You are currently viewing a new version of our website. To view the old version click .
Biomimetics
  • Article
  • Open Access

10 September 2025

Hybrid Cuckoo Search–Bees Algorithm with Memristive Chaotic Initialization for Cryptographically Strong S-Box Generation

Software Engineering Department, Engineering Faculty, Firat University, 23319 Elazig, Turkey
This article belongs to the Special Issue Biomimicry for Optimization, Control, and Automation: 3rd Edition

Abstract

One of the essential parts of contemporary cryptographic systems is s-boxes (Substitution Boxes), which give encryption algorithms more complexity and resilience due to their nonlinear structure. In this study, we propose CSBA (Cuckoo Search–Bees Algorithm), a hybrid evolutionary method that combines the strengths of Cuckoo Search and Bees algorithms, to generate s-box structures with strong cryptographic properties. The initial population is generated with a high-diversity four-dimensional Memristive Lu chaotic map, taking advantage of the random yet deterministic nature of chaotic systems. This proposed method was designed with inspiration from biological systems. It was developed based on the foraging strategies of bees and the reproductive strategies of cuckoos. This nature-inspired structure enables an efficient scanning of the solution space. The resultant s-boxes’ fitness was assessed using the nonlinearity value. These s-boxes were then optimized using the hybrid CSBA algorithm suggested in this paper as well as the Bees algorithm. The performance of the proposed approaches was measured using SAC, nonlinearity, BIC-SAC, BIC-NL, maximum difference distribution, and linear uniformity (LU) metrics. Compared to other studies in the literature that used metaheuristic algorithms to generate s-boxes, the proposed approach demonstrates good performance. In particular, the average value of 109.75 obtained for the nonlinearity metric demonstrates high success. Therefore, this study demonstrates that robust and reliable s-boxes can be generated for symmetric encryption algorithms using the developed metaheuristic algorithms.

1. Introduction

The technique of transforming legible plaintext into ciphertext—a form that is unintelligible or meaningless—is known as cryptography. The science of encryption, or cryptography, is essential to maintaining information security in the current digital era. Modern computer systems use data encryption algorithms with symmetric keys to ensure integrity, authentication, confidentiality, and other information security services [,,]. Both the sender and the recipient encrypt and decrypt data using the same secret key in symmetric algorithms. S-boxes are the only nonlinear key component in the symmetric encryption technique AES. They also make the connection between the ciphertext and the key as complicated as possible and obscure it, which makes them resistant to cyberattacks [].
Because s-boxes increase complexity due to their nonlinear structure, they are used in encryption algorithms to increase security. S-boxes are particularly used in symmetric encryption algorithms because they increase resistance to linear attacks by adding a nonlinear structure. This robust structure makes it difficult for attackers to figure out how the key and the ciphertext are related during the encryption process. Another reason is that s-boxes provide variety and complexity. They make encryption methods more unpredictable by adding a complex link between input and output. Furthermore, by offering defense against attacks like differential and linear cryptanalysis, s-boxes’ sturdy architecture raises the fundamental degree of security.
A reliable s-box design requires striking a compromise between mathematical features and practical efficiency. A well-designed s-box allows for big changes in the output from small changes in the input values. Chaotic systems and metaheuristic optimization algorithms have been used in recent years to develop s-box creation techniques []. S-boxes are dynamically produced using mathematical models in the Linear Trigonometric Transformation approach []. Latin squares and chaotic arrays are used to build high-security s-boxes in architectures based on Exact Latin Squares [].
Galois fields are used to build s-boxes with bijective features in Mobius Transformation and Permutation Functions []. In Oblique Function and Chaos Systems, structures with high nonlinearity are designed using chaotic maps and oblique functions []. Optimization methods like the Artificial Bee Colony Algorithm, Cuckoo Search Algorithm (CSA), and chaotic maps are merged in Discrete Chaotic Maps and Metaheuristic Methods [,]. Nonlinear s-boxes are developed with irreducible polynomials and multiple transformations in Affine Transformations []. Hash functions are used by FPGA circuitry to convert the physical randomness information from the R-S latch’s metastable state circuits into s-boxes []. Targeting linear components, the chaotic data that is produced by combining DNA-based coding approaches with the 2D hyper-chaotic Schaffer map is processed and transformed into s-boxes [].
The creation of s-boxes frequently uses evolutionary algorithms. Their ability to identify solutions near the global optimum despite the solution space’s width makes them a particularly useful tool in s-box design. These algorithms try to obtain optimal structures by using the cryptographic criteria of s-boxes as a fitness function. By avoiding local optima in the solution space, more complicated and safe s-boxes can be obtained since evolutionary methods are unpredictable and adaptable. Furthermore, the algorithms’ search skills are further enhanced and better results can be produced than with the traditional approaches suggested in the literature because of their hybrid versions. For evolutionary algorithms to effectively scan the solution space, the initial population’s diversity is crucial. Chaotic maps are commonly utilized in the initial population production to guarantee the initial population’s diversity and to provide a more balanced dispersion in the solution space []. Compared to other maps, Liu and his colleagues claimed that the Memristive chaotic map is more complex, has a larger attractor space, and a wider chaotic range [].
This study used the complementing advantages of the Bees Algorithm (BA) and the CSA to create a hybrid evolutionary technique. As an initial population, high-diversity s-boxes were created using the four-dimensional Memristive Lu chaotic map. The evolutionary algorithms used in this study are based on nature-based approaches inspired by biological systems. The BA was developed based on the behavior of honeybees in nature, exploring food sources and sharing their locations with other bees in their colonies. Similarly, the CSA was developed based on the cuckoos’ reproductive strategy of laying their own eggs in other birds’ nests. These algorithms, inspired by such biological systems, enable more efficient scanning of the solution space and prevent premature convergence. Furthermore, the use of chaotic maps in generating the initial population enhances the randomness and diversity in nature, enabling the generation of more balanced and diverse solutions. In this respect, this study presents an interdisciplinary approach that aligns with biomimetic design principles in cryptographic s-box generation.
To produce cryptographically robust s-boxes, hybrid CSBA was used to optimize these created s-boxes. The suggested approach is directed by a fitness function that targets linear components and is intended to provide security criteria like balanced distribution and high nonlinearity.
The main contributions of this study are as follows:
  • In this study, it is aimed to overcome the limitations encountered in the s-box design by combining the strengths of both chaotic systems and metaheuristic algorithms.
  • A new method, CSBA, formed by hybridizing the BA and the CSA, is proposed.
  • With this hybrid approach, it is aimed to both increase cryptographic security and optimize computational efficiency.
  • First, s-boxes were created using four-dimensional Memristive Chaotic Maps. These s-boxes were given as the initial population to the heuristic algorithms.
  • As a fitness function, nonlinearity values were calculated using the Walsh-Hadamard spectrum and these values were evaluated to optimize the performance of the algorithm.
The article’s progression is as follows. In the study’s Section 2, literature studies on the production of s-boxes are included. In Section 3, the Heuristic Algorithms used and the modifications made to them are mentioned. In Section 4, the results obtained in this study are given and interpreted. In Section 5, the study is concluded and future studies are mentioned.

3. Theoretical Background

3.1. Four-Dimensional Memristive Hyperchaotic Map

The Memristive Lu chaotic map is an extended version of the classical Lu system with Memristive effects, which outperforms traditional chaotic systems. The four-dimensional Memristive Lu model exhibits chaotic dynamics under certain parameters and is based on four state variables that are updated at each iteration []. The iterative form of the map is given in Equations (1) and (2).
x t + 1 = x t + a y t x t × t y t + 1 = y t + ( c x t x t z t + d y t ) × t z t + 1 = z t + ( x t y t b z t ) × t w t + 1 = w t + ( w t + x t z t ) × t
z m + 1 = m o d x t + 1 + y t + 1 + z t + 1 + w t + 1 , 1
Here, x t , y t , z t and w t are the time-dependent state variables of the system. In this study, the coefficients for the Memristive Lu chaotic map were set as a = 36, b = 3, c = 20, d = 0.5, as reported in []. t shows the step size and is taken as 0.01 in this study. The phase diagrams of the 4D Memristive Lu chaotic map are given in Figure 1.
Figure 1. (a) x-y, (b) x-z, (c) x-w, (d) y-w, (e) y-z and (f) z-w phase diagrams of the 4D Memristive Lu chaotic map.
The chaotic condition of the system is confirmed by the complicated and non-periodic trajectories seen in the initial and system parameters’ phase space. The complex, dense, and non-periodic trajectories observed in the phase diagrams in Figure 1 clearly reveal the 4D chaotic system’s dynamic evolution. This dynamic evolution demonstrates the system’s constant unpredictable and non-repetitive tendency toward multidimensional attractors and its significant sensitivity to initial conditions. This complex behavior of the system provides an ideal basis for the unpredictability and high randomness properties sought in cryptographic applications.
In the proposed method, the diversity of the initial population is critical for evolutionary algorithms to explore a large search space without premature convergence and to generate robust s-boxes. Therefore, in our study, the initial population was created with a four-dimensional memristive Lu map, which exhibits more complex dynamics, instead of classical/familiar one-dimensional chaotic maps (e.g., Logistic, Tent) to increase randomness and homogeneity. This system, thanks to its high dimensionality and memristive structure, produces richer dynamic patterns and has the potential to increase the diversity of the initial individuals. These features contribute to the proposed hybrid algorithm (CSBA) exploring the search space in a more balanced manner, and the resulting s-boxes provide competitive results in the nonlinearity, SAC, and BIC criteria.

3.2. Bees Algorithm

During the harvest season, bees send some of themselves as scouts to explore suitable flower areas in the surrounding area. In order to maximize the colony’s food collection efficiency, scouts use a unique dance to alert other bees to the location and productivity of a quality region when they return to the hive. The Bee Algorithm was inspired by these food search behaviors of honey bees [].
The number of regions to be chosen for neighborhood search ( m ), the number of scout bees ( n ), the number of areas deemed the best among these m regions ( e ), the number of bees to be sent to the remaining ( m e ) regions ( n s p ), the number of bees to be directed to the best e region ( n e p ), the initial size of each patch ( n g h ), and the stopping criterion are some of the fundamental parameters that must be set in order to use the algorithm. The process determines the fitness values of the sites that n scout bees visited after they were randomly assigned to the search space. A neighborhood search is conducted in the vicinity of the m regions with the highest fitness value. By sending more bees ( n e p ) to the optimal e region and fewer bees ( n s p ) to the other m e regions, the density of this search is changed. In this way, the algorithm continues to explore new regions and aims to reach a solution by conducting more detailed research in the most promising areas.
In the next step, only the bee that reaches the highest fitness value (the best bee) for each patch is transferred to the next generation. Although there is no such restriction in nature, this restriction is applied in order to narrow down the search space. If the searches made in a patch—even if the neighborhood size is changed—do not produce a better result, this region is considered to be a local optimum. In this case, the patch is abandoned and this process is called “abandoning areas that do not produce new information”. The population’s surviving bees are then assigned to find fresh potential solutions after being dispersed at random throughout the search space. The best individuals in the chosen patches and the scout bees that conduct random searches make up the new population at the conclusion of each iteration. Until the halting requirement is satisfied, this cycle keeps going. In the case of a constrained solution problem, the fitness is decreased below a predetermined threshold by applying a fixed penalty to the solutions that break the constraint []. In Figure 2 the flow chart of BA is shown.
Figure 2. The flow chart of BA.

3.3. CSA

Xin-SheYang and Suash Deb developed the CSA, a metaheuristic optimization technique, in 2009 after being influenced by the parasitic reproductive strategies of some cuckoo species. While host birds care for their own young, these species lay their eggs in the nests of other birds. Some species specifically evade discovery by mimicking the color and appearance of their eggs to those of their host species. This behavior of cuckoos is adapted to the solution search and selection process in the algorithm [].
The following three fundamental guidelines govern how the algorithm operates:
  • Every cuckoo lays an egg, meaning that every person creates a fresh answer in the search space, and this solution tries to replace a randomly selected existing solution (nest).
  • High-quality solutions (good eggs) are passed on to the next generation.
  • A portion of the solutions noticed by the host (at the rate of P a 0 , 1 ) are replaced by randomly generated new solutions.
Lévy flights are used to generate new solutions. Lévy flights are a search strategy defined by random steps with a heavy-tailed distribution. This strategy increases the capacity to explore large areas and prevents solutions from getting stuck in local minima. A new solution x i ( t + 1 ) is generated as in Equation (3).
x i ( t + 1 ) = x i ( t ) + α · L e v y ( λ )
Here, x i ( t ) is the solution of the ith cuckoo at time t , α > 0 is step size (usually taken as 1), and L e v y ( λ ) is a randomly selected step according to the Lévy distribution. The Lévy distribution is a heavy-tailed distribution and is expressed as in Equation (4).
L e v y ~ u = t λ ,   ( 1 < λ 3 )
This distribution allows the algorithm to perform both local and global searches in the solution space. While long steps allow for extensive searches, short steps allow for local examinations [].
At the end of each iteration, the best solutions are preserved, low-quality solutions are eliminated with probability P a and replaced with randomly generated new individuals (new nests). Thus, the population is constantly renewed and the chance of reaching better solutions increases. If the solution contains a constraint violation, the fitness value is reduced by penalizing as in Equation (5).
f p e n a l i z e = f x + p e n a l t y
This penalty function ensures that the algorithm works effectively in constrained problems []. The flow diagram of the CSA algorithm is shown in Figure 3.
Figure 3. The flow diagram of CSA.

4. Proposed Method (A Memristive-Initiated Hybrid Cuckoo Search and Bees Algorithm)

Because of their readily adjustable architecture, intelligent metaheuristic algorithms are widely applied in a variety of complicated real-world issues of diverse types []. In this study, hybrid CSBA, which is a hybrid version of Bees Algorithm and Cuckoo Search algorithms, is proposed to produce s-box structures with strong cryptographic properties. The convergence behavior of the hybrid algorithm, as is common in evolutionary algorithms, may vary depending on certain random number sequences due to the stochastic nature of the algorithm. This algorithm also does not provide analytically guaranteed results, and its performance is shaped depending on the randomness sources used and parameter interactions []. In this study, the irregular yet deterministic feature of chaotic systems was exploited to generate random numbers using chaotic maps. In this context, it was aimed to obtain a wider spread in the solution space by using a four-dimensional Memristive Chaotic Map in the creation of the initial population.

4.1. Initialization of the Population

The initial individuals of the population were generated using chaotic number sequences generated by the four-dimensional Memristive Chaotic Map given in Equations (1) and (2). These sequences were transformed into unique permutations in the range of 0–255 to obtain valid s-box structures. The equation for creating the initial population is given in Equation (6).
X i , j = r o u n d 255 · z m + 1
This method increases the algorithm’s global search capability by initially ensuring a balanced and diverse distribution of the population in the solution space. The pseudocode for the first step is shown in Table 1.
Table 1. The pseudocode of the initial step.
The U s e d V a l u e s list is used to ensure that the s-boxes consist of unique values in the range of 0–255. Here, the value z m + 1 generated by Equation (6) is checked to see if it is included in the U s e d V a l u e s list. If it is not, it is included in the s-box permutation and added to the U s e d V a l u e s list. If it is, the generation of a new chaotic value continues. This ensures that the generated s-box consists of unique numbers in the range of 0–255.

4.2. Hybrid Cuckoo and Bees Search Algorithm

In this study, a hybrid method, the CSBA algorithm, which combines the strengths of BA and CSA, is proposed. Each iteration of the algorithm has a two-stage structure. In the first stage, new solutions are produced using the Levy Flight step in CSA. With this step, it is possible to explore wider areas in the solution space with random but directed steps. In the second stage, a more detailed search is performed in the search area with the local search strategy of BA.

4.2.1. CSA Step

In this step, a new solution is created for each individual based on the Lévy flight. New individuals are calculated using Equation (3). The generated solution is compared with the existing individual and the search process is continued by selecting the better one.

4.2.2. BA Step

The most successful m individuals in the population are determined and a neighborhood search is performed around these individuals. A more intensive search is performed around the best e individual ( n e p individual) and a less frequent search is performed around the other m e individuals ( n s p individual). The best individual in each region is transferred to the next generation. This structure contributes to both detailed search and preservation of diversity in the solution space.

4.2.3. Abandonment of Local Optima

It is assumed that the areas where individuals cannot be improved as a result of the neighborhood search are local maxima in the solution space. Therefore, in order to avoid local maxima, these individuals are abandoned and new individuals are randomly added in their place. The purpose of this phase is to keep the algorithm from being trapped in the local optimum.
In heuristic algorithms, the balanced operation of the exploration and exploitation phases is crucial. In the proposed hybrid CSBA, balancing the exploration and exploitation phases relies on the interaction of the parameters used in the CSA and BA steps. First, the Levy flight step size ( α ) used in the CSA step enables exploration in different regions by making long jumps in the solution space. If a large α value is selected, the algorithm searches a broader range of the search space, while a small value searches an area closer to the current solution. In this study, an α value of 1.5 was selected to enable the exploration phase to be performed with the CSA step.
In the BA step, the m , e , n e p , and n s p parameters determine the local search intensity. In this study, m = 5, e = 2, n e p = 20, and n s p = 10 were selected. These values were chosen based on the parameters presented in a literature review of BA []. Increasing the n e p and n s p values increases exploitation in good regions while also contributing to the preservation of diversity.
In the initial iterations, the exploration phase was focused, followed by the exploitation phase, which then proceeded to search the neighborhood of the current solution. Additionally, the abandonment of local optima phase was added, generating random solutions, thus reducing the risk of getting stuck in a local optimum. This enabled the algorithm to perform a certain level of exploration even at a high-exploitation stage. With this proposed hybrid algorithm, an extensive exploration step is performed in the early stages to identify potential good regions. In subsequent stages, intensive exploitation of these regions is performed to find the best solution.
This two-component structure of the algorithm allows scanning large areas at the beginning and improving around quality solutions in the later stages. Furthermore, each iteration preserves the best answers, guaranteeing algorithm stability and speeding up the convergence process. Figure 4 displays the suggested model’s flow diagram.
Figure 4. The flow diagram of proposed model.

4.3. Fitness Function

In this paper, the fitness function was the nonlinearity value. The population’s nonlinearity values, or s-boxes, were used to measure each person’s fitness, and the s-box with the highest fitness value was offered as the answer. The calculation of the nonlinearity value is given in Equation (7).
N f = 2 n 1 1 2 n m a x w ϵ G F 2 n | W S f w |
Here, the Walsh spectrum value f x is calculated as in Equation (8).
W S f w = x ϵ G F ( 2 n ) ( 1 ) f ( x ) x · w
Here w   ϵ   G F ( 2 n ) . x · w represents the dot product of x and w and is calculated as in Equation (9).
x · w = x 1 w 1 + x 2 w 2 + + x n w n

5. Experimental Results

This study presents experimental findings for the s-boxes produced by BA and CSBA, evaluating their cryptographic performance using metrics such as nonlinearity, Strict Avalanche Criterion (SAC), Linear Approximation Probability (LP), Bit Independence Criterion (BIC), and Input/Output XOR Distribution. Both algorithms were executed with a population size of 30 over 100 iterations.
The convergence behavior of the CSBA and BA algorithms over 100 iterations in comparison to the preceding one is displayed in Figure 5. An examination of the convergence curves reveals that the improved CSBA algorithm reaches the optimal solution faster and exhibits stable convergence. This is due to the successful integration of the powerful global search capabilities of CSA and the local optimization capabilities of BA.
Figure 5. Convergence curve for CSBA and BA.
Despite the instability and fluctuations observed in the BA algorithm, particularly as the number of iterations increases, the CSBA algorithm progressed more smoothly toward the optimal solution. This enabled the hybrid approach to perform an extensive search in the early stages and then refine the solutions precisely. Therefore, the convergence curve in Figure 5 demonstrates that the proposed CSBA algorithm offers both a more efficient and effective optimization process.
An s-box generated using BA is presented in Table 2. Each input of the s-box is mapped to a unique (bijective) output in the range 0–255. This demonstrates the successful generation of a cryptographically valid and usable s-box. All 256 different output values in the s-box are used only once, demonstrating that the bijectivity property is satisfied.
Table 2. S-box generated by BA.
Table 3 displays the s-box that was produced by the suggested CSBA hybrid algorithm. Additionally, there are 256 distinct values in this table, all of which fall between 0 and 255. The created s-box satisfies the fundamental cryptographic requirements since the bijectivity property is fully satisfied for this s-box.
Table 3. S-box generated by CSBA.
A comparative analysis of the nonlinearity metrics of the s-boxes generated by CSBA and BA is provided in Table 4. In this table, N1–N8 columns represent the nonlinearity scores of eight independently generated s-boxes. Among the key indicators used to evaluate an s-box’s resistance to linear cryptanalysis, nonlinearity plays a central role. The table illustrates that both algorithms successfully produced s-boxes exhibiting strong nonlinearity characteristics.
Table 4. The proposed s-boxes’ nonlinearity scores.
The graphical distribution of the nonlinearity values of the s-boxes produced using CSBA and BA is displayed in Figure 6. This figure provides a comparison of the algorithms’ production performance in terms of cryptographic quality.
Figure 6. Nonlinearity score measurement for s-boxes produced by CSBA and BA.
The nonlinearity values of the s-boxes produced by the BA algorithm range from 108 to 110, with an average value of 109.25, as Table 4 and Figure 6 demonstrate. While these values are quite satisfactory, the relatively low values of some individual s-boxes, such as 108, indicate that BA can occasionally be trapped in local minima. The s-boxes generated with CSBA demonstrate more consistent and higher performance, with seven s-boxes at 110 and one at 108. The average value is 109.75, which is higher than BA. This demonstrates that CSBA produces more optimal solutions by more effectively balancing exploration and exploitation.
Table 5 and Table 6 present the SAC values for BA and CSBA, respectively. SAC is a crucial metric that assesses whether a change in one bit of the input affects roughly half of the output. The values in the tables ought to be near the optimal value of 0.5 for SAC.
Table 5. SAC of the BA s-box.
Table 6. SAC of the CSBA s-box.
Table 5 details the SAC measurements of the s-box generated with BA. The measurement results show that SAC values are very close to 0.5 in many bit positions. This demonstrates that the algorithm achieves a significant degree of diffusion. Although relatively lower values, such as 0.4375, are encountered in some bit positions, the overall trend is strong. Despite its simplicity, the BA algorithm produced cryptographically effective results and achieved a satisfactory SAC distribution.
The SAC performance data for the s-box generated with CSBA is shown in Table 6. An examination of the values reveals that SAC yields values close to 0.5 for a large number of bit positions. This demonstrates that the CSBA algorithm successfully achieves the capacity for small input changes to have widespread and powerful effects on the output. The overall distribution is stable, and the average performance is quite high. Because CSBA’s hybrid structure strengthens both the exploration phase and the exploitation phase, more effective results were obtained for the SAC metric.
An important statistic for evaluating the level of independence among an s-box’s output bits is BIC. The independence of output bits is essential for improving defense against linear and differential cryptanalysis assaults from the perspective of cryptographic security. Consequently, BIC nonlinearity analysis is frequently used as a crucial criterion to assess the resulting s-boxes’ cryptographic quality. Table 7 and Table 8 display the BIC nonlinearity values of the s-boxes that were produced using the CSBA and BA algorithms, respectively.
Table 7. BIC Nonlinearity of the BA s-box.
Table 8. BIC Nonlinearity of the CSBA s-box.
A review of Table 7 indicates that the BIC nonlinearity values obtained from the BA-generated s-box are spread in a relatively uniform manner, without significant deviations or irregularities. The values exhibit a distribution between 98 and 108.
The s-boxes generated using CSBA, which are shown in Table 8, yield values between 98 and 108 when the BIC nonlinearity results are examined. The distribution of these high values is steady.
BIC-SAC analysis jointly measures two fundamental cryptographic properties of s-boxes. BIC assesses the independence between output bits, while SAC measures the extent to which the output bits are impacted when an input bit is changed. By evaluating these two metrics together, the robustness of an s-box in terms of both propagation and independence can be understood. Table 9 and Table 10 present the BIC-SAC values for s-boxes obtained with the BA and CSBA algorithms, respectively. The results show that while both algorithms have the potential to produce secure s-boxes, CSBA provides statistically more consistent results, closer to ideal values.
Table 9. BIC-SAC values of the BA s-box.
Table 10. CSBA s-box BIC-SAC values.
Table 9 presents the BIC-SAC matrix associated with the s-box generated via the BA algorithm. The majority of the values lie between 0.48 and 0.52, a range commonly regarded as acceptable for cryptographic purposes. In summary, the observed BIC-SAC results indicate that the BA-based s-box achieves a satisfactory level of cryptographic robustness.
The BIC-SAC values obtained with the CSBA algorithm, shown in Table 10, exhibit a fairly balanced, high, and near-ideal distribution. The majority of the values fall between 0.50 and 0.52, demonstrating that the s-box is highly successful in terms of both bit-to-bit independence and the propagation effect of input-bit variation. Thanks to the hybrid structure of CSBA, the algorithm achieved high success in terms of BIC-SAC.
The Input/Output XOR distribution table is a key metric used to evaluate the resistance of an s-box to linear and differential cryptanalysis attacks. This table displays the s-box’s difference propagation behavior by showing the number of times the output differences generated in response to a given input difference are repeated. Low and balanced repeat values indicate that the s-box’s outputs are unpredictable in response to possible differences, thus providing stronger confusion (complexity) in the encryption process. Table 11 and Table 12 present the input/output XOR distributions of s-boxes generated by the BA and CSBA algorithms, respectively.
Table 11. Input/output XOR distribution table of BA.
Table 12. Input/output XOR distribution table of CSBA.
Table 11 shows the values of the XOR distribution of the s-box that was produced using the BA. Examining this table, it is observed that the repeating values are mostly 6 and 8, and less frequently 4 and 10. This distribution indicates that the differential characteristics of the s-box are largely balanced. This generally indicates a moderately balanced distribution.
Table 12 presents the XOR distribution results for the s-box produced using the CSBA method. As observed in the table, most values are concentrated around 6, 8, and 10, while lower frequencies—such as 4—appear only occasionally. The overall distribution presents a more balanced, stable, and nearly homogeneous structure compared to the BA algorithm. Examining the results confirms that the CSBA algorithm can produce s-boxes highly resistant to differential cryptanalysis. The absence of a significant gap between frequencies indicates that output differences occur with equal probability, strengthening the defense against statistical attacks.
The linear uniformity/probability of the proposed s-boxes are presented in Table 13. Linear probability is the maximum probability that an S-box can be predicted using a linear approximation, and in cryptography, s-boxes are desired to be as small as possible for their resistance to linear attacks. The produced s-boxes are extremely resistant to linear cryptanalysis attacks and offer a dependable framework for contemporary encryption algorithms, as demonstrated by the low linear probability values of 0.1328 found for both the BA and CSBA-based optimization methods in this study.
Table 13. Linear uniformity/probability of proposed s-boxes.
Table 14 presents a multidimensional comparison of the s-boxes generated by BA and CSBA, two different proposed chaotic-based optimization algorithms, with other heuristic optimization-based s-box designs in the literature. Six key metrics—the fundamental cryptographic security indicators of s-boxes—were compared, including SAC, nonlinearity, BIC-SAC, BIC-NL, maximum difference distribution (DDT Max), and LU. The Min, Max, and Avg values in the SAC column represent the minimum, maximum, and average SAC values between the output bits, respectively. Table 14 compares the results of s-boxes generated using only metaheuristic optimization methods. Mathematically based s-box designs are excluded due to methodological differences.
Table 14. Comparison of optimization techniques using s-boxes based on chaos.
A detailed examination of Table 14 reveals that the average SAC for BA is 0.5051 and for CSBA it is 0.5000. These values show that about half of the output is impacted by single-bit changes in the input. This demonstrates that the encryption system reacts strongly to even little changes in the input and has strong diffusion features. Compared to other methods in the literature, the s-boxes obtained in this study demonstrate strong diffusion capabilities. Regarding the nonlinearity value, we obtained very high average nonlinearity values of 109.25 for BA and 109.75 for CSBA. These values are among the highest in the list compared to other studies in the literature. This illustrates how the suggested s-boxes improve cryptographic security and offer strong defense against linear cryptanalysis attacks.
Both the s-box produced by CSBA and the s-box produced by BA had BIC-SAC values of 0.5032 and 0.5040, respectively. These values indicate that the input-based independence relationships between the output bits are strongly preserved, meaning there is no predictability or pattern formation between the bits. This feature is a critical factor for secure encryption systems. In terms of BIC-NL, BA has a value of 103.14, and CSBA has a value of 103.50. This indicates that the nonlinear relationship between the output bits is sufficient and that correlation formation between blocks is prevented.
The DDT Max value obtained for the s-boxes produced in this study is 10. This value is not ideal, but it is at the same or better level than many reference values. In this sense, it is highly resistant to differential attacks. Another metric, the LP value, was found to be 0.1328125, which is similar to other literature examples. This ratio indicates a sufficient level of security against linear attacks. Consequently, this gap can be filled using the nonlinearity values of the s-boxes found in this study.
This comprehensive table demonstrates that the proposed methods are competitive with their counterparts in the literature not only in terms of individual metrics but also in terms of multiple security requirements. The generated s-boxes generally exhibit high nonlinearity, good SAC and BIC performance, low DDT, and reasonable LP values, demonstrating a strong cryptographic structure. Aydın et al. stated in their study that all s-boxes in the literature should have a minimum limit of 103 or higher for cryptographic use. An examination of Table 14 demonstrates support for this structure. This study stands out for its consistency, stability, and ability to verify the reality in the literature and compete with it [].
Table 15 shows a comparison of the results obtained from BA and CSBA with those obtained from PSO, DE, and GA. To ensure a fair and reliable comparison, the population size for all algorithms was 30, the number of iterations was 100, and the nonlinearity value was used as the fitness value.
Table 15. Comparison of the proposed BA and CSBA with GA, PSO, and DE under identical test conditions.
A detailed examination of Table 15 reveals that the CSBA method achieves better results compared to the other algorithms. For a cryptographically strong s-box, the SAC value is expected to be close to 0.5. Examining this table reveals that the result closest to this value is obtained from CSBA. Comparing the nonlinearity values reveals that the highest value is obtained first from CSBA, followed by BA. The ideal value for the BIC-SAC value, which represents the strength of the independence between the output bits, is 0.5. An examination of the table reveals that the proposed algorithms provide good results compared to the other algorithms. For the DDT Max criterion, Table 15 reveals that the worst result is obtained from DE, while all other methods yield a value of 10. Similarly, for the LU value, all five methods yielded a value of 0.138125.

6. Conclusions

In this study, a new hybrid method combining the global search capability of CSA and the local optimization power of BA is proposed to generate s-box structures with strong cryptographic properties. The initial population is generated using a four-dimensional Memristive Lu chaotic map to increase diversity and ensure a more balanced distribution in the solution space. The proposed chaotic hybrid CSBA effectively balances global and local search strategies, aiming to overcome the limitations encountered in classical heuristic methods.
Experimental analyses revealed that the proposed method stands out with its high nonlinearity, ideal SAC values, and strong BIC performance. The resulting s-boxes also exhibit low differential uniformity and linear prediction probability, meeting the fundamental security criteria required for symmetric encryption algorithms. In particular, it was observed that the CSBA algorithm achieves a higher average nonlinearity value and exhibits a more stable convergence behavior compared to the standard BA algorithm. Comparisons with other studies in the literature confirm that the proposed method delivers competitive and reliable results.
The integration of chaotic maps with hybrid heuristic algorithms not only produces higher-quality s-boxes but also demonstrates the applicability of this approach to practical encryption applications. Future work could include adapting the algorithm to generate larger s-boxes, testing different Memristive chaotic systems, or integrating it into real-world applications such as image encryption and IoT data protection.

Funding

This research was supported by Fırat University Scientific Research Projects Coordination Unit (FUBAP) under project number MF.24.52. This publication is also based on work conducted within the scope of COST Action CA22137 “Randomised Optimisation Algorithms Research Network” (ROAR-NET), which is supported by the European Cooperation in Science and Technology (COST).

Data Availability Statement

No external data were used in this paper, and all the data generated are part of the paper.

Conflicts of Interest

The author declares no conflicts of interest.

References

  1. Menezes, A.J.; van Oorschot, P.C.; Vanstone, S.A.; van Oorschot, P.C.; Vanstone, S.A. Handbook of Applied Cryptography; CRC Press: Boca Raton, FL, USA, 2018. [Google Scholar]
  2. Kuznetsov, A.A.; Potii, O.V.; Poluyanenko, N.A.; Gorbenko, Y.I.; Kryvinska, N. Stream Ciphers in Modern Real-Time IT Systems: Analysis, Design and Comparative Studies. In Studies in Systems, Decision and Control; Springer International Publishing: New York, NY, USA, 2022. [Google Scholar]
  3. Kuznetsov, O.; Potii, O.; Perepelitsyn, A.; Ivanenko, D.; Poluyanenko, N. Lightweight Stream Ciphers for Green IT Engineering. In Green IT Engineering: Social, Business and Industrial Applications; Springer: New York, NY, USA, 2019; Volume 171, pp. 113–137. [Google Scholar]
  4. Kuznetsov, A.; Wieclaw, L.; Poluyanenko, N.; Hamera, L.; Kandiy, S.; Lohachova, Y. Optimization of a simulated annealing algorithm for s-boxes generating. Sensors 2022, 22, 6073. [Google Scholar] [CrossRef]
  5. Waheed, A.; Subhan, F.; Suud, M.M.; Alam, M.; Ahmad, S. An analytical review of current s-box design methodologies, performance evaluation criteria, and major challenges. Multimed. Tools Appl. 2023, 82, 29689–29712. [Google Scholar] [CrossRef]
  6. Zahid, A.H.; Ahmad, M.; Alkhayyat, A.; Hassan, M.T.; Manzoor, A.; Farhan, A.K. Efficient dynamic s-box generation using linear trigonometric transformation for security applications. IEEE Access 2021, 9, 98460–98475. [Google Scholar] [CrossRef]
  7. Hua, Z.; Li, J.; Chen, Y.; Yi, S. Design and application of an s-box using complete Latin square. Nonlinear Dyn. 2021, 104, 807–825. [Google Scholar] [CrossRef]
  8. Nizam Chew, L.C.; Ismail, E.S. s-box construction based on linear fractional transformation and permutation function. Symmetry 2020, 12, 826. [Google Scholar] [CrossRef]
  9. Jiang, Z.; Ding, Q. Construction of an s-box based on chaotic and bent functions. Symmetry 2021, 13, 671. [Google Scholar] [CrossRef]
  10. Alhadawi, H.S.; Majid, M.A.; Lambić, D.; Ahmad, M. A novel method of s-box design based on discrete chaotic maps and cuckoo search algorithm. Multimed. Tools Appl. 2021, 80, 7333–7350. [Google Scholar] [CrossRef]
  11. Long, M.; Wang, L. s-box design based on discrete chaotic map and improved artificial bee colony algorithm. IEEE Access 2021, 9, 86144–86154. [Google Scholar] [CrossRef]
  12. Dawood, O.A.; Khalaf, M.; Mohammed, F.M.; Almulla, H.K. Design a compact non-linear s-box with multiple-affine transformations. In International Conference on Applied Computing to Support Industry: Innovation and Technology; Springer International Publishing: Cham, Switzerland, 2019; pp. 439–452. [Google Scholar]
  13. Garipcan, A.M.; Aydın, Y.; Özkaynak, F. A novel s-box generation method based on metastable inducing over FPGA for block ciphers. Knowl.-Based Syst. 2025, 310, 112968. [Google Scholar] [CrossRef]
  14. Aydın, Y.; Garipcan, A.M.; Özkaynak, F. A novel post-processing approach for improving minimum nonlinearity in s-boxes: A case study based on 2D hyper chaotic Schaffer transformation map. Expert Syst. Appl. 2025, 289, 128067. [Google Scholar] [CrossRef]
  15. Akyol, S. New chaos-integrated improved grey wolf optimization based models for automatic detection of depression in online social media and networks. PeerJ Comput. Sci. 2023, 9, e1661. [Google Scholar] [CrossRef]
  16. Liu, X.; Sun, K.; Wang, H.; He, S. A class of novel discrete memristive chaotic map. Chaos Solitons Fractals 2023, 174, 113791. [Google Scholar] [CrossRef]
  17. Shadab, M.; Jawed, M.S.; Sajid, M. Substitution Box Construction Using Transfer-Function Assisted Metaheuristic and Booster Algorithm: A Hybrid Approach. Secur. Priv. 2025, 8, e462. [Google Scholar] [CrossRef]
  18. Baowidan, S.A.; Alamer, A.; Hassan, M.; Yousaf, A. Group-Action-Based s-box Generation Technique for Enhanced Block Cipher Security and Robust Image Encryption Scheme. Symmetry 2024, 16, 954. [Google Scholar] [CrossRef]
  19. Kuznetsov, O.; Poluyanenko, N.; Kuznetsova, K.; Frontoni, E.; Arnesano, M. Hybrid Population-Based Hill Climbing Algorithm for Generating Highly Nonlinear s-boxes. Computers 2024, 13, 320. [Google Scholar] [CrossRef]
  20. Kuznetsov, A.; Frontoni, E.; Romeo, L.; Poluyanenko, N.; Kandiy, S.; Kuznetsova, K.; Beňová, E. Optimizing hill climbing algorithm for s-boxes generation. Electronics 2023, 12, 2338. [Google Scholar] [CrossRef]
  21. Kuznetsov, A.; Karpinski, M.; Ziubina, R.; Kandiy, S.; Frontoni, E.; Peliukh, O.; Veselska, O.; Kozak, R. Generation of nonlinear substitutions by simulated annealing algorithm. Information 2023, 14, 259. [Google Scholar] [CrossRef]
  22. Namuq, J.A. S-Box Design Utilizing 3D Chaotic Maps for Cryptographic Application. Basrah J. Eng. Sci. 2024, 24, 68–73. [Google Scholar] [CrossRef]
  23. Yang, S.; Tong, X.; Wang, Z.; Zhang, M. s-box generation algorithm based on hyperchaotic system and its application in image encryption. Multimed. Tools Appl. 2023, 82, 25559–25583. [Google Scholar] [CrossRef]
  24. Jassim, S.A. Enhancing s-box Generation Using African Buffalo Optimization Algorithm Techniques. Int. J. Intell. Eng. Syst. 2025, 18, 702. [Google Scholar] [CrossRef]
  25. Wang, J.; Zhu, Y.; Zhou, C.; Qi, Z. Construction method and performance analysis of chaotic s-box based on a memorable simulated annealing algorithm. Symmetry 2020, 12, 2115. [Google Scholar] [CrossRef]
  26. Freyre-Echevarría, A.; Alanezi, A.; Martínez-Díaz, I.; Ahmad, M.; Abd El-Latif, A.A.; Kolivand, H.; Razaq, A. An external parameter independent novel cost function for evolving bijective substitution-boxes. Symmetry 2020, 12, 1896. [Google Scholar] [CrossRef]
  27. Ustun, D.; Sahinkaya, S.; Atli, N. Developing a secure image encryption technique using a novel s-box constructed through real-coded genetic algorithm’s crossover and mutation operators. Expert Syst. Appl. 2024, 256, 124904. [Google Scholar] [CrossRef]
  28. Ustun, D.; Sahinkaya, S. Design of secure S-Boxes via novel 2D-Zettle chaotic map and ABC algorithm for robust image encryption. Math. Comput. Simul. 2025, 235, 175–204. [Google Scholar] [CrossRef]
  29. Lawah, A.I.; Ibrahim, A.A.; Salih, S.Q.; Alhadawi, H.S.; JosephNg, P.S. Grey wolf optimizer and discrete chaotic map for substitution boxes design and optimization. IEEE Access 2023, 11, 42416–42430. [Google Scholar] [CrossRef]
  30. Zamli, K.Z.; Kader, A.; Din, F.; Alhadawi, H.S. Selective chaotic maps Tiki-Taka algorithm for the s-box generation and optimization. Neural Comput. Appl. 2021, 33, 16641–16658. [Google Scholar] [CrossRef]
  31. Hematpour, N.; Ahadpour, S. Execution examination of chaotic s-box dependent on improved PSO algorithm. Neural Comput. Appl. 2021, 33, 5111–5133. [Google Scholar] [CrossRef]
  32. Yang, W.; Yang, L.; Liu, J.; Li, R.; Wang, Y.; Chen, N.; Hu, Z. Analysis of a Novel Amplitude-Controlled Memristive Hyperchaotic Map and Its Utilization in Image Encryption. Sensors 2025, 25, 3388. [Google Scholar] [CrossRef]
  33. Boobalan, S.; Gurunathan Arthanari, S.K. Lorenz and Chua Chaotic Key-Based Dynamic Substitution Box for Efficient Image Encryption. Symmetry 2025, 17, 1296. [Google Scholar] [CrossRef]
  34. Qazi, A.S.; Zahid, A.H.; Baz, A.; Arslan, F.; Ali, M.; Ali, J. Innovative Transformation of S-Box Through Chaotic Map Using a Pragmatic Approach. IEEE Access 2024, 12, 42725–42736. [Google Scholar] [CrossRef]
  35. Deng, X.; Ding, S.; Lin, H.; Jiang, L.; Sun, H.; Jin, J. Privacy-Preserving Online Medical Image Exchange via Hyperchaotic Memristive Neural Networks and DNA Encoding. Neurocomputing 2025, 653, 131132. [Google Scholar] [CrossRef]
  36. Yao, W.; Liu, J.; Sun, Y.; Zhang, J.; Yu, F.; Cui, L.; Lin, H. Dynamics analysis and image encryption application of Hopfield neural network with a novel multistable and highly tunable memristor. Nonlinear Dyn. 2024, 112, 693–708. [Google Scholar] [CrossRef]
  37. Deng, Q.; Wang, C.; Sun, Y.; Deng, Z.; Yang, G. Memristive tabu learning neuron generated multi-wing attractor with FPGA implementation and application in encryption. IEEE Trans. Circuits Syst. I Regul. Pap. 2024, 72, 300–311. [Google Scholar] [CrossRef]
  38. Zhang, J.; Lv, J.; Cheng, N.; Wei, X.; Yang, L. Mismatch synchronization based on 4D memristive chaotic system and its application in image encryption. Eur. Phys. J. 2025, 98, 69. [Google Scholar] [CrossRef]
  39. Zhou, L.; Wang, C.; Zhou, L. Generating hyperchaotic multi-wing attractor in a 4D memristive circuit. Nonlinear Dyn. 2016, 85, 2653–2663. [Google Scholar] [CrossRef]
  40. Pham, D.T.; Ghanbarzadeh, A.; Koc, E.; Otri, S.; Rahim, S.; Zaidi, M. The Bees Algorithm; Technical Note; Manufacturing Engineering Centre, Cardiff University: Cardiff, UK, 2005; pp. 44–48. [Google Scholar]
  41. Yang, X.S.; Deb, S. Cuckoo search via Lévy flights. In Proceedings of the World Congress on Nature and Biologically Inspired Computing (NaBIC 2009), Coimbatore, India, 9–11 December 2009; IEEE: New York, NY, USA, 2009; pp. 210–214. [Google Scholar]
  42. Gandomi, A.H.; Yang, X.S.; Alavi, A.H. Cuckoo search algorithm: A metaheuristic approach to solve structural optimization problems. Eng. Comput. 2013, 29, 17–35. [Google Scholar] [CrossRef]
  43. Akyol, S.; Alatas, B. Plant intelligence based metaheuristic optimization algorithms. Artif. Intell. Rev. 2017, 47, 417–462. [Google Scholar] [CrossRef]
  44. Hussein, W.A.; Sahran, S.; Sheikh Abdullah, S.N.H. The variants of the Bees Algorithm (BA): A survey. Artif. Intell. Rev. 2017, 47, 67–121. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.