Enhancing the Mypher Lightweight Cipher Using an LTT-Based Dynamic S-Box for Secure IoT Devices
Received: 16 December 2025 | Revised: 22 January 2026 | Accepted: 28 January 2026 | Online: 4 April 2026
Corresponding author: Farah Afianti
Abstract
The rapid expansion of Internet of Things (IoT) systems has significantly increased the demand for lightweight cryptographic mechanisms capable of ensuring robust data confidentiality under strict resource constraints, including limited memory, processing power, and energy consumption. Lightweight block ciphers are widely adopted in such environments; however, many existing designs still rely on static Substitution boxes (S-boxes), which introduce fixed substitution patterns that can be analyzed and exploited through linear cryptanalysis. Mypher is a lightweight block cipher designed for efficient operation on resource-constrained devices, yet its security is constrained by the use of a static 4x4 Substitution box (S-box). To address this limitation, this study proposes an enhancement to the Mypher algorithm by integrating a dynamic 4x4 S-box generated using the Linear Trigonometric Transformation (LTT) method. The proposed approach employs key-derived parameters and uses an optimized constant parameter X, selected through a nonlinearity-driven search, to generate highly nonlinear and bijective S-boxes. This optimized X value is consistently applied during both encryption and decryption to ensure correct and efficient implementation. A comprehensive security evaluation of the generated dynamic S-boxes is conducted using standard cryptographic criteria, including bijectivity, Strict Avalanche Criterion (SAC), Bit Independence Criterion (BIC), and nonlinearity analysis. The experimental results demonstrate significant improvements in cryptographic strength compared to the original Mypher and UL-AES S-boxes, indicating increased resistance to linear attacks. Furthermore, the proposed scheme is implemented and evaluated on an ESP32 microcontroller to assess its practical feasibility in real Internet of Things (IoT) environments. Performance measurements show that the integration of the LTT-based dynamic S-box introduces only a modest increase in computational cost, with encryption and decryption times increasing by approximately 7% and 6%, respectively. These results confirm that the proposed LTT-based dynamic S-box significantly enhances the security of Mypher while preserving its lightweight characteristics, making it a practical and effective cryptographic solution for securing data on resource-constrained IoT devices.
Keywords:
dynamic s-box, ESP32, IoT security, lightweight cryptography, linear trigonometric transformation, mypher block cipherDownloads
References
[[1] K. Elgazzar et al., "Revisiting the internet of things: New trends, opportunities and grand challenges," Frontiers in the Internet of Things, vol. 1, Nov. 2022. DOI: https://doi.org/10.3389/friot.2022.1073780
W. Stallings, Cryptography and Network Security: Principles and Practice. Boston Munich: Pearson, 2017.
V. A. Thakor, M. A. Razzaque, and M. R. A. Khandaker, "Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities," IEEE Access, vol. 9, pp. 28177–28193, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3052867
S. L. Rana, "A Survey Paper of Lightweight Block Ciphers Based on Their Different Design Architectures and Performance Metrics," International Journal of Computer Engineering and Information Technology, vol. 11, no., 6, pp. 119–129, June 2019.
J. Daemen and V. Rijmen, "The Block Cipher Rijndael," in Smart Card Research and Applications, 2000, pp. 277–284. DOI: https://doi.org/10.1007/10721064_26
A. Bogdanov et al., "PRESENT: An Ultra-Lightweight Block Cipher," in Cryptographic Hardware and Embedded Systems - CHES 2007, 2007, pp. 450–466. DOI: https://doi.org/10.1007/978-3-540-74735-2_31
S. Banik, S. K. Pandey, T. Peyrin, Y. Sasaki, S. M. Sim, and Y. Todo, "GIFT: A Small Present," in Cryptographic Hardware and Embedded Systems – CHES 2017, 2017, pp. 321–345. DOI: https://doi.org/10.1007/978-3-319-66787-4_16
Lo’ai, Tawalbeh, M. Alicea, and I. Alsmadi, "New and Efficient Lightweight Cryptography Algorithm for Mobile and Web Applications," Procedia Computer Science, vol. 203, pp. 111–118, Jan. 2022. DOI: https://doi.org/10.1016/j.procs.2022.07.016
J. Borghoff et al., "PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications," in Advances in Cryptology – ASIACRYPT 2012, 2012, pp. 208–225. DOI: https://doi.org/10.1007/978-3-642-34961-4_14
T. Suzaki, K. Minematsu, S. Morioka, and E. Kobayashi, "TWINE: A Lightweight Block Cipher for Multiple Platforms," in Selected Areas in Cryptography, 2013, pp. 339–354. DOI: https://doi.org/10.1007/978-3-642-35999-6_22
N. Zakaria, A. Ahmad, A. Halim, and F. Ridzuan, "SECURITY ANALYSIS BETWEEN STATIC AND DYNAMIC S-BOXES IN BLOCK CIPHERS," Journal of Information System and Technology Management, vol. 6, pp. 10–16, Mar. 2021. DOI: https://doi.org/10.35631/JISTM.620002
Amrita, C. P. Ekwueme, I. H. Adam, and A. Dwivedi, "Lightweight Cryptography for Internet of Things: A Review," EAI Endorsed Transactions on Internet of Things, vol. 10, Mar. 2024. DOI: https://doi.org/10.4108/eetiot.5565
Y. S. Vaz, J. C. B. Mattos, and R. I. Soares, "Improving an Ultra Lightweight AES for IoT Applications," in 2023 IEEE 9th World Forum on Internet of Things (WF-IoT), Oct. 2023, pp. 01–06. DOI: https://doi.org/10.1109/WF-IoT58464.2023.10539597
A. Al-Omari, "Lightweight Dynamic Crypto Algorithm for Next Internet Generation," Engineering, Technology & Applied Science Research, vol. 9, pp. 4203–4208, June 2019. DOI: https://doi.org/10.48084/etasr.2743
A. Maolood and Y. Ali, "Modifying Advanced Encryption Standard (AES) Algorithm," Journal of Al-Rafidain University College For Sciences, pp. 259–285, Oct. 2021. DOI: https://doi.org/10.55562/jrucs.v41i3.187
Y. C. A. and S. S. R. K., "Key-based dynamic S-Box approach for PRESENT lightweight block cipher.," KSII Transactions on Internet & Information Systems, vol. 17, no. 12, Dec. 2023, Art. no. 3398. DOI: https://doi.org/10.3837/tiis.2023.12.010
A. H. Zahid et al., "Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications," IEEE Access, vol. 9, pp. 98460–98475, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3095618
A. Zahid, M. Arshad, M. Ahmad, N. Soliman, and W. El-Shafai, "Dynamic S-Box Generation Using Novel Chaotic Map with Nonlinearity Tweaking," Computers, Materials and Continua, vol. 75, pp. 3011–3026, Mar. 2023. DOI: https://doi.org/10.32604/cmc.2023.037516
G. Murtaza, N. A. Azam, and U. Hayat, "Designing an Efficient and Highly Dynamic Substitution-Box Generator for Block Ciphers Based on Finite Elliptic Curves," Security and Communication Networks, vol. 2021, no. 1, 2021, Art. no. 3367521. DOI: https://doi.org/10.1155/2021/3367521
C. Adams and S. Tavares, "The structured design of cryptographically good s-boxes," Journal of Cryptology, vol. 3, no. 1, pp. 27–41, Jan. 1990. DOI: https://doi.org/10.1007/BF00203967
S. Ibrahim and A. M. Abbas, "A Novel Optimization Method for Constructing Cryptographically Strong Dynamic S-Boxes," IEEE Access, vol. 8, pp. 225004–225017, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.3045260
Downloads
How to Cite
License
Copyright (c) 2026 Eriek Cahyo Purwanto, Farah Afianti

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
