data encryption, this paper conducts targeted research and proposes a secure financial data encryption and transmission scheme based on an optimized AES algorithm combined with a self-constructed chaotic map. Specifically, we first construct a novel 2D hyperchaotic map (2D-EHM) and conduct in-depth dynamic analysis, which verifies that the map exhibits strong and stable chaotic behavior over a wide parameter range. On this basis, we develop two high-performance robust S-Boxes that feature high non-linearity and are free of defects such as fixed points, reverse fixed points, and short periodic cycles. We then optimize the classic AES algorithm by integrating the 2D-EHM and the two proposed S-Boxes into its core encryption process, and finally design a complete method for encrypting and transmitting financial data based on this enhanced AES algorithm.
The integration of chaotic maps into the AES framework enhances the cryptographic security of the algorithm in a more systematic way than merely introducing randomness. Traditional AES, while robust in general, relies on fixed components such as a static S-Box with inherent weaknesses and a deterministic key schedule, which can be vulnerable to sophisticated cryptanalysis if not properly implemented. Our optimized approach leverages the inherent excellent properties of the 2D-EHM to address these potential drawbacks: specifically, the extreme initial-value sensitivity of the 2D-EHM ensures that a minute change in the encryption key results in a drastically different and unpredictable ciphertext, which significantly strengthens the algorithm’s resistance against differential attacks. Furthermore, the ergodicity and high nonlinearity of the 2D-EHM allow us to dynamically optimize the core cryptographic components of AES, effectively eliminating the security risks associated with fixed S-Boxes such as fixed points, reverse fixed points, and short iterating cycles. In essence, the 2D-EHM provides a dynamic and complex source of nonlinearity that systematically fortifies each stage of the AES encryption process, creating a more resilient and unpredictable security architecture that is more adapted to the high security requirements of financial data.
The structure of the paper is organized as follows: Section 2 analyzes chaotic maps and introduces the design and dynamic characteristics of the 2D-EHM. Section 3 proposes two robust S-Boxes and verifies their performance. Section 4 outlines the detailed design of the chaotic encryption algorithm based on the optimized AES. Section 5 describes the design of a secure and efficient financial data transmission scheme based on the proposed encryption algorithm. Section 6 presents a comprehensive performance and security analysis of the proposed methods through experimental verification. Finally, Section 7 concludes the full paper and discusses potential directions for future research.
2. Chaotic Maps and Analysis
2.1. Classical Logistic and Quadratic Map
All numerical simulations and analyses of the logistic and quadratic chaotic maps were performed using MATLAB R2018b, executed on a workstation equipped with a 12th Gen Intel® Core™ i7-12650H (2.30 GHz) processor.
In the study of chaotic systems, the logistic map and the quadratic map are among the most commonly used chaotic maps, garnering significant attention and application across various fields. These two maps not only hold theoretical importance but also play crucial roles in biology, economics, physics, and many other domains.
The mathematical expressions for the logistic map and the quadratic map are given by Equations (1) and (2), respectively:
where is the state variable and is a control parameter.
As shown in Figure 1 and Figure 2, both maps exhibit non-chaotic behavior in most regions, with several blank windows indicating a lack of ergodicity. Additionally, the Lyapunov exponent is found to be less than 0 in the majority of these regions, indicating a low level of randomness and demonstrating stability and predictability.
Figure 1.
Bifurcation diagrams of classical chaotic maps: (a) Logistic map; (b) Quadratic map.
Figure 2.
Lyapunov exponents of classical chaotic maps: (a) Logistic map; (b) Quadratic map.
2.2. 2D-EHM
To overcome the limitations of 1D chaotic mappings, the 2D-EHM is constructed by combining the logistic map and the quadratic map. It is defined as Equation (3):
where represent the state variables, is the global control parameter, and and are dimensional gain parameters that regulate the nonlinear evolution intensity and chaotic behavior of the x-dimensional and y-dimensional components, respectively.
As shown in Figure 3, the 2D-EHM exhibits chaotic behavior over a wide range and demonstrates ergodicity. This indicates that the system not only fills the phase space effectively but also ensures that its trajectory will eventually explore all accessible states, making it suitable for various applications that require robust chaotic characteristics.
Figure 3.
Bifurcation and phase diagrams of the 2D-EHM: (a) r − x bifurcation diagram; (b) r − y bifurcation diagram; (c) Phase diagram.
2.3. Lyapunov Exponent and Sample Entropy
The Lyapunov exponent, as one of the most important metrics of chaotic maps, serves to evaluate the strength of chaotic characteristics. A Lyapunov exponent greater than 0 indicates that the system has entered a chaotic state. A Lyapunov exponent equal to 0 implies that the system is in a neutral state. Conversely, a Lyapunov exponent less than 0 signifies stability, suggesting that the system returns to a stable equilibrium after small disturbances, reflecting predictable behavior.
Sample entropy provides a numerical assessment of the complexity and irregularity present in a sequence. A higher sample entropy value indicates a higher level of complexity and greater irregularity within the sequence, reflecting its intricate and unpredictable nature.
As shown in Figure 4a,b, both Lyapunov exponents of the 2D-EHM are greater than 0, indicating that it is a hyperchaotic map. Figure 4c demonstrates that the sample entropy values range between 2 and 3, indicating a strong level of complexity and irregularity. These two metrics together suggest that the 2D-EHM has promising applications in the field of data encryption, particularly in the encryption of financial data. Such characteristics enhance the confidentiality and resilience of the data, providing reliable support for the protection of financial information.
Figure 4.
Lyapunov exponents and sample entropy of the 2D-EHM: (a) LEs with a parameter range of [0, 20]; (b) LEs with a parameter range of [0, 20,000]; (c) Sample entropy.
3. S-Box Construction and Comparison
As a core component of the proposed data encryption algorithm, the S-Box directly determines the nonlinearity and anti-attack capability of the entire encryption system. To overcome the security defects of fixed S-boxes in traditional AES and construct a strong S-Box with high nonlinearity, this chapter utilizes the S-Box construction and optimization method described in our previous paper [20]. This method effectively eliminates common drawbacks of conventional S-boxes, including fixed points, reverse fixed points, and short periodic cycles, thereby improving the overall security of the S-Box and laying a solid foundation for the dynamic enhanced AES algorithm.
Through the aforementioned construction and optimization method, two robust 8 × 8 S-Boxes (denoted as S1 and S2) are constructed. These two S-Boxes are designed to be compatible with the dynamic enhancement mechanism of the proposed algorithm—they can be dynamically adjusted during the SubBytes step of AES, breaking the static limitation of traditional AES S-boxes and enhancing the algorithm’s resistance to differential and linear cryptanalysis. Their strict bijection and high nonlinearity further lay a solid foundation for improving the overall security of the encryption system.
As shown in Table 1, both S1 and S2 are 8 × 8 S-Boxes with strict bijection, a fundamental requirement for AES SubBytes reversibility. As verified by Table 2 and Table 3, each byte (00~FF) appears exactly once in both S-Boxes, ensuring no data loss during encryption and decryption.
Table 1.
Performance comparison of S-Boxes.
Table 2.
The first strong S-Box S1.
Table 3.
The second strong S-Box S2.
In terms of security performance, combined with Table 1, S1 and S2 have high nonlinearity (min 110, max 112), slightly lower than AES S-Box but significantly higher than Whirlpool S-Box, ZUC S0 and other mainstream S-Boxes, effectively resisting linear and differential cryptanalysis. Their average SAC values are close to the ideal 0.5, exhibiting good avalanche effects and enhancing input-output correlation resistance.
A key advantage is that S1 and S2 eliminate fixed points, reverse fixed points and short iterating cycles—weaknesses existing in AES, Whirlpool and ZUC S-Boxes—making them more secure for financial data encryption.
In summary, the two 8 × 8 S-Boxes S1 and S2 constructed in this chapter have excellent structural characteristics and security performance, including strict bijection, high nonlinearity, good SAC performance, and no fixed points, reverse fixed points, or short periodic cycles. These superior characteristics enable the S-Boxes to effectively address the security defects of fixed S-Boxes in traditional AES, and they can be dynamically selected and applied in the SubBytes step of the proposed dynamic enhanced AES financial data encryption algorithm, thereby further improving the overall security and anti-attack capability of the encryption system, and providing strong support for the secure transmission and storage of financial data.
4. Design of the Chaotic Encryption Algorithm
This section proposes a symmetric encryption algorithm based on the constructed 2D-EHM. The core idea is to generate a dynamic key stream through the pseudorandomness of the chaotic system, combined with confusion and diffusion operations to achieve the conversion from plaintext to ciphertext. The algorithm supports variable-length keys (ranging from 128 to 256 bits) and is suitable for encrypting structured financial data such as text and transaction messages.
4.1. Preparatory Work
Step 1: key generation
(1) Combine the input initial key (K) with its length L = length(K), and then calculate its hash value using Equation (4).
(2) Generate the initial value (x0, y0) and parameters using Equation (5).
Step 2: Plaintext grouping
(1) Divide the plaintext into blocks, each with a length of 256 bits (32 bytes). If the length of the plaintext is not a multiple of 32 bytes, it is padded with zeros.
(2) Consider each block as an matrix, and fill it in column-major order.
4.2. Round Parameter Generation
Step 1: chaotic sequence generation
(1) Iterate the 2D-EHM 96 times to obtain chaotic sequence.
Step 2: Diffusion matrix generation
(2) Fill the first 64 integers into an matrix in column-major order using Equation (6).
where and .
(3) Calculate the determinant of the matrix using Equation (7). If it is not invertible, jump to Step 1 to re-iterate the chaotic map and regenerate the chaotic sequence.
where the algebraic cofactor is , where denotes the determinant of the (n − 1)-order minor matrix obtained by deleting the i-th row and j-th column of .
Step 2: Round key expansion
Obtain a round key using Equation (8).
where and .
4.3. Encryption Process
Our encryption algorithm has a dynamic number of encryption rounds, specifically performing d rounds of encryption, where .
Round :
Step 1: SubBytes
(1) Odd Rounds: Perform byte substitution using the first S-Box S1 using Equation (9).
(2) Even Rounds: Perform byte substitution using the second S-Box S2 using Equation (10).
Step 2: ShiftRows
Perform a cyclic left shift on each row by bits, where t represents the encryption round number.
Step 3: MixColumns
Perform matrix multiplication on each column using Equation (11).
where is the columns after step 2.
Step 4: AddRoundKey
Perform a byte-wise XOR operation between the round key and the matrix using Equation (12).
Round d (final round) skips Step 3.
Figure 5 presents the flowchart of the proposed encryption algorithm.
Figure 5.
Flowchart of the proposed encryption algorithm.
4.4. Decryption Process
Perform the encryption steps in reverse order, using the inverse of the S-Boxes and the inverse of the matrix for column diffusion.
5. Design of Secure Financial Data Transmission Scheme
This section integrates the proposed chaotic encryption algorithms with financial data transmission scenarios to design an end-to-end secure protocol. The transmission scenarios include real-time payments such as cross-border remittances, securities transactions such as stock orders, and data sharing such as credit report inquiries.
5.1. Transmission Structure
- Layered architecture design
Application layer: Business systems generate structured financial data.
Security layer: Integrate the proposed chaotic encryption algorithms for real-time business data encryption.
Transmission layer: Build secure channel based on TLS 1.3 protocol, compatible with SWIFT/CFETS and other financial communication protocols.
Key management layer: Financial institution internal KMS, supporting initial key rotation and secure storage.
5.2. Secure Transmission Solution
- Participating roles
Data sender: Bank, brokerage, payment institution terminals
Data receiver: Clearing center, exchange, third-party financial institutions
Regulator: Central bank, financial regulatory agencies
- 2.
- Data transmission
Step 1: The client splits structured financial plaintext into 128-bit blocks and pads to 16 bytes.
Step 2: Generate a round key based on initial key K and perform 5 rounds of confusion encryption.
Step 3: Encapsulate the ciphertext C and timestamp ts, and transmit it through TLS.
Step 4: Realize secure key transmission from sender to receiver based on Diffie–Hellman protocol. Figure 6 presents a detailed flowchart of the key transmission process.
Figure 6.
Flowchart of the key transmission.
- 3.
- Decrypt verification
Server verifies timestamp validity (valid time window: ± 2 s) to resist replay attacks.
Use the key obtained by Diffie–Hellman protocol to perform reverse decryption of ciphertext.
Check decrypted financial data integrity; terminate transmission and alarm if tampering is found.
5.3. Experimental Verification
We select two representative types of financial transaction data, and standardize all data by concatenating core business fields in their native logical order and then formatting them into 128-bit fixed-length blocks. The specific data structure and format are shown in Table 4.
Table 4.
Structure and format of financial experimental data.
We use the standardized 128-bit hexadecimal data blocks from Table 4 as the original plaintext. We first divide the financial data into fixed-length blocks, then encrypt and decrypt them in strict accordance with the steps outlined in Section 5.2. Finally, we conduct an analysis on key metrics.
To intuitively demonstrate the encryption effect on financial data, we select typical samples of the two data types. Table 5 presents the comparison between the 128-bit plaintext and the encrypted ciphertext.
Table 5.
Plaintext–ciphertext comparison of financial data blocks.
The experimental results based on financial transaction datasets demonstrate that our proposed secure transmission scheme can efficiently encrypt financial data blocks. The encrypted ciphertext completely conceals the business characteristics of the original data, and the decrypted data is identical to the plaintext.
6. Performance and Security Analysis
This section outlines the empirical research conducted to assess the performance of the proposed data encryption algorithm.
6.1. Key Space
The size of the key space directly affects the security of encryption systems. A larger key space means that an attacker needs to try more key combinations to successfully crack the encryption, thereby enhancing data security [23]. To effectively resist brute-force attacks, an ideal key space should be greater than 2128. To ensure the strength and security of the encryption system, our algorithm design features a key space corresponding to a 256-bit hash value, equivalent to 2128. Considering that the initial values can be precise to 10−15, we set the initial conditions for 2D-NDQM as , which can be expanded to . Therefore, the overall key space expands to , providing ample size to withstand common cryptographic attacks. This design not only enhances the security of the system but also offers greater protection for future applications.
6.2. Key Sensitivity
Key sensitivity refers to the degree to which an encryption algorithm is sensitive to changes in the key, meaning that small changes in the key will result in significant changes in the encryption output. A good encryption algorithm should possess high key sensitivity, which implies that even if a single bit of the key is altered, the resulting ciphertext should exhibit substantial variation. This characteristic can effectively prevent attackers from inferring the content of the key through ciphertext analysis.
NBCR (Number of Bit Change Rate) is an indicator used to assess the key sensitivity of encryption algorithms. It measures the ratio of the number of bit changes in the ciphertext resulting from minor changes in the key to the total number of bits in the ciphertext. A high NBCR value indicates that the algorithm is sensitive to key changes and has good security, while a low NBCR value may suggest that the algorithm is not sensitive to key changes, thereby reducing its security.
To analyze the key sensitivity of the proposed encryption algorithm, we first selected the initial key ‘password0’ and then generated five additional keys by changing the last ‘0’ to each of the digits from ‘0’ to ‘5’. We then used these six keys to encrypt two plaintexts (with lengths of 10,000 bits and 20,000 bits, respectively). Finally, we compared the number of differing bits between the ciphertexts and calculated the NBCR values. As shown in Table 6, the NBCR values are close to the ideal values, indicating that the proposed encryption algorithm has strong key sensitivity.
Table 6.
The NBCR and HD performance of the PRNG.
6.3. Hamming Distance
Hamming distance serves as a key metric in evaluating the security of encryption algorithms. It quantifies how much the output changes in response to minor modifications in the input, illustrating the concept of the avalanche effect. In an ideal scenario, the Hamming Distance should approach 50%, indicating that even a small tweak in the encryption key should lead to a substantial transformation in the resulting ciphertext [24]. This property is crucial for ensuring that encrypted data remains secure and resistant to potential attacks.
We encrypted a plaintext of length 5120 bits using slightly different keys and calculated the Hamming distance between them. As shown in Figure 7, the results are very close to the ideal value.
Figure 7.
Hamming distance distribution.
6.4. Correlation Evaluation
Correlation evaluation is a statistical method used to analyze the relationship between two sets of data, particularly in the context of cryptography. In encryption, it helps to determine whether there is any correlation between the plaintext and the ciphertext. A strong encryption algorithm should ideally produce ciphertext that is statistically independent of the plaintext, meaning that changes in the plaintext do not lead to predictable changes in the ciphertext. This independence is crucial for ensuring the security of the encryption scheme against various types of attacks. The correlation coefficient is a numerical measure that quantifies the degree to which two variables are related. It ranges from −1 to 1, where −1 indicates a perfect negative correlation, 1 indicates a perfect positive correlation, and 0 indicates no correlation at all. In cryptographic contexts, a correlation coefficient close to 0 suggests that the ciphertext does not reveal any information about the plaintext, which is a desirable property for secure encryption.
To evaluate the correlation, we encrypted a 16,000-bit plaintext 300 times and calculated the correlation coefficients. As shown in Figure 8, the correlation coefficients are concentrated between −0.04 and 0.04, with an average value of 0.000611. This indicates that there is minimal correlation between the plaintext and the ciphertext, reinforcing the effectiveness of the encryption algorithm.
Figure 8.
Correlation coefficients distribution.
6.5. Randomness Testing
Randomness is crucial in encryption algorithms because it impacts the security and effectiveness of the entire encryption process. High randomness ensures that encryption algorithms can produce unpredictable outputs, which is essential for preventing attackers from inferring information by analyzing encrypted data. Without sufficient randomness, encryption algorithms may become vulnerable and susceptible to various attacks.
In this context, TestU01 is a comprehensive software suite specifically designed for the rigorous evaluation of binary sequences, covering algorithms such as Rabbit, Alphabit, and BlockAlphabit. We conducted 38 and 17 different statistical tests on Rabbit and Alphabit, respectively, using TestU01 1.2.3 to assess the randomness of the binary sequences they generate. Additionally, BlockAlphabit evaluates the sequences by reordering bits into different block sizes (2, 4, 8, 16, and 32 bits) and repeatedly applying the tests from Alphabit. We tested binary sequences of lengths and , and the results, as shown in Table 7, indicate that all tests were successfully passed. This demonstrates that the binary sequences generated by these algorithms possess good randomness and are suitable for applications with high security requirements.
Table 7.
TestU01 results.
6.6. Advantages of Our Work
- 1.
- 2D hyperchaotic map with enhanced properties
We designed a novel 2D hyperchaotic map, 2D-EHM, by combining the classic logistic map and the quadratic map. This map exhibits the following advantages:
- (1)
- Wider chaotic range: Demonstrates hyperchaotic behavior across all of the parameter space, significantly broader than most of the existing chaotic maps.
- (2)
- High sensitivity: A minor perturbation of the initial conditions triggers completely divergent trajectories, ensuring unpredictability.
- (3)
- Ergodicity: The designed 2D hyperchaotic map exhibits strong ergodic properties, meaning that its trajectories densely cover the entire phase space over time. This characteristic ensures that, given enough time, the system can reach any point in the state space, making it highly suitable for applications in financial data encryption.
- 2.
- Dual strong S-Boxes
The proposed algorithm employs two strong S-Boxes that are alternately applied in odd and even encryption rounds, significantly enhancing the overall security of the encryption process. Both S-Boxes exhibit a nonlinearity of over 111, which is significantly higher than that of most existing S-Boxes and contributes to their strength against linear cryptanalysis. Furthermore, they are designed without fixed points, reverse fixed points, or short periodic cycles, eliminating potential vulnerabilities that could be exploited by attackers. This dual S-Box structure not only increases the complexity of the encryption but also ensures a higher level of resistance against various attacks.
- 3.
- Key strengthening
To address the issue of weak keys, such as all-zero or all-one keys, a clever method has been proposed that combines the key with its length and computes the hash value of the key. Subsequently, a nonlinear equation is used to further process the hash value to generate the initial key. This method not only enhances the security of the key but also effectively mitigates the security risks associated with weak keys, thereby improving the robustness and attack resistance of the overall encryption algorithm.
- 4.
- AES optimization with hyperchaotic map
Optimize all steps of AES using the proposed hyperchaotic map. Implement dynamic use of two strong S-Boxes, and in addition, each round of encryption utilizes a dynamically generated column mixing matrix and round key.
- 5.
- Secure transmission scheme for financial data:
Finally, based on the proposed encryption algorithm, a financial data encryption transmission scheme is designed. This scheme fully leverages the advantages of the hyperchaotic map. In addition, the Diffie–Hellman key exchange protocol is used to securely transmit the key from the data sender to the data receiver.
Table 8 presents a brief comparison between our work and other encryption algorithms.
Table 8.
Comparison of encryption algorithms.
7. Conclusions
In the context of the rapidly evolving information age, the demand for financial data security has become increasingly critical. As financial transactions and data exchanges grow more prevalent in digital formats, ensuring the confidentiality and integrity of this information is paramount. In order to address these challenges, we proposed an effective encryption scheme for financial data transmission.
We initially developed a 2D hyperchaotic map, 2D-EHM, characterized by robust chaotic properties and conducted a dynamic analysis. This chaotic map exhibits a high level of randomness and unpredictability, along with superior ergodicity compared to most existing chaotic maps. Subsequently, we designed two strong S-Boxes that avoid weaknesses such as fixed points, reverse fixed points, and short periodic cycles. We then optimized AES using the chaotic map and the two strong S-Boxes, achieving dynamic operations at each step. Finally, we designed a financial data encryption transmission scheme, and the test results validated its effectiveness and security.
Author Contributions
Conceptualization, A.A.; Methodology, M.N.; Software, Y.T.; Validation, D.G.; Formal analysis, A.A. and Y.T.; Investigation, M.N.; Data curation, Y.T. and D.G.; Writing—original draft, M.N. and Y.T.; Writing—review & editing, M.N. and D.G.; Visualization, Y.T.; Supervision, D.G.; Funding acquisition, A.A., M.N. and D.G. All authors have read and agreed to the published version of the manuscript.
Funding
This work was supported in part by the National Natural Science Foundation of China under the project “Research on China’s Fiscal Multiplier and Fiscal Space under High Leverage” (Grant No. 72063030); the Graduate Research Innovation Project of Xinjiang University of Finance and Economics, “Investigation, Analysis, and Countermeasures on Financial Innovation in the China (Xinjiang) Pilot Free Trade Zone” (Grant No. XJUFE2025D003); the Scientific Research Start-Up Funding for High-level Talents of Kashi University (Grant No. GCC2024ZK-024); the Xinjiang Uygur Autonomous Region Youth Program (Grant No. 2025D01B19); the Program for Innovative Research Team in Kashi University (Grant No. 022025467); and the Xinjiang Key Laboratory of Multimodal Intelligent Computing and Large Models.
Data Availability Statement
Data is contained within the article.
Conflicts of Interest
The authors declare that they do not have relevant or material financial interests related to the research described in this paper.
References
- Ahmed, A.; Paruchuri, H.; Vadlamudi, S.; Ganapathy, A. Cryptography in Financial Markets: Potential channels for future financial stability. Acad. Account. Financ. Stud. J. 2021, 25, 1–9. [Google Scholar]
- Guo, Y.; Liang, C. Blockchain application and outlook in the banking industry. Financ. Innov. 2016, 2, 24. [Google Scholar] [CrossRef]
- Sharif, M.H.U.; Mohammed, M.A. A literature review of financial losses statistics for cyber security and future trend. World J. Adv. Res. Rev. 2022, 15, 138–156. [Google Scholar] [CrossRef]
- Darem, A.A.; Alhashmi, A.A.; Alkhaldi, T.M.; Alashjaee, A.M.; Alanazi, S.M.; Ebad, S.A. Cyber threats classifications and countermeasures in banking and financial sector. IEEE Access 2023, 11, 125138–125158. [Google Scholar] [CrossRef]
- Zheng, K.; Chen, H.; Wang, Y.; Chen, Q. Data-driven financial transmission right scenario generation and speculation. Energy 2022, 238, 122056. [Google Scholar] [CrossRef]
- Kuppuswamy, P.; Al-Maliki, S.Q.Y.A.K.; John, R.; Haseebuddin, M.; Meeran, A.A.S. A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm. Bull. Electr. Eng. Inform. 2023, 12, 1148–1158. [Google Scholar] [CrossRef]
- Durge, R.S.; Deshmukh, V.M. Advancing cryptographic security: A novel hybrid AES-RSA model with byte-level tokenization. Int. J. Electr. Comput. Eng. 2024, 14, 4306–4314. [Google Scholar] [CrossRef]
- Manna, S.; Prajapati, M.; Sett, A.; Banerjee, K.; Dutta, S. Design and implementation of a two-layered hybrid cryptosystem. In Proceedings of the Third IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), Kolkata, India, 3–5 November 2017; pp. 327–331. [Google Scholar]
- Kumar, P.; Rana, S.B. Development of modified AES algorithm for data security. Optik 2016, 127, 2341–2345. [Google Scholar] [CrossRef]
- Sonubi, T.O.; Osinaike, T.; Raji, A.; Kolawole, A.F. Next-generation financial encryption using image analyzer algorithms: A design and implementation approach. World J. Adv. Eng. Technol. Sci. 2024, 13, 718–727. [Google Scholar] [CrossRef]
- Haider, T.; Blanco, S.A.; Hayat, U. A novel pseudo-random number generator based on multivariable optimization for image-cryptographic applications. Expert Syst. Appl. 2024, 240, 122446. [Google Scholar] [CrossRef]
- Adhikari, S.; Karforma, S. A novel image encryption method for e-governance application using elliptic curve pseudo random number and chaotic random number sequence. Multimed. Tools Appl. 2022, 81, 759–784. [Google Scholar] [CrossRef]
- Hayat, U.; Azam, N.A. A novel image encryption scheme based on an elliptic curve. Signal Process. 2019, 155, 391–402. [Google Scholar] [CrossRef]
- Feng, W.; Tang, Z.; Zhao, X.; Qin, Z.; Chen, Y.; Cai, B.; Zhu, Z.; Wen, H.; Ye, C. State-Dependent Variable Fractional-Order Hyperchaotic Dynamics in a Coupled Quadratic Map: A Novel System for High-Performance Image Protection. Fractal Fract. 2025, 9, 792. [Google Scholar] [CrossRef]
- Li, C.; Sprott, J.C.; Akgul, A.; Iu, H.H.C.; Zhao, Y. A new chaotic oscillator with free control. Chaos Interdiscip. J. Nonlinear Sci. 2017, 27, 083101. [Google Scholar] [CrossRef]
- Li, C.; Sprott, J.C. Chaotic flows with a single nonquadratic term. Phys. Lett. A 2014, 378, 178–183. [Google Scholar] [CrossRef]
- Podder, D.; Deb, S. Enhancing financial security: Chaotic map integration with biometric data. Econ. Aff. 2024, 69, 809–816. [Google Scholar] [CrossRef]
- Kadeer, A.; Tuersun, Y.; Liu, H. A chaos-based word-wise stream cipher using keyed strong S-Box. Comput. Electr. Eng. 2025, 122, 109951. [Google Scholar] [CrossRef]
- Yu, F.; Kong, X.; Yao, W.; Zhang, J.; Cai, S.; Lin, H.; Jin, J. Dynamics analysis, synchronization and FPGA implementation of multiscroll Hopfield neural networks with non-polynomial memristor. Chaos Solitons Fractals 2024, 179, 114440. [Google Scholar] [CrossRef]
- Kadeer, A.; Tuersun, Y.; Liu, H. Constructing keyed strong S-Box with optimized nonlinearity using nondegenerate 2D hyper chaotic map. Phys. Scr. 2024, 99, 125281. [Google Scholar] [CrossRef]
- Ibrahim, S.; Abbas, A.M. Efficient key-dependent dynamic S-Boxes based on permutated elliptic curves. Inf. Sci. 2021, 558, 246–264. [Google Scholar] [CrossRef]
- Lambić, D. A new discrete-space chaotic map based on the multiplication of integer numbers and its application in S-Box design. Nonlinear Dyn. 2020, 100, 699–711. [Google Scholar] [CrossRef]
- Liu, R.; Liu, H.; Zhao, M. Cryptanalysis and construction of keyed strong S-Box based on random affine transformation matrix and 2D hyper chaotic map. Expert Syst. Appl. 2024, 252, 124238. [Google Scholar] [CrossRef]
- Kadeer, A.; Tuersun, Y.; Liu, H.; Shao, J. A pseudo-random number generator on elliptic curves over Galois field using 2D enhanced logistic-quadratic map. Int. J. Mod. Phys. C 2025, 36, 2550042. [Google Scholar] [CrossRef]
- Anil Ansari, G. Securing Cloud Data with a Blockchain: Innovating AES Encryption via Modified Sine Map Rounds. Secur. Priv. 2025, 8, e70077. [Google Scholar] [CrossRef]
- Rahman, Z.; Yi, X.; Billah, M.; Sumi, M.; Anwar, A. Enhancing AES using chaos and logistic map-based key generation technique for securing IoT-based smart home. Electronics 2022, 11, 1083. [Google Scholar] [CrossRef]
- Bedoui, M.; Mestiri, H.; Bouallegue, B.; Hamdi, B.; Machhout, M. An improvement of both security and reliability for AES implementations. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 9844–9851. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.







