A substitution box (S-box) is the only nonlinear component of a symmetric key encryption cipher that directly affects an encryption scheme's performance and security level. So it is appealing to produce S-boxes with good performance and efficiency. Customarily, in algebra, Galois fields are used to generate such structures. It requires the storage memory of size 8 × 2 8 bits. Similarly, in G F (2 9) this figure reaches to 9 × 2 9 bits. In this study, a novel construction of lookup tables over the algebraic structure of non-chain ring R = Z 8 [ u ] < u 3 > = Z 8 + u Z 8 + u 2 Z 8 , (u 3 = 0) of cardinality 512 is presented that holds 9 × 2 8 computer memory calls. Moreover, the use of non-chain ring operations in the building of lookup tables results in a more complex S-box. Afterward, we use this nonlinear layer to produce confusion in a novel image-enciphering scheme. A nonlinear encryption scheme such as a non-chain-ring S-box construction is susceptible to adversaries because of its complex connections between key ciphertexts and cryptographic primitives. With non-chain ring encryption, you can benefit from enhanced security, complexity of algorithm, resistance to modern attacks, as well as improved computing performance. Texture, algebraic, and statistical analyses were performed on the suggested S-box encryption technique. A comparison of the encryption data using the proposed S-box with the literature available S-boxes demonstrates that the suggested S-box is superior and can be employed in various ciphers. The results of the statistical, differential, and security analyses also reveal that our approach is more effective for image encryption. • A novel construction of lookup tables over the algebraic structure of non-chain ring R = Z 8 [ u ] < u 3 > = Z 8 + u Z 8 + u 2 Z 8 , (u 3 = 0) of cardinality 512 is presented that holds 9 × 2 8 bit computer memory. • The use of a non-chain ring operations in the building of lookup tables results in a more complex S-box. • We use this nonlinear layer to produce confusion in a novel image enciphering scheme. • Texture, algebraic, and statistical analyses were performed on the suggested S-box encryption technique. [ABSTRACT FROM AUTHOR]