Al-Kitab Journal for Pure Sciences

: In the era of data-driven applications and resource-constrained devices, the need for lightweight algorithms has become increasingly important. Lightweight algorithms refer to computational techniques that strike a balance between efficiency and resource utilization, making them well-suited for low-power devices, embedded systems, and scenarios with limited computational capabilities. For the new encryption method PRESENT


INTRODUCTION :
The Internet of Things (IoT) is a transformative force that connects interconnected physical objects, enabling seamless communication and data exchange [1]. Encryption is crucial for data security and privacy in IoT ecosystems [2], [3]. Lightweight block ciphers are popular for securing IoT devices and communications, as they are computationally efficient and require minimal hardware and memory resources [4], [5]. These ciphers strike a balance between security and efficiency, using techniques like substitution-permutation networks, bitwise operations, and compact key schedules [4], [6]. Cryptography and secure communication techniques ensure the confidentiality and integrity of sensitive information [8]. One such technique is substitution-permutation (SP) networks, which consist of two components: S-boxes and P-layers [7]. S-boxes introduce nonlinearity into the encryption process, making it more resistant to cryptanalysis techniques [9], [10]. P-layers, also known as permutation layers, enhance the diffusion of information throughout the encryption process, achieving higher security and resistance against attacks [11], [12]. The hybridization of lightweight systems and chaotic dynamics aims to leverage the strengths of both approaches [13], [14]. By combining lightweight algorithms with chaotic behavior, it becomes possible to achieve enhanced security, robustness, and efficiency in resourceconstrained environments [13], [15]. This integration allows for the development of novel encryption schemes, data-hiding techniques, and optimization algorithms that can withstand cryptographic attacks, adapt to changing environments, and operate effectively with limited resources [13], [15].
The 6D-chotic system [16].Combines chaos theory with substitution and permutation principles, employing S-boxes and P-layers in a unique way [17], [18]. This approach offers advantages in security, efficiency, and resistance to attacks, enhancing the robustness and effectiveness of encryption techniques and protecting sensitive data in various applications [13].

Research Methods: A. Chaotic System
Chaos, is sometimes known as the "butterfly effect [16].Is a phenomenon that results from the complex, aperiodic behavior of deterministic systems that exhibits remarkable sensitivity to minute changes in initial conditions [15].In the framework of Shannon's confusion and diffusion principles, this characteristic of chaos has been used in cryptography [13]. Chaotic events have demonstrated potential as a source of pseudo randomness in information security by utilizing their mixing property and great sensitivity to tiny fluctuations [2], [13], [17]. Due to their deterministic character, chaotic mapsnonlinear dynamical systems that display chaotic behavior-have proven to be especially helpful in the field of cryptography. Numerous cryptographic applications, such as picture encryption methods, and block and stream ciphers, have been made more secure by researchers using these chaotic system properties [2], [4]. Hyper chaotic behavior can be seen in the six-dimensional hyper chaotic system. It can be formulated mathematically as In

6 7 8 9 A B C D E F S(x) C 6 B 9 0 A D 3 E F 8 4 7 1 2
In PRESENT algorithm, the P-layer (Permutation layer) is a diffusion operation that operates on the output of the S-box substitution. It is a simple transposition layer that reorders the bits within a 64-bit block is shown in

Proposed Method:
The suggested encryption method uses a hybrid technique to safely encrypt a variety of data types, including photos, text, documents, and videos. The proposed scheme constructs 10 new S-boxes and 10 new P-layers to enhance the security of the encryption process. The input initial state parameters x, y, z, w, v, u, t R, a, b, c, d, e, f, g, h, i, j, k, and l, as given in  Input: SBox=[0xc,0x5,0x6,0xb,0x9,0x0,0xa,0xd,0x3,0xe,0xf,0x8,0x4,0x7,0x1,0x2],

Results and Calculations:
On a machine running 64-bit Windows 10 Home with an Intel Core i5-6300U processor clocked at 2.40 GHz to 2.50 GHz, 8 GB of RAM, and the Python programming language, the proposed solution was experimentally tested. the proposed solution was experimentally tested to generate 10 new S-box and inverse S-box in Figure 2,and to generate 10 new P-layer and inverse P-layer respectively as shown in Figure 3

Conclusion
The random generation of an S-box and a P-layer is a common technique used in cryptography to enhance the security of symmetric key algorithms. The main PRESENT S-box and P-layer have an anti-fixed point, which is resolved by the random generation of S-boxes and P-layers for PRESENT algorithms using a 6D chaotic system; the algorithm's resistance to differential and linear assault has been well established. we introduce additional unpredictability and confusion into the encryption process. This randomness makes it more difficult for an attacker to analyze and exploit patterns in the data. It enhances the resistance against various cryptographic attacks, such as differential cryptanalysis and linear cryptanalysis. It increases complexity and makes it more challenging for attackers to decrypt encrypted data.