Block Cipher Generation Model: A Step Towards Generative Ciphers
Abstract
1. Introduction
1.1. Cipher Design from Enigmatic Art to Standardization
1.2. Contribution
- Determining how many rounds will be applied to each plaintext block.
- Which cipher structure will be applied to each round, such as left Feistel, Substitution-Permutation Network, right Feistel, left Lai–Massey, right Lai–Massey, and any possible randomized combination.
- Which S-box will be used in which round and what will be the values of the S-box.
- Which P-box will be used in which round and what will be the values of the P-box.
- Which derived key will be used in which round and what will be the values of the derived keys.
- How many S-boxes, P-boxes, and derived keys will be used or similar other decisions.
2. Proposed Model: Block Cipher Designs Generator Model (BCDGM)
- How many rounds will be applied to each plaintext block.
- Which cipher structure will be applied to which block.
- Which S-box will be used in which block and what will be the values of the S-box.
- Which P-box will be used in which block and what will be the values of the P-box.
- How many S-boxes, P-boxes, inverse S-boxes, and derived keys will be used.
- Which derived key will be used in which block and what will be the values of the derived keys.
- Which inverse S-box will be used in which block and what will be the values of the inverse S-box.
3. Results and Evaluation
3.1. Avalanche Effect (Plaintext, Key) Compared to Avalanche Effect (Plaintext, Key Flipped)
3.2. Avalanche Effect (Plaintext, Key) Compared to Avalanche Effect (Plaintext Flipped, Key)
3.3. Correlation (Plaintext, Key) Compared to Correlation (Plaintext, Key Flipped)
3.4. Correlation (Plaintext, Key) Compared to Correlation (Plaintext Flipped, Key)
3.5. Correlation (PlainText) Compared to Correlation (CipherText)
3.6. NIST Statistical Randomness Tests
3.7. Statistical Randomness Evaluation Using TestU01
3.8. Differential Security Analysis Using NPCR and UACI Metrics
3.9. Resistance Analysis Against Structured-Plaintext, Known-Plaintext, and Chosen-Plaintext Attacks
3.10. Asymptotic Computational Complexity and Scalability Analysis
3.11. Key Space Estimation of the Generated Ciphers
4. Conclusions
Supplementary Materials
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
- Knudsen, L.R.; Robshaw, M. The Block Cipher Companion; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
- Avanzi, R. A Salad of Block Ciphers; IACR Cryptology ePrint Archive, Report 2016/1171; International Association for Cryptologic Research: Lyon, France, 2016. [Google Scholar]
- Schneier, B. Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed.; John Wiley & Sons: New York, NY, USA, 1996. [Google Scholar]
- Khan, M.F.; Saleem, K.; Alshara, M.A.; Bashir, S. Multilevel information fusion for cryptographic substitution box construction based on inevitable random noise in medical imaging. Sci. Rep. 2021, 11, 14282. [Google Scholar] [CrossRef] [PubMed]
- GOST R 34.12-2015; Information Technology. Cryptographic Data Security. Block Ciphers. Standardinform: Moscow, Russia, 2015.
- Waseem, H.M.; Hwang, S.O. Design of highly nonlinear confusion component based on entangled points of quantum spin states. Sci. Rep. 2023, 13, 1099. [Google Scholar] [CrossRef] [PubMed]
- Le, D.P.; Yeo, S.L.; Khoo, K. Algebraic differential fault analysis on simon block cipher. IEEE Trans. Comput. 2019, 68, 1561–1572. [Google Scholar] [CrossRef]
- Lv, Y.; Shi, D.; Hu, L.; Guo, Z.; Guo, Y.; Wang, C. Improved Linear Cryptanalysis of Block Cipher BORON. Comput. J. 2024, 67, 210–219. [Google Scholar] [CrossRef]
- Naccache, D. Gröbner Basis. In Encyclopedia of Cryptography, Security and Privacy; Springer: Cham, Switzerland, 2018. [Google Scholar]
- Sabaly, T.M.; Minier, M. Differential-linear attacks from new distinguishers. Des. Codes Cryptogr. 2026, 94, 37. [Google Scholar] [CrossRef]
- Zhang, L.; Wu, Y.; Wen, Y.; Xiao, C.; Ding, D.; Lv, Q. Differential Cryptanalysis of Block Ciphers Through the Lens of Symmetry: A Review. Symmetry 2026, 18, 8. [Google Scholar] [CrossRef]
- Yu, W.; Köse, S. A voltage regulator-assisted lightweight AES implementation against DPA attacks. IEEE Trans. Circuits Syst. I Regul. Pap. 2016, 63, 1152–1163. [Google Scholar] [CrossRef]
- Mesnager, S.; Mandal, B.; Msahli, M. Survey on recent trends towards generalized differential and boomerang uniformities. Cryptogr. Commun. 2022, 14, 691–735. [Google Scholar] [CrossRef]
- Yu, B.; Lin, D.; Liu, G.; Xiong, L.; Sun, B. Further Insights on the Cryptanalysis of Lightweight Block Cipher ECLBC. IEEE Internet Things J. 2025, 12, 27649–27659. [Google Scholar] [CrossRef]
- Bonnetain, X.; Cordero, M.; Lallemand, V.; Minier, M.; Plasencia, M.N. On impossible boomerang attacks. IACR Trans. Symmetric Cryptol. 2024, 2, 222–253. [Google Scholar] [CrossRef]
- Law, Y.W.; Doumen, J.; Hartel, P. Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sens. Netw. 2006, 2, 65–93. [Google Scholar] [CrossRef]
- Wang, B.; Zhang, J.; Fang, T. Mixture Differential Cryptanalysis of Round-Reduced PRINCE. J. Phys. Conf. Ser. 2025, 3135, 012052. [Google Scholar] [CrossRef]
- Hermelin, M.; Nyberg, K. Linear cryptanalysis using multiple linear approximations. In Advanced Linear Cryptanalysis of Block and Stream Ciphers; IOS Press: Amsterdam, The Netherlands, 2011; pp. 29–53. [Google Scholar]
- Hou, Z.; Ren, J.; Chen, S. Improved machine learning-aided linear cryptanalysis: Application to DES. Cybersecurity 2025, 8, 22. [Google Scholar] [CrossRef]
- Blondeau, C.; Gérard, B. Multiple differential cryptanalysis: Theory and practice. In Proceedings of the International Workshop on Fast Software Encryption, Lyngby, Denmark, 13–16 February 2011; Springer: Berlin/Heidelberg, Germany, 2011; pp. 35–54. [Google Scholar]
- Zhou, J.; Tian, M.; Wu, Z.; Lu, L.; Zhou, Y. Recent Advances in Differential Cryptanalysis of Block Ciphers. In Proceedings of the 2025 International Conference on Networking and Network Applications (NaNA); IEEE: Piscataway, NJ, USA, 2025; pp. 393–398. [Google Scholar]
- Babbage, S.; Frisch, L. On MISTY1 Higher Order Differential Cryptanalysis. In Information Security and Cryptology—ICISC 2000; Won, D., Ed.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2001; Volume 2015, pp. 22–36. [Google Scholar] [CrossRef]
- Phan, R.C.W. Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES). Inf. Process. Lett. 2004, 91, 33–38. [Google Scholar] [CrossRef]
- Liang, L.; Du, X. Multiple impossible differential cryptanalysis of reduced-round NBC. Cryptologia 2025, 49, 268–287. [Google Scholar] [CrossRef]
- Wang, H.; Zhang, J. Optimizing key recovery in impossible cryptanalysis and its automated tool. Des. Codes Cryptogr. 2026, 94, 45. [Google Scholar] [CrossRef]
- Tian, W.; Hu, B. Integral cryptanalysis on two block ciphers Pyjamask and uBlock. IET Inf. Secur. 2020, 14, 572–579. [Google Scholar] [CrossRef]
- Soto, J.; Bassham, L. Randomness Testing of the Advanced Encryption Standard Finalist Candidates; NIST Interagency/Internal Report NISTIR 6483; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2000. [CrossRef]
- Soto, J. Randomness Testing of the Advanced Encryption Standard Candidate Algorithms; US Department of Commerce, Technology Administration, National Institute of Standards and Technology: Gaithersburg, MD, USA, 1999.
- Cheng, X.; Liu, Y.; Zhao, J. A Face Image Encryption Scheme Based on Nonlinear Dynamics and RNA Cryptography. Cryptography 2025, 9, 57. [Google Scholar] [CrossRef]
- Alsaraireh, S.; Al-Khassaweneh, M.; Al-Tarawneh, M. New Step in Lightweight Medical Image Encryption and Authenticity. Mathematics 2025, 13, 1799. [Google Scholar] [CrossRef]
- Alghamdi, Y.; Alsubaie, F.; Alqahtani, A. Image Encryption Algorithms: A Survey of Design and Evaluation Metrics. J. Cybersecur. Priv. 2024, 4, 126–152. [Google Scholar] [CrossRef]

















| Test ID | Statistical Test | Parameters | Test Statistic | p-Value | Result |
|---|---|---|---|---|---|
| T1 | Birthday Spacings | 0.61 | Pass | ||
| T2 | Collision (Multinomial) | 0.01 | Pass | ||
| T3 | Gap Test | 0.98 | Pass | ||
| T4 | Simple Poker | 0.60 | Pass | ||
| T5 | Coupon Collector | 0.92 | Pass | ||
| T6 | Maximum-of-t | 0.52 | Pass | ||
| T7 | Anderson–Darling | — | 0.69 | Pass | |
| T8 | Weight Distribution | 0.42 | Pass | ||
| T9 | Matrix Rank | 0.77 | Pass | ||
| T10 | Hamming Independence | 0.06 | Pass | ||
| T11 | Random Walk (H) | 0.35 | Pass | ||
| T12 | Random Walk (M) | 0.19 | Pass | ||
| T13 | Random Walk (J) | 0.70 | Pass | ||
| T14 | Random Walk (R) | 0.55 | Pass | ||
| T15 | Random Walk (C) | 0.99 | Pass |
| Image | Ch | Proposed NPCR | Proposed UACI |
|---|---|---|---|
| Lena | R | 99.6231 | 33.9985 |
| G | 99.6927 | 33.6145 | |
| B | 99.5637 | 33.6954 | |
| Pepper | R | 99.6771 | 33.6155 |
| G | 99.6162 | 33.7641 | |
| B | 99.6912 | 33.6964 | |
| Nature | R | 99.5785 | 33.3123 |
| G | 99.6136 | 33.6673 | |
| B | 99.6345 | 33.1456 | |
| Bird | R | 99.6641 | 33.7456 |
| G | 99.6451 | 32.3213 | |
| B | 99.6216 | 32.1956 | |
| Baboon | R | 99.6158 | 33.4345 |
| G | 99.6466 | 33.7578 | |
| B | 99.6544 | 33.3642 | |
| Grapes | R | 99.6411 | 33.2645 |
| G | 99.6452 | 32.7224 | |
| B | 99.6452 | 33.8978 | |
| Sparrow | R | 99.6941 | 33.8456 |
| G | 99.6555 | 33.4321 | |
| B | 99.6132 | 32.6978 | |
| Butterfly | R | 99.6211 | 33.7789 |
| G | 99.6232 | 32.0546 | |
| B | 99.6453 | 33.2756 |
| Data Size | Average Encryption Time (ms) | Average Decryption Time (ms) | Throughput (MB/s) |
|---|---|---|---|
| 12 KB | 0.69 | 0.71 | 17.6 |
| 100 KB | 6.41 | 6.56 | 15.6 |
| 470 KB | 25.74 | 26.11 | 18.2 |
| 1 MB | 45.41 | 46.21 | 22.0 |
| 30 MB | 286.72 | 290.42 | 104.6 |
| 60 MB | 543.50 | 549.11 | 110.4 |
| 100 MB | 2188.00 | 2195.82 | 45.7 |
| 250 MB | 5473.20 | 5485.22 | 45.6 |
| 500 MB | 10,946.37 | 10,971.43 | 45.7 |
| 750 MB | 16,419.53 | 16,457.63 | 45.7 |
| 1000 MB | 21,892.70 | 21,943.84 | 45.7 |
| Rounds (r) | Per-Round Key (bits) | Total Key Space |
|---|---|---|
| 16 | 256 | |
| 15 | 256 | |
| 14 | 256 | |
| 13 | 256 | |
| 12 | 256 | |
| 11 | 256 | |
| 10 | 256 | |
| 9 | 256 | |
| 8 | 256 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Khan, M.F.; Saleem, K.; Alshehri, A.; Aljuhni, A.; Ghazalah, S.A.; Sabir, T. Block Cipher Generation Model: A Step Towards Generative Ciphers. Symmetry 2026, 18, 853. https://doi.org/10.3390/sym18050853
Khan MF, Saleem K, Alshehri A, Aljuhni A, Ghazalah SA, Sabir T. Block Cipher Generation Model: A Step Towards Generative Ciphers. Symmetry. 2026; 18(5):853. https://doi.org/10.3390/sym18050853
Chicago/Turabian StyleKhan, Muhammad Fahad, Khalid Saleem, Ali Alshehri, Abdullah Aljuhni, Sarah Abu Ghazalah, and Tehreem Sabir. 2026. "Block Cipher Generation Model: A Step Towards Generative Ciphers" Symmetry 18, no. 5: 853. https://doi.org/10.3390/sym18050853
APA StyleKhan, M. F., Saleem, K., Alshehri, A., Aljuhni, A., Ghazalah, S. A., & Sabir, T. (2026). Block Cipher Generation Model: A Step Towards Generative Ciphers. Symmetry, 18(5), 853. https://doi.org/10.3390/sym18050853

