Camellia is an encryption algorithm implemented in many Internet of Things (IoT) devices. However, intruders attack the Camellia cipher using Substitution Box (S-Box) distinguishers. The distinguishers are tables that provide probabilities for guessing the secret keys of the algorithms. Distinguishers are used in the majority of attacks. The most wellknown distinguishers are Linear Approximation Table (LAT), Dierence-Distribution Table (DDT), and Dierential-Linear Connectivity Table (DLCT). This research focuses on preventing these attacks using a novel function called the Khumbelo function to distract the construction of S-Box distinguishers. The Khumbelo function distracted the distinguishers' constructions by reducing the probability of building the table. The Khumbelo function successfully decreased the attack probability of LAT (from 54.6875 percent to 0 percent), DDT (from 1.5625 percent to 0 percent), and DLCT (from 50.0000 percent to 0 percent). The Khumbelo function is generated using a 4-Byte output S-Box instead of the original 1-Byte output S-Box in Camellia. INDEX TERMS Camellia, Cryptographic Attacks, Internet of Things (IoT), IoT devices, K_Camellia, S-Box, The Khumbelo Function. I. INTRODUCTION T HE Internet of Things (IoT) is a modern critical system that connects devices, things, individuals, objects, digital machines, computers, and objects for the transmission of information [1]. IoT is emerging as an eective technique with devices in signicant elds to create unique networks [1] [2]. IoT customers use these networks depending on the task needed at that time, [3]. Companies use IoT devices and networks to exchange top secret and condential information, [4]. Some of this information is sent unencrypted or encrypted by algorithms that are vulnerable to attacks [4].Cryptographic algorithms are primarily used to ensure security and privacy [4]. One of the cryptographic algorithms used on IoT devices is Camellia. This study shows that dierent types of IoT devices use Camellia. Some S-Box-based cryptographic algorithms are compromised on IoT devices, including Camellia and Advanced Encryption Standard (AES). An S-Box, for example, could resist or allow attacks. Assume an S-Box with less than 32 output bits, such as in Camellia and AES, which have eight output bits [5]. In that case, intruders could easily construct dierent distinguishers to get the probability of guessing the encryption key. Camellia and AES share some similarities in that all S-Boxes in these two algorithms are built using similar transformations that take the multiplicative inverse over a nite eld, and they are all 8 x 8 in size [5]. Therefore, if an intruder could attack one S-Box, all S-Boxes would be vulnerable. According to the ndings of this study, these S-Boxes are vulnerable to various attacks. Cryptographic algorithms are unavoidable, but they must be designed in advance to withstand attacks [4].The existing studies show that intruders attack the Camellia algorithm with various attack methods. For instance:i. Camellia is vu...