Next Article in Journal
Wave-DIP: Unsupervised Image Decomposition Fusing Wavelet Multi-Scale Representation and Deep Image Prior
Previous Article in Journal
On Generalized Criterion for the Non-Isothermic Spacelike Surfaces
Previous Article in Special Issue
Dual Chaotic Diffusion Framework for Multimodal Biometric Security Using Qi Hyperchaotic System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Block Cipher Generation Model: A Step Towards Generative Ciphers

by
Muhammad Fahad Khan
1,*,
Khalid Saleem
2,
Ali Alshehri
3,
Abdullah Aljuhni
4,
Sarah Abu Ghazalah
5 and
Tehreem Sabir
6
1
Department of Cyber Security, Shifa Tameer-e-Millat University (STMU), Islamabad 44000, Pakistan
2
Department of Computer Sciences, Quaid-e-Azam University, Islamabad 45320, Pakistan
3
Department of Computer Science, University of Tabuk, Tabuk 71491, Saudi Arabia
4
College of Computing and Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia
5
Department of Informatics and Computer Systems, College of Computer Science, King Khalid University, Abha 61413, Saudi Arabia
6
ExploitGate Technologies, Miami, FL 33131, USA
*
Author to whom correspondence should be addressed.
Symmetry 2026, 18(5), 853; https://doi.org/10.3390/sym18050853 (registering DOI)
Submission received: 6 February 2026 / Revised: 18 March 2026 / Accepted: 27 April 2026 / Published: 18 May 2026
(This article belongs to the Special Issue New Advances in Symmetric Cryptography)

Abstract

The protection of confidential information is a worldwide challenge, and block ciphers are the most reliable option by which data security is accomplished. To the best of our knowledge, this type of research is being performed for the first time, unlocking new avenues for block cipher design research, shifting the paradigm from cryptographer-designed ciphers to computationally generated. We propose a computational model named Block Cipher Design Generation Model (BCDGM) to generate a complete design of novel block ciphers and their primitives, such as cipher structures, S-boxes, inverse S-boxes, P-boxes, round functions, half-round functions, and derived keys, in an automated manner without the participation of cryptographers. To accomplish this goal, BCDGM only requires high-quality quantum random bits as input to generate a myriad of new block ciphers. A quantum circuit is designed over the International Business Machines Corporation (IBM) Quantum Santiago computer to generate high-quality random bits. BCDGM itself and all its generated cipher structures and primitives are invariably transparent, unreproducible, and nondeterministic due to their sole reliance on quantum random bits. Furthermore, every decision made by BCDGM is randomized. As a result, potential vulnerabilities and attacks that exist in other ciphers are bypassed in BCDGM-generated ciphers. Extensive experimentation was conducted, generating more than fifty thousand new block cipher designs tested over 107 terabytes of data. Generated ciphers are compared with twelve reputable standard block ciphers, including five AES competition finalists. The results show that the proposed block ciphers occasionally surpass standard ciphers and achieve equivalent security strength in many cases. The implementation of the proposed model is publicly available.

1. Introduction

1.1. Cipher Design from Enigmatic Art to Standardization

The famous information theorist Claude Shannon has provided two desirable characteristics that should exist in a strong cipher: confusion and diffusion, as outlined in the fundamental research on the ‘Communication Theory of Secrecy Systems’ [1]. Block ciphers strictly follow the confusion and diffusion principle in an iterative manner to generate a cipher text. Block cipher operates on the block of data (plaintext) and produces an output of similar length (ciphertext) by using a key. This relationship is represented as C = ENC k ( P ) . The encryption process, from plaintext to cipher text, is entirely dependent on the block cipher method and the key value k. The decryption process follows the reverse order, utilizing the same key, and is represented as D k ( C ) = P [2].
The notable progress in the design of block ciphers was started in the late 1960s, when Horst Feistel and Walt Tuchman led an IBM research program to develop secure ciphers. During the research program, a series of ciphers were developed, called the Lucifer ciphers. Generally, the Lucifer cipher is considered the first civilian block cipher. A few Lucifer ciphers were based on the Substitution Permutation Network (SPN), and a few were based on the Feistel Network. Later, this research program was ended in 1971 [2,3]. In 1973, the National Bureau of Standards (NBS), which is currently known as National Institute of Standards and Technology (NIST), published a proposal for the cryptographic algorithms to protect data during the storage and transmission process.
At that time, the need for cryptographic algorithms to protect the commercial use of computers was recognized by the NBS. It was a historic moment because before this call for proposals, cryptography had been considered the ‘black art’, mainly practiced by the military and national security organizations. In response to the NBS call, IBM submitted a cryptographic design based on the “Lucifer” design, and later, this design evolved into a data encryption standard (DES). In 1976, the National Security Agency (NSA) approved DES as an encryption standard, despite the criticism on key size and the existence of a backdoor in their S-boxes structure. DES was authorized for use in all non-classified government organization communications. After achieving the status of an NSA-approved encryption standard, DES was widely accepted internationally [4].
Another notable progress in block cipher design took place in 1997, when NIST issued a call for proposals for an advanced encryption standard (AES). In response to the AES call, an initial submission of fifteen proposals was received from preeminent figures in the domain of cryptography, distinguished research institutions, and leading technological enterprises across the globe. The names of the proposals were CAST-256, CRYPTON, DEAL, DFC, E2, FROG, Hasty Pudding, LOKI97, MAGENTA, MARS, RC6, Rijndael, SAFER+, Serpent, and Twofish [3].
In 1999, after several rounds of testing, ten algorithms were dropped, and five algorithms: Twofish, MARS, Serpent, RC6, and Rijndael, were selected for the final competition. In October 2002, the Rijndael algorithm was selected as the winner of AES; it was designed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen. In 2003, the US national security agency approved AES for encrypting all government documents up to “secret level” with any key length, but for the “top secret level” documents, the key length was safe to 192 or 256 bits. It was the first time that a public encryption scheme was used for securing official documents. From 2001 to the present date, AES is considered an industry standard. AES encrypts millions of pieces of secret data every second. Its application spans a wide spectrum of technological interfaces, including ubiquitous web browsers, firewalls, routers, diverse operating systems, communication applications, and cryptographic standards such as internet protocol security (IPsec), transport layer security (TLS), IEEE 802.11i the Wi-Fi encryption standard, the WPA2 protocol, and the venerable network protocol Secure Shell (SSH) [3].
GOST, CLEFIA, CAST-128, Camellia, Blowfish, and ANUBIS are a few other block ciphers that are widely adopted in different regions and countries. For instance, the GOST block cipher is the standard for both the Soviet and Russian governments, with its latest iteration released in 2015. Similarly, CLEFIA has received a recommendation from the cryptography research and evaluation committees of the Japanese government, with its latest release in 2019. CAST-128 holds the endorsement of the communications security establishment of the Canadian government. In 2003, the Camellia cipher obtained approval for New European Schemes for Signatures, Integrity, and Encryption EU (NESSIE). Skipjack is another renowned cipher designed by the NSA that was kept secret for a long time. Consequently, it lost trust due to the lack of transparency associated with the key escrow policy. This lack of transparency raised suspicions within the cryptographic community regarding potential hidden vulnerabilities or backdoors [5]. Kuznyechik (also known as GOST R 34.12-2015 [6]) is another prominent block cipher standardized by the Soviet and Russian agency, utilizing 8-bit S-boxes. The architects of Kuznyechik chose not to disclose the specific design of the S-boxes. This decision has also raised concerns about the potential intentional insertion of hidden weaknesses [7,8,9].
Modern block ciphers such as advanced encryption standard rely on manually engineered cryptographic primitives, including S-boxes, permutation layers, and round transformations designed through extensive human analysis. This manual design process is extremely complex, requires years of cryptographic expertise, and typically results in a single fixed architecture that remains unchanged once standardized. Consequently the exploration of alternative cipher structures with independent randomness and diverse internal configurations is limited. From a research perspective, this creates a gap. There is no framework capable of automatically generating secure block cipher architectures offline, including S-boxes, permutations, and round structures, while still adhering to classical cryptographic principles of confusion and diffusion. The research therefore addresses the following problem: how to design an automated block cipher generation framework capable of producing complete cipher architectures offline with strong statistical randomness, scalable round structures while ensuring that the generated cipher can be deployed in the same operational manner as standardized algorithms such as AES. This problem is addressed through the proposed Block Cipher Design Generator Model (BCDGM), which generates cipher architectures prior to deployment rather than during runtime communication.

1.2. Contribution

To the best of our knowledge, this nature of research is being performed for the first time, generating complete designs of novel block ciphers and their primitives in an automated manner without the participation of cryptographers. To accomplish this goal, BCDGM only requires high-quality quantum random bits as input to generate a myriad of new block ciphers. A quantum circuit is designed over the IBM Quantum Santiago computer to generate high-quality random bits. BCDGM itself and all its generated cipher structures and primitives are invariably transparent, unreproducible, and nondeterministic, due to their sole reliance on quantum random bits. BCDGM is free from the existing backdoors such as by-design backdoors, weak key backdoors, algorithmic trapdoors, hidden encryption modes, mathematical backdoors, hidden parameters, or similar vulnerabilities.
Abundant scholarly investigations exist in the research literature that target the mathematical foundations of existing block cipher primitives and structures. For example, algebraic structure-based S-box construction techniques are extensively targeted by various potential attacks, such as interpolation attack [5], gröbner basis attack [7,10], SAT solver [8,11], linear and differential attacks [9,12], XL attacks [13], XSL attacks [13], integral cryptanalysis [14,15], boomerang attack [14,16], truncated differential cryptanalysis [17,18], multiple linear cryptanalysis [19,20], multiple differential cryptanalysis [21,22], higher-order differential cryptanalysis [23], impossible differential cryptanalysis [24,25,26], and integral cryptanalysis [27]. However, instead of relying on mathematical foundations and algebraic structures, BCDGM generated ciphers totally rely on quantum random bits. As a result, the generated cipher bypasses the aforementioned potential vulnerabilities. Every decision of the BCDGM is randomized; consequently, existing potential vulnerabilities are irrelevant to our generated ciphers. These decisions involve considerations such as the following:
  • Determining how many rounds will be applied to each plaintext block.
  • Which cipher structure will be applied to each round, such as left Feistel, Substitution-Permutation Network, right Feistel, left Lai–Massey, right Lai–Massey, and any possible randomized combination.
  • Which S-box will be used in which round and what will be the values of the S-box.
  • Which P-box will be used in which round and what will be the values of the P-box.
  • Which derived key will be used in which round and what will be the values of the derived keys.
  • How many S-boxes, P-boxes, and derived keys will be used or similar other decisions.
The asymptotic computational complexity of both encryption and decryption is the same as that of AES, i.e., O(N).
The BCDGM has the capability to generate a myriad of new block cipher designs with their primitives. For the experiment, we conducted extensive testing, generating more than fifty thousand new block cipher designs and their corresponding primitives, such as S-boxes, reverse S-boxes, P-boxes, round functions, half round functions, and derived keys. A comprehensive assessment of 50,000 novel block cipher designs was conducted over 107 terabytes of data. During the testing phase, a total of 66,725 ciphers were generated. Out of these, 50,000 ciphers satisfied the evaluation criteria presented in Section 3.1, Section 3.2, Section 3.3, Section 3.4, Section 3.5 and Section 3.6, whereas the remaining 16,725 ciphers were discarded. Generated ciphers are compared with twelve standard reputable block ciphers. Among these twelve, five stood out as AES competition finalists, while the remaining seven are widely adopted in various regions across the globe. Our generated block ciphers occasionally surpass standard block ciphers across various test criteria and also produce equivalent strength in many cases. The main factor behind this achievement is that every structure, primitive, and step of our proposed model is purely randomized. The first motivation for this research was randomness; randomness is the philosophy of science. It is a fundamental feature of nature and an indubitably valuable resource for cryptography, and the second motivation is generative AI. This research unlocks new avenues for cipher design research, shifting the paradigm from cryptographer designed ciphers towards computationally generated ciphers.
The single contribution of this research is the generation of block ciphers and their cryptographic primitives. BCDGM does not generate ciphers during communication; it only designs the cipher offline, and the generated cipher can later be used in a fixed form at both the sender and receiver sides, similar to conventional block ciphers. The generated cipher primitives in our framework are also fixed and shared beforehand. Therefore, no cipher generation occurs during runtime communication; the generated cipher is used in the same operational manner as AES.
The remaining paper is arranged as follows: Section 2 explains the proposed model; Section 3 presents the results and its evaluation; Section 4 presents the conclusion.

2. Proposed Model: Block Cipher Designs Generator Model (BCDGM)

Kerckhoffs’ principle states that a cryptosystem is secure even if everything about the system except the key is public knowledge. Kerckhoffs introduces this principle for cryptographers to the design of standalone ciphers. In our case, BCDGM replaced the cryptographers; that is why the ciphers generated from the BCDGM also strictly follow Kerckhoffs’ principle. Each generated cipher does not require the secrecy of the cipher itself, except the key. Even so, we are one step ahead, as the internal design of BCDGM itself strictly follows Kerckhoffs’ principle; the internal design is open except the input source, which is quantum random bits.
Before beginning to understand BCDGM, it is noteworthy that the model is intricate and substantial in scope, and to understand each module thoroughly, we have attached the module’s flowchart/algorithm. In some modules, we have also appended visual interpretations with the flowchart/algorithm. These attachments will significantly facilitate the readers to understand the BCDGM. The proposed BCDGM model is depicted in Figure 1. In the upper part of the model, randomized primitives generation is shown, and in the lower part, cipher structure generation is shown. BCDGM requires a high-quality true random bit stream, any plaintext, and a 32-byte key from the user, and it returns a novel block cipher design along with its primitives. To obtain a high-quality truly random bit stream, we performed iterative executions of the quantum random number generation (QRNG) circuit over the IBMQ-Santiago quantum computer. The QRNG circuit is illustrated in Figure 2.
True random bits are directly used to generate primitives like S-boxes, P-boxes, and derived keys. The detailed algorithm for generating S-boxes and P-boxes based on a quantum random bit stream is illustrated in Supplementary S1. Additionally, the reverse S-box generation algorithm is also provided in Supplementary S1. Block ciphers generated by BCDGM encrypt one block at a time, and the size of the output block is always equal to the input block. The transformation from the input block to the output block is achieved through the randomized primitives and randomized cipher structures. BCDGM generates a random number of rounds to process a single plaintext block. These rounds are iterated such that the output of one round becomes the input of the next. After the rounds, the cipher text is emitted, and the next block of plaintext is processed. Random bits determine the number of rounds that will be applied to a single plaintext block, and random bits also determine which cipher structure will be generated. Similarly, random bits determine which S-box, P-Box, inverse S-box, and derived key will be applied to each block and what will be the values of these primitives.
In a single cipher, it is feasible that each block of the plaintext is processed through different rounds. For example, in Supplementary S2, a new block cipher design is generated in which we can see that on block-1 eight, different rounds are applied; on block-2, nine different rounds are applied; on block-3, thirteen different rounds are applied; on block-4, twelve different rounds are applied; on block-6, fourteen different rounds are applied. Principally, in every round, three different operations are performed in a single block regardless of its structure type: Like left Feistel, Substitution-Permutation Network, right Feistel, left Lai–Massey, right Lai–Massey, and any possible randomized combination, collectively referred to as a hybrid structure. These three round operations are confusion, diffusion, and key whitening. BCDGM achieved confusion through S-boxes, diffusion through P-boxes, and key whitening through (key ⊕ block) operation. In a single generated cipher, it is also feasible that each block of the plaintext can be processed through a single structure, as illustrated in Supplementary S3–S5. It can be observed that plaintext blocks are processed with either the SPN structure, Left Feistel, Right Feistel structure, Left Lai–Massey, or Right Lai–Massey structures, respectively. In the single generated cipher, it is also feasible that each block of the plaintext can be processed through randomized structure, like in Supplementary S6, round-1 of the block-2 is processed through Feistel structure. In the same round-1, block-3 is processed through the left Lai–Massey structure. In the same round-1, block-1 is processed through SPN structure. In the same round-1, block-13 is processed through right Lai–Massey structure. The flowchart presented in Supplementary S7 depicts the complete cipher generation process, including the key generation algorithm, the derived key generation algorithm, key mixture algorithm, round key generation algorithm, round encryption algorithm, round substitution algorithm, round permutation algorithm, block extraction algorithm, algorithm for constructing protocol headers, algorithm for constructing round headers, and algorithm for constructing round structure.
Generated ciphers only require a 32-byte key from the user. This key is not directly used in round and inverse functions; instead, the round function and inverse function only use derived keys. Our proposed key generation method produces the required number of derived keys by using a single 32-byte key as a seed. The key generation process is illustrated in Figure 3. In Supplementary S7, the comprehensive step-by-step methodology for key generation is visually presented in the form of a flowchart. All the primitives of block ciphers such as S-boxes, P-boxes, inverse S-boxes, cipher structure, and derived keys are assigned randomly to each round and each block by using the randomized primitive’s assignment protocol. Based on the random numbers, randomized primitive’s assignment protocol decides seven essential building blocks of the BCDGM, which are as follows:
  • How many rounds will be applied to each plaintext block.
  • Which cipher structure will be applied to which block.
  • Which S-box will be used in which block and what will be the values of the S-box.
  • Which P-box will be used in which block and what will be the values of the P-box.
  • How many S-boxes, P-boxes, inverse S-boxes, and derived keys will be used.
  • Which derived key will be used in which block and what will be the values of the derived keys.
  • Which inverse S-box will be used in which block and what will be the values of the inverse S-box.
The complete format of the randomized primitive’s assignment protocol is illustrated in Figure 4. To facilitate simplicity and improve the reader’s comprehension, we present a sample randomized primitive’s assignment protocol of a very basic and small block cipher.

3. Results and Evaluation

This section delineates essential details related to the results, experimental setup, assessment criteria, and set of analyses. For the evaluation, different types of analysis are applied on different categories of the data sets; these analyses and corresponding data sets follow the evaluation criteria stipulated by the advanced encryption standard (AES) [28,29]. In the process of assessing our block cipher strength, a comprehensive evaluation is conducted by comparing them with 12 standard block ciphers. Notably, five of these ciphers were finalists in the esteemed advanced encryption standard (AES) competition: Twofish, MARS, Serpent, RC6, and Rijndael. Additionally, our evaluation extended to include other prominent ciphers, such as DES, GOST, CLEFIA, CAST-128, Camellia, Blowfish, and ANUBIS. The BCDGM has the capability to generate a myriad of new block cipher designs and its primitives. However, we present here eight ciphers generated using BCDGM for discussion and analysis; these ciphers are randomly picked.
In the experimentation, a set of 15 standard plaintexts and keys are employed, encompassing a diverse range of combinations. This encompassed variations such as {low-density key with low-density plaintext}, {low-density key with high-density plaintext}, {low-density flipped key with high-density plaintext}, {low-density key with randomized plaintext}, {high-density key with high-density flipped plaintext}, and {randomized flipped key with randomized plaintext}, among others. To further elucidate the parameters of our experimentation, let Plaintext1 = {010101010101, …, N }, Plaintext1Flipped = { 110101010101 , , N } , where N = 8437 . Key1 {0, 0, 0, 0, 0, …, N}, KeylFlipped = { 1 , 0 , 0 , 0 , 0 , , N } , where N = 64 . Plaintext2 = {010101010101, …, N}, Plaintext2Flipped = {110101010101, …, N}, where N = 8437 . The randomized Key 2 = {6, 126, 108, 15, 87, 120, 114, …, N}, Key2Flipped = {5, 126, 108, 15, 87, 120, 114, …, N}, where N = 64 . Plaintext3 = {100000000, …, N}, Plaintext3Flipped {110000000, …, N}, where N = 9710. Key3 = { 0 , 1 , 0 , 0 , 0 , 0 , 0 , , N } , Key3Flipped = {0, 0, 0, 0, 0, 0, 0, …, N}, where N = 64. Plaintext4 = {011111111, …, N}, Plaintext4Flipped = {111111111, …, N}, where N = 9728. Key4 = {0, 0, 1, 1, 1, 1, 1, …, N}, Key4Flipped = { 1 , 0 , 1 , 1 , 1 , 1 , 1 , , N } , where N = 64 . Plaintext5 = {000000000, …, N}, Plaintext5Flipped = {100000000, …, N}, where N = 7148. The randomized Key5 = {105, 53, 49, 23, 98, 26, 106, 43, 27, …, N}, Key5Flipped = {106, 53, 49, 23, 98, 26, 106, 43, 27, …, N}, where N = 64 . The remaining plaintexts and keys are delineated in Supplementary S8. In the assessment process, six different types of analysis, each corresponding to different categories of the datasets, are applied to twenty different ciphers. The first twelve ciphers are standard block ciphers, and the remaining eight ciphers are the generated block ciphers. To augment the readability of results, the outcomes are categorized into two groups: {P1K1, P3K3, P5K5, P7K7, P9K9, P11K11, P13K13, P15K15} and {P2K2, P4K4, P6K6, P8K8, P10K10, P12K12}.

3.1. Avalanche Effect (Plaintext, Key) Compared to Avalanche Effect (Plaintext, Key Flipped)

The avalanche effect is a desirable property in cryptography and it refers to the phenomenon where a small change in the key results in a drastic change in the output. This assessment applies fifteen pairs of parameters {P1K1 and P1K1Flipped, P2K2 and P2K2Flipped, P15K15 and P15K15Flipped} individually to twenty various block ciphers {DES, MARS, GOST, CLEFIA, CAST, Camellia, BLOWFISH, ANUBIS, AES, RC6, SERPENT, TWOFISH [30,31,32] Generated Cipher (GC)-2, GC-3, GC-4, GC-5, GC-6, GC-7, GC-8, and GC-9}. This rigorous analysis involves the processing of millions of bits. In Figure 5 and Figure 6, the results portray the impact of applying the avalanche effect on key flipping to the twenty ciphers. The results of the avalanche effect on our eight generated block ciphers are approximately 0.5, which are similar to the results of other standard block ciphers such as AES, GOST, Blowfish, Camellia, and DES.

3.2. Avalanche Effect (Plaintext, Key) Compared to Avalanche Effect (Plaintext Flipped, Key)

This explores the avalanche effect on plaintext flipping, which examines the sensitivity of each cipher to changes in plaintext. To conduct this assessment, fifteen pairs of parameters: {P1K1 and P1FlippedK1, P2K2 and P2FlippedK2, …, P15K15 and P15FlippedK15}, are applied one by one to the twenty block ciphers {DES, MARS, GOST, …, GC-9}. In Figure 7 and Figure 8, the results depict the impact of applying the avalanche effect on plaintext flipping to the twenty ciphers. The plaintext avalanche effect score on our eight generated block ciphers is approximately 0.5, completely fulfilling the required criteria. Furthermore, a comparative analysis reveals that our proposed cipher outperforms MARS, CLEFIA, CAST, ANUBIS, RC4, SERPENT, and TWOFISH.

3.3. Correlation (Plaintext, Key) Compared to Correlation (Plaintext, Key Flipped)

It examines the relationship between a single alteration in the key and the resultant changes in the encrypted output. To conduct this assessment, fifteen pairs of plaintexts with keys and plaintexts with flipped keys: {P1K1 and P1K1Flipped, P2K2 and P2K2 Flipped, P15K15 and P15K15Flipped} are applied one by one to the twenty block ciphers {DES, MARS, GOST, …, GC-9}. Then, the correlation between the plaintexts and the flipped keys is measured. The goal of this test is to evaluate how a single change in the encryption key affects the correlation between the plaintext and the cipher text. A low correlation between the plaintext and the flipped key indicates that the cipher exhibits good strength. The results, available in the form of bar charts in Figure 9 and Figure 10, show that the correlation value of key flipping on our generated block ciphers is excellent (≈0.02), except for the results of GC-5 (P12K12 and P12K12Flipped). It is also observed that our generated cipher results are similar to those of AES, GOST, Blowfish, Camellia, and DES.

3.4. Correlation (Plaintext, Key) Compared to Correlation (Plaintext Flipped, Key)

This examines the relationship between a single alteration in the plain text and the resultant changes in the encrypted output. To conduct this assessment, fifteen pairs of plaintexts, keys and flipped plaintexts, keys: {P1K1 and P1FlippedK1, P2K2 and P2FlippedK2, P15K15 and P15FlippedK15}, are applied one by one to the twenty block ciphers {DES, MARS, GOST, …, GC-9}. Then, the correlation between the plaintexts and the flipped plaintext is measured. The objective of this test is to assess how altering the plaintext affects its correlation with the key and, conversely, how this alteration affects the resultant cipher text. A low correlation between the plaintext–key pairs and the flipped plaintext–key pairs signifies robust cipher strength. The results, illustrated in bar charts in Figure 11, demonstrate that the correlation value between plaintext and flipped plaintext on our generated block ciphers is excellent (≈0.01). Furthermore, it is noted that our generated cipher results closely resemble those with AES, GOST, Blowfish, Camellia, and DES. This analysis also reveals that our proposed cipher outperforms MARS, CAST, ANUBIS, RC4, SERPENT, and TWOFISH.

3.5. Correlation (PlainText) Compared to Correlation (CipherText)

This evaluates the correlation between plaintext and the corresponding cipher text. High correlation score between plaintext and cipher text indicates potential vulnerabilities in the cipher and makes it susceptible to attacks such as differential cryptanalysis. Low correlation score between plaintext and cipher text indicates a strong cipher. To conduct this assessment, fifteen parameters: {P1K1, P2K2, …, P15K15}, are applied one by one to the twenty block ciphers {DES, MARS, GOST, …, GC-9}, and the resultant cipher text output is, respectively, compared with {P1, P2, P3, …, P15}. Then the correlation score between the plaintexts and the cipher text is measured. These measured results are shown in Figure 12 and Figure 13. The results are evident that our cipher closely resembles other ciphers, including AES, GOST, Twofish, Camellia, and DES.

3.6. NIST Statistical Randomness Tests

These are intricate statistical metrics developed by NIST to evaluate the randomness of binary sequences [17,18]. The suite consists of multiple tests designed to detect non-random characteristics that compromise the strength of ciphers. The primary objective of the NIST Randomness Test Suite is to ensure that the output of ciphers exhibits characteristics of randomness to such a degree that it becomes impossible for an adversary to distinguish between the cipher’s output and data generated by PRNG/TRNG. Each test in the suite produces a p-value, representing the probability that the observed sequence is random. A low p-value indicates the sequence exhibits patterns, while a high p-value indicates that the sequence appears to be random. The p-value determines whether a sequence passes or fails each test. To perform this assessment, fifteen parameters, denoted as {P1K1, P2K2, P15K15}, are applied individually to the twenty block ciphers {DES, MARS, GOST, …, GC-9}. Subsequently, NIST statistical randomness tests are applied to the resulting outputs of these ciphers. The number of passed NIST statistical tests is presented in Figure 14 and Figure 15. The results indicate that, similar to other reputable ciphers such as AES, GOST, Camellia, and Blowfish, our eight computationally generated ciphers also exhibit a high degree of randomness.

3.7. Statistical Randomness Evaluation Using TestU01

One hundred cipher instances are randomly selected from the generated cipher pool, and the encrypted outputs of these ciphers are then evaluated using the TestU01 statistical framework, which includes tests for spacing distribution, collision frequency, matrix rank characteristics, bitwise independence, and random-walk behavior. Table 1 shows the average results of the statistical tests performed on the 100 cipher texts, which indicate the absence of detectable non-uniform structures and statistical biases. The obtained p-values consistently fall within the acceptable range, and the keystream derived from the cipher text preserves strong entropy characteristics that also have a uniform probability distribution and negligible inter-bit correlation. All these assessments validate that the statistical robustness of the generated sequences is suitable for cryptographic applications that need high unpredictability and strong resistance against statistical and structural cryptanalytic attacks.

3.8. Differential Security Analysis Using NPCR and UACI Metrics

One hundred cipher instances are randomly selected from the generated cipher pool, and after that, these ciphers are used to encrypt standard benchmark images, including the Lena, Pepper, Baboon, Grapes, Sparrow, and Butterfly. For each encrypted output, the differential security metrics number of pixel change rate and unified average changing intensity are computed. The NPCR and UACI values are obtained from the encrypted images generated by the 100 distinct ciphers. These values are statistically aggregated, and their mean values are reported in Table 2. These metrics quantify diffusion strength and sensitivity to minimal plaintext perturbations. Comparative analysis with the state-of-the-art image encryption schemes indicates that the proposed cipher framework achieves competitive differential characteristics. The results demonstrate strong diffusion capability and effective resistance against differential cryptanalytic attacks. The Lena image is used as a standard test image in this study. The original image is separated into its three color channels (R, G, B), and each channel is encrypted independently. Figure 16 illustrates the original RGB channels alongside their corresponding encrypted outputs where subfigures (a,b,c) depict the original R, G, B channels, and subfigures (d,e,f) show the encrypted channels produced by the proposed encryption scheme.
NPCR = i , j D ( i , j ) M × N × 100
where
D ( i , j ) = 0 , if I ( i , j ) = J ( i , j ) , 1 , if I ( i , j ) J ( i , j ) .
The unified average changing intensity (UACI) is defined as
UACI = 1 M × N i , j | C 1 ( i , j ) C 2 ( i , j ) | 255 × 100
where C 1 ( i , j ) and C 2 ( i , j ) indicate the pixel values of two encrypted images at location ( i , j ) . M represents the number of rows, and N represents the number of columns of the plain image. Encryption security is improved with a large UACI value. The ideal expectations of NPCR and UACI can be calculated by the following formulas:
NPCR ideal = 1 1 2 n × 100 %
UACI ideal = 1 2 n k = 1 2 n 1 k 2 n 1 × 100 %
where n is the number of bits used to denote the various bit planes of an image. High values of UACI and NPCR indicate strong resistance against differential attacks. Table 2 indicates the values of NPCR and UACI. The NPCR values obtained in our results are consistently around 99.63 , which is considered a very good value. Similarly, the UACI values are around 33.5 , which also demonstrates strong encryption performance.

3.9. Resistance Analysis Against Structured-Plaintext, Known-Plaintext, and Chosen-Plaintext Attacks

Let a proposed cipher be modeled as an r-round keyed permutation
E K : { 0 , 1 } n { 0 , 1 } n
with ciphertext
C = E K ( P ) .
To analyze structured-plaintext attacks, define the plaintext subset
T { 0 , 1 } n
representing structured textual inputs such as repeated characters, low-entropy binary strings, periodic bit patterns, sparse blocks, and dense blocks.
For adversarial access, define an encryption oracle
O E ( P ) = E K ( P ) .
The known-plaintext attack corresponds to observing pairs
( P i , C i ) = ( P i , E K ( P i ) )
with P i T , while a chosen-plaintext attack corresponds to adaptive queries
P i A ( · ) , C i = E K ( P i ) .
To evaluate whether structured plaintext patterns leak exploitable structure, we define the statistical leakage
L T = I ( P ; C )
where I ( · ) denotes mutual information between plaintext and ciphertext distributions restricted to T . A secure cipher requires
L T 0 .
The cipher’s nonlinear layer can be characterized using the maximum differential probability
δ max = max x 0 , y Pr S ( x ) S ( x x ) = y
and the maximum absolute linear bias
λ max = max α 0 , β 0 Pr [ α · x = β · S ( x ) ] 1 2 .
Let A ( r ) denote the minimum number of active nonlinear components over any r-round propagation trail. Then, the probability of a differential characteristic generated by structured plaintext differences P satisfies
Pr [ E K ( P ) E K ( P P ) = C ] ( δ max ) A ( r ) .
Similarly, any linear relation between structured plaintext masks α and ciphertext masks β satisfies
| Corr ( α · P , β · E K ( P ) ) | ( λ max ) A ( r ) .
The data complexity required for a successful known-plaintext linear distinguisher is, therefore,
N lin 1 ( λ max ) 2 .
Because A ( r ) grows with the number of rounds due to diffusion, both differential probabilities and linear correlations rapidly decrease across multiple nonlinear components. The generated ciphers exhibit plaintext avalanche scores very close to the ideal value of 0.5 and show very low plaintext–ciphertext correlation across structured plaintext families, including sparse, dense, repeated, flipped, and randomized inputs.
These observations indicate that structured plaintext patterns do not produce statistically exploitable ciphertext structure. Accordingly, the revised manuscript clarifies that the proposed cipher family demonstrates both empirical and analytical resistance to structured-plaintext KPA/CPA analysis.

3.10. Asymptotic Computational Complexity and Scalability Analysis

A scalability analysis quantitatively evaluates encryption and decryption execution times, throughput, resource utilization, and algorithmic complexity across varying plaintext sizes. We randomly select 100 cipher instances generated by the proposed model. Table 3 presents the average performance metrics of these instances. The results exhibit linear scaling of execution time with data size, minimal divergence between encryption and decryption times, and stable throughput, collectively validating the framework’s operational efficiency, balanced computational complexity, and practical suitability.
To encrypt N bytes of plaintext, the asymptotic computational complexity of the proposed generated encryption algorithms is O ( n ) , which is equivalent to the complexity of AES.

3.11. Key Space Estimation of the Generated Ciphers

The complete flowchart of the key schedule design is shown in Figure 17. The total key space of the proposed cipher is determined by the per-round key length k = 256 bits and the number of rounds r. Each round uses a unique subkey; therefore, the total key space is given by
K = 2 k × r = 2 256 r .
For example, a 10-round cipher has a key space of K = 2 2560 , while a 16-round cipher has a key space of K = 2 4096 . Even the minimum round configuration ( r = 8 ) yields a key space of K = 2 2048 , ensuring that exhaustive key-search attacks are computationally infeasible. This demonstrates that the proposed encryption algorithm is highly secure against brute-force attacks. Table 4 provides the key space estimation for different round configurations.

4. Conclusions

This paper unlocks new avenues for block cipher design research, shifting the paradigm from cryptographer-designed ciphers to computationally generated ones. The proposed model automatically generates block ciphers and their primitives without the direct participation of cryptographers. Although these computationally generated ciphers are not designed by renowned cryptographers, each generated cipher and its primitives are novel and free from existing backdoors, trapdoors, and previously known vulnerabilities. Moreover, the strength of the generated cipher is comparable to that of well-established industry-standard ciphers such as AES, GOST, CLEFIA, Twofish, MARS, Serpent, RC6, DES, CAST-128, Camellia, Blowfish, and ANUBIS.
To evaluate the strength of the generated ciphers, different types of analyses are applied to multiple categories of datasets. These analyses and corresponding datasets follow the evaluation criteria stipulated by the AES competition. In several cases, the generated block ciphers even surpass these standard block ciphers across certain testing criteria while maintaining equivalent security strength in other cases. The primary factor behind this achievement is that every cipher structure, primitive, and step of the proposed model is purely randomized. Furthermore, the implementation of the proposed model is publicly available.
However, the major limitation of the proposed cipher generation model is its reliance on a large number of high-quality quantum random bits to construct its structures and primitives. Since the system depends entirely on the quality of randomness, quantum true random bits are employed. To ensure their reliability and suitability for the model, these bits are rigorously evaluated prior to use through multiple statistical testing frameworks, including the NIST Statistical Test Suite, Diehard tests, TestU01 suite, and entropy-based evaluations.
In future work, the proposed model will be extended toward lattice-based cryptography to explore its applicability in post-quantum cryptographic systems.

Supplementary Materials

The following supporting information can be downloaded at: https://www.mdpi.com/article/10.3390/sym18050853/s1, Supplementary S1: Quantum Random Bit–Based Generation of Cryptographic Substitution and Permutation Primitives; Supplementary S2: Sample Substitution Permutation Network Inspired Automatically Generated Cipher Structure; Supplementary S3: Sample Feistel Structure Inspired Automatically Generated Cipher Structure; Supplementary S4: Sample Automatically Generated Cipher Structure Inspired Lai–Massey; Supplementary S5: Sample Automatically Generated Cipher Structure Inspired by Balanced Substitution–Permutation Network; Supplementary S6: Sample Automatically Generated Hybrid Cipher Structure; Supplementary S7: key generation algorithm; Supplementary S8: Plaintext–Key Perturbation Dataset.

Author Contributions

Methodology, M.F.K.; software, K.S. and T.S.; validation, A.A. (Ali Alshehri); formal analysis, K.S. and S.A.G.; investigation, A.A. (Abdullah Aljuhni); resources, A.A. (Abdullah Aljuhni); writing—original draft preparation, M.F.K.; writing—review and editing, M.F.K.; supervision, M.F.K. All authors have read and agreed to the published version of the manuscript.

Funding

The authors extend their appreciation to the Deanship of Research and Graduate Studies at King Khalid University for funding this work through Large Research Project under grant number RGP2/714/46.

Data Availability Statement

The original contributions presented in this study are included in the article/Supplementary Materials. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

Author Tehreem Sabir was employed by the company Exploit Gate Technologies. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  2. Knudsen, L.R.; Robshaw, M. The Block Cipher Companion; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
  3. Avanzi, R. A Salad of Block Ciphers; IACR Cryptology ePrint Archive, Report 2016/1171; International Association for Cryptologic Research: Lyon, France, 2016. [Google Scholar]
  4. Schneier, B. Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed.; John Wiley & Sons: New York, NY, USA, 1996. [Google Scholar]
  5. Khan, M.F.; Saleem, K.; Alshara, M.A.; Bashir, S. Multilevel information fusion for cryptographic substitution box construction based on inevitable random noise in medical imaging. Sci. Rep. 2021, 11, 14282. [Google Scholar] [CrossRef] [PubMed]
  6. GOST R 34.12-2015; Information Technology. Cryptographic Data Security. Block Ciphers. Standardinform: Moscow, Russia, 2015.
  7. Waseem, H.M.; Hwang, S.O. Design of highly nonlinear confusion component based on entangled points of quantum spin states. Sci. Rep. 2023, 13, 1099. [Google Scholar] [CrossRef] [PubMed]
  8. Le, D.P.; Yeo, S.L.; Khoo, K. Algebraic differential fault analysis on simon block cipher. IEEE Trans. Comput. 2019, 68, 1561–1572. [Google Scholar] [CrossRef]
  9. Lv, Y.; Shi, D.; Hu, L.; Guo, Z.; Guo, Y.; Wang, C. Improved Linear Cryptanalysis of Block Cipher BORON. Comput. J. 2024, 67, 210–219. [Google Scholar] [CrossRef]
  10. Naccache, D. Gröbner Basis. In Encyclopedia of Cryptography, Security and Privacy; Springer: Cham, Switzerland, 2018. [Google Scholar]
  11. Sabaly, T.M.; Minier, M. Differential-linear attacks from new distinguishers. Des. Codes Cryptogr. 2026, 94, 37. [Google Scholar] [CrossRef]
  12. Zhang, L.; Wu, Y.; Wen, Y.; Xiao, C.; Ding, D.; Lv, Q. Differential Cryptanalysis of Block Ciphers Through the Lens of Symmetry: A Review. Symmetry 2026, 18, 8. [Google Scholar] [CrossRef]
  13. Yu, W.; Köse, S. A voltage regulator-assisted lightweight AES implementation against DPA attacks. IEEE Trans. Circuits Syst. I Regul. Pap. 2016, 63, 1152–1163. [Google Scholar] [CrossRef]
  14. Mesnager, S.; Mandal, B.; Msahli, M. Survey on recent trends towards generalized differential and boomerang uniformities. Cryptogr. Commun. 2022, 14, 691–735. [Google Scholar] [CrossRef]
  15. Yu, B.; Lin, D.; Liu, G.; Xiong, L.; Sun, B. Further Insights on the Cryptanalysis of Lightweight Block Cipher ECLBC. IEEE Internet Things J. 2025, 12, 27649–27659. [Google Scholar] [CrossRef]
  16. Bonnetain, X.; Cordero, M.; Lallemand, V.; Minier, M.; Plasencia, M.N. On impossible boomerang attacks. IACR Trans. Symmetric Cryptol. 2024, 2, 222–253. [Google Scholar] [CrossRef]
  17. Law, Y.W.; Doumen, J.; Hartel, P. Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sens. Netw. 2006, 2, 65–93. [Google Scholar] [CrossRef]
  18. Wang, B.; Zhang, J.; Fang, T. Mixture Differential Cryptanalysis of Round-Reduced PRINCE. J. Phys. Conf. Ser. 2025, 3135, 012052. [Google Scholar] [CrossRef]
  19. Hermelin, M.; Nyberg, K. Linear cryptanalysis using multiple linear approximations. In Advanced Linear Cryptanalysis of Block and Stream Ciphers; IOS Press: Amsterdam, The Netherlands, 2011; pp. 29–53. [Google Scholar]
  20. Hou, Z.; Ren, J.; Chen, S. Improved machine learning-aided linear cryptanalysis: Application to DES. Cybersecurity 2025, 8, 22. [Google Scholar] [CrossRef]
  21. Blondeau, C.; Gérard, B. Multiple differential cryptanalysis: Theory and practice. In Proceedings of the International Workshop on Fast Software Encryption, Lyngby, Denmark, 13–16 February 2011; Springer: Berlin/Heidelberg, Germany, 2011; pp. 35–54. [Google Scholar]
  22. Zhou, J.; Tian, M.; Wu, Z.; Lu, L.; Zhou, Y. Recent Advances in Differential Cryptanalysis of Block Ciphers. In Proceedings of the 2025 International Conference on Networking and Network Applications (NaNA); IEEE: Piscataway, NJ, USA, 2025; pp. 393–398. [Google Scholar]
  23. Babbage, S.; Frisch, L. On MISTY1 Higher Order Differential Cryptanalysis. In Information Security and Cryptology—ICISC 2000; Won, D., Ed.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2001; Volume 2015, pp. 22–36. [Google Scholar] [CrossRef]
  24. Phan, R.C.W. Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES). Inf. Process. Lett. 2004, 91, 33–38. [Google Scholar] [CrossRef]
  25. Liang, L.; Du, X. Multiple impossible differential cryptanalysis of reduced-round NBC. Cryptologia 2025, 49, 268–287. [Google Scholar] [CrossRef]
  26. Wang, H.; Zhang, J. Optimizing key recovery in impossible cryptanalysis and its automated tool. Des. Codes Cryptogr. 2026, 94, 45. [Google Scholar] [CrossRef]
  27. Tian, W.; Hu, B. Integral cryptanalysis on two block ciphers Pyjamask and uBlock. IET Inf. Secur. 2020, 14, 572–579. [Google Scholar] [CrossRef]
  28. Soto, J.; Bassham, L. Randomness Testing of the Advanced Encryption Standard Finalist Candidates; NIST Interagency/Internal Report NISTIR 6483; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2000. [CrossRef]
  29. Soto, J. Randomness Testing of the Advanced Encryption Standard Candidate Algorithms; US Department of Commerce, Technology Administration, National Institute of Standards and Technology: Gaithersburg, MD, USA, 1999.
  30. Cheng, X.; Liu, Y.; Zhao, J. A Face Image Encryption Scheme Based on Nonlinear Dynamics and RNA Cryptography. Cryptography 2025, 9, 57. [Google Scholar] [CrossRef]
  31. Alsaraireh, S.; Al-Khassaweneh, M.; Al-Tarawneh, M. New Step in Lightweight Medical Image Encryption and Authenticity. Mathematics 2025, 13, 1799. [Google Scholar] [CrossRef]
  32. Alghamdi, Y.; Alsubaie, F.; Alqahtani, A. Image Encryption Algorithms: A Survey of Design and Evaluation Metrics. J. Cybersecur. Priv. 2024, 4, 126–152. [Google Scholar] [CrossRef]
Figure 1. Block Cipher Designs Generator Model (BCDGM).
Figure 1. Block Cipher Designs Generator Model (BCDGM).
Symmetry 18 00853 g001
Figure 2. Quantum Random Number Generation Circuit. The symbols, colors, “+” operators, and numerical annotations follow standard quantum-circuit notation; therefore, no additional explanation is required.
Figure 2. Quantum Random Number Generation Circuit. The symbols, colors, “+” operators, and numerical annotations follow standard quantum-circuit notation; therefore, no additional explanation is required.
Symmetry 18 00853 g002
Figure 3. Key Generation Process.
Figure 3. Key Generation Process.
Symmetry 18 00853 g003
Figure 4. Randomized Primitive’s Assignment Protocol.
Figure 4. Randomized Primitive’s Assignment Protocol.
Symmetry 18 00853 g004
Figure 5. Avalanche Effect (Plaintext, Key) and (Plaintext, KeyFlipped) Pairs.
Figure 5. Avalanche Effect (Plaintext, Key) and (Plaintext, KeyFlipped) Pairs.
Symmetry 18 00853 g005
Figure 6. Avalanche Effect in (Plaintext, Key) and (Plaintext, KeyFlipped) Pairs.
Figure 6. Avalanche Effect in (Plaintext, Key) and (Plaintext, KeyFlipped) Pairs.
Symmetry 18 00853 g006
Figure 7. Avalanche Effect in (Plaintext, Key) and (PlaintextFlipped, Key) Pairs.
Figure 7. Avalanche Effect in (Plaintext, Key) and (PlaintextFlipped, Key) Pairs.
Symmetry 18 00853 g007
Figure 8. Avalanche Effect in (Plaintext, Key) and (PlaintextFlipped, Key) Pairs.
Figure 8. Avalanche Effect in (Plaintext, Key) and (PlaintextFlipped, Key) Pairs.
Symmetry 18 00853 g008
Figure 9. Correlation in (Plaintext, Key) and (Plaintext, KeyFlipped) Pairs.
Figure 9. Correlation in (Plaintext, Key) and (Plaintext, KeyFlipped) Pairs.
Symmetry 18 00853 g009
Figure 10. Correlation in (Plaintext, Key) and (Plaintext, Key Flipped) Pairs.
Figure 10. Correlation in (Plaintext, Key) and (Plaintext, Key Flipped) Pairs.
Symmetry 18 00853 g010
Figure 11. Correlation in (Plaintext, Key) and (Plaintext Flipped, Key) Pairs.
Figure 11. Correlation in (Plaintext, Key) and (Plaintext Flipped, Key) Pairs.
Symmetry 18 00853 g011
Figure 12. Correlation between (PlainText) and (CipherText).
Figure 12. Correlation between (PlainText) and (CipherText).
Symmetry 18 00853 g012
Figure 13. Correlation between (PlainText) and (CipherText).
Figure 13. Correlation between (PlainText) and (CipherText).
Symmetry 18 00853 g013
Figure 14. NIST Statistical Randomness Tests.
Figure 14. NIST Statistical Randomness Tests.
Symmetry 18 00853 g014
Figure 15. NIST Statistical Randomness Tests.
Figure 15. NIST Statistical Randomness Tests.
Symmetry 18 00853 g015
Figure 16. Original RGB channels and their corresponding encrypted outputs: (a) original red channel, (b) original green channel, (c) original blue channel, (d) encrypted red channel, (e) encrypted green channel, and (f) encrypted blue channel.
Figure 16. Original RGB channels and their corresponding encrypted outputs: (a) original red channel, (b) original green channel, (c) original blue channel, (d) encrypted red channel, (e) encrypted green channel, and (f) encrypted blue channel.
Symmetry 18 00853 g016
Figure 17. Key generation flowchart of the proposed cipher framework.
Figure 17. Key generation flowchart of the proposed cipher framework.
Symmetry 18 00853 g017
Table 1. Average TestU01 results for 100 cipher texts of the proposed cipher.
Table 1. Average TestU01 results for 100 cipher texts of the proposed cipher.
Test IDStatistical TestParametersTest Statisticp-ValueResult
T1Birthday Spacings n = 5 , 000 , 000 λ = 27.1051 0.61Pass
T2Collision (Multinomial) d = 65 , 536 μ = 2909.25 0.01Pass
T3Gap Test n = 200 , 000 χ 2 = 1021.19 0.98Pass
T4Simple Poker d = 64 χ 2 = 16.80 0.60Pass
T5Coupon Collector d = 16 χ 2 = 31.70 0.92Pass
T6Maximum-of-t n = 2 , 000 , 000 χ 2 9.9981 × 10 4 0.52Pass
T7Anderson–Darling A D = 0.31 0.69Pass
T8Weight Distribution n = 200 , 000 χ 2 = 42.23 0.42Pass
T9Matrix Rank n = 20 , 000 χ 2 = 1.11 0.77Pass
T10Hamming Independence n = 500 , 000 χ 2 = 2312.29 0.06Pass
T11Random Walk (H) n = 1 , 000 , 000 χ 2 = 55.30 0.35Pass
T12Random Walk (M) n = 1 , 000 , 000 χ 2 = 60.86 0.19Pass
T13Random Walk (J) n = 1 , 000 , 000 χ 2 = 68.14 0.70Pass
T14Random Walk (R) n = 1 , 000 , 000 χ 2 = 42.09 0.55Pass
T15Random Walk (C) n = 1 , 000 , 000 χ 2 = 12.20 0.99Pass
Table 2. NPCR and UACI Results of the Proposed Method.
Table 2. NPCR and UACI Results of the Proposed Method.
ImageChProposed NPCRProposed UACI
LenaR99.623133.9985
G99.692733.6145
B99.563733.6954
PepperR99.677133.6155
G99.616233.7641
B99.691233.6964
NatureR99.578533.3123
G99.613633.6673
B99.634533.1456
BirdR99.664133.7456
G99.645132.3213
B99.621632.1956
BaboonR99.615833.4345
G99.646633.7578
B99.654433.3642
GrapesR99.641133.2645
G99.645232.7224
B99.645233.8978
SparrowR99.694133.8456
G99.655533.4321
B99.613232.6978
ButterflyR99.621133.7789
G99.623232.0546
B99.645333.2756
Table 3. Scalability Analysis of the Proposed Cipher Framework.
Table 3. Scalability Analysis of the Proposed Cipher Framework.
Data SizeAverage Encryption Time (ms)Average Decryption Time (ms)Throughput (MB/s)
12 KB0.690.7117.6
100 KB6.416.5615.6
470 KB25.7426.1118.2
1 MB45.4146.2122.0
30 MB286.72290.42104.6
60 MB543.50549.11110.4
100 MB2188.002195.8245.7
250 MB5473.205485.2245.6
500 MB10,946.3710,971.4345.7
750 MB16,419.5316,457.6345.7
1000 MB21,892.7021,943.8445.7
Table 4. Key space estimation for varying rounds of the generated ciphers.
Table 4. Key space estimation for varying rounds of the generated ciphers.
Rounds (r)Per-Round Key (bits)Total Key Space
16256 2 4096
15256 2 3840
14256 2 3584
13256 2 3328
12256 2 3072
11256 2 2816
10256 2 2560
9256 2 2304
8256 2 2048
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Khan, M.F.; Saleem, K.; Alshehri, A.; Aljuhni, A.; Ghazalah, S.A.; Sabir, T. Block Cipher Generation Model: A Step Towards Generative Ciphers. Symmetry 2026, 18, 853. https://doi.org/10.3390/sym18050853

AMA Style

Khan MF, Saleem K, Alshehri A, Aljuhni A, Ghazalah SA, Sabir T. Block Cipher Generation Model: A Step Towards Generative Ciphers. Symmetry. 2026; 18(5):853. https://doi.org/10.3390/sym18050853

Chicago/Turabian Style

Khan, Muhammad Fahad, Khalid Saleem, Ali Alshehri, Abdullah Aljuhni, Sarah Abu Ghazalah, and Tehreem Sabir. 2026. "Block Cipher Generation Model: A Step Towards Generative Ciphers" Symmetry 18, no. 5: 853. https://doi.org/10.3390/sym18050853

APA Style

Khan, M. F., Saleem, K., Alshehri, A., Aljuhni, A., Ghazalah, S. A., & Sabir, T. (2026). Block Cipher Generation Model: A Step Towards Generative Ciphers. Symmetry, 18(5), 853. https://doi.org/10.3390/sym18050853

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop