Next Article in Journal
Numerical Investigation of Thermal Radiation and Viscous Effects on Entropy Generation in Forced Convection Blood Flow over an Axisymmetric Stretching Sheet
Next Article in Special Issue
Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing
Previous Article in Journal
Beyond Hypothesis Testing
Previous Article in Special Issue
Identity Authentication over Noisy Channels
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Intelligent and Fast Chaotic Encryption Using Digital Logic Circuits for Ad-Hoc and Ubiquitous Computing

by
Ankur Khare
1,†,
Piyush Kumar Shukla
2,*,
Murtaza Abbas Rizvi
3,† and
Shalini Stalin
4,†
1
Regional Institute of Education (RIE), Shyamla Hills, Bhopal 462001, India
2
Department of Computer Science and Engineering, University Institute of Technology, RGPV, Bhopal 462033, India
3
National Institute of Technical Teachers’ and Research, Shyamla Hills, Bhopal 462001, India
4
AISECT University, Chiklod Road, Near Bangrasia Square, Dist. Raisen 464993, India
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Entropy 2016, 18(5), 201; https://doi.org/10.3390/e18050201
Submission received: 21 May 2015 / Revised: 26 October 2015 / Accepted: 27 October 2015 / Published: 23 May 2016

Abstract

:
Delays added by the encryption process represent an overhead for smart computing devices in ad-hoc and ubiquitous computing intelligent systems. Digital Logic Circuits are faster than other computing techniques, so these can be used for fast encryption to minimize processing delays. Chaotic Encryption is more attack-resilient than other encryption techniques. One of the most attractive properties of cryptography is known as an avalanche effect, in which two different keys produce distinct cipher text for the same information. Important properties of chaotic systems are sensitivity to initial conditions and nonlinearity, which makes two similar keys that generate different cipher text a source of confusion. In this paper a novel fast and secure Chaotic Map-based encryption technique using 2’s Compliment (CET-2C) has been proposed, which uses a logistic map which implies that a negligible difference in parameters of the map generates different cipher text. Cryptanalysis of the proposed algorithm shows the strength and security of algorithm and keys. Performance of the proposed algorithm has been analyzed in terms of running time, throughput and power consumption. It is to be shown in comparison graphs that the proposed algorithm gave better results compare to different algorithms like AES and some others.

1. Introduction

As a ubiquitous trend in the environment, chaos is a type of deterministic random process provided by nonlinear dynamical systems. The main characteristics of chaotic systems are sensitive to initial conditions, randomness, diffusion, confusion and ergodicity. Chaotic systems have become an important topic of research because of these properties and are widely used in cryptography [1,2]. The existing-related research about chaos-based cryptography includes symmetric encryptions; security protocols and algorithms, asymmetric encryption and hash functions [3,4,5].
In recent years, the one way hash functions based on chaotic logistic maps, including 1D & 2D piecewise linear/nonlinear logistical map, high dimensional chaotic map, chaotic neural networks, hyper chaos and chaos S-Box have been modified [6,7,8]. Chaos map-based different algorithms, techniques and methods are constructed using hash functions, so high dimensionality dynamic systems have become an important and interesting research area in several scientific fields in the areas of computer science and secure communications [9,10,11]. Chaotic functions are sensitive to initial conditions—any negligible difference in the initial value generates a completely different cipher text. This means the cryptosystem using chaos theory will be strong against brute force attacks [12,13,14,15]. These properties of chaos have high potential for several applications in cryptosystems provided long term predictions on chaotic systems [16,17].
A novel chaos-based cryptographic technique using digital logic circuits is proposed in this paper for fast and secure encryption and decryption of information for several real time applications [18,19]. A chaotic logistic map provides a high degree of randomness and ergodicity to resist the linear and differential attacks and also enhances the security by providing confusion and diffusion to the system [20,21,22,23,24].
These previous techniques have solved many problems of cryptography and enhanced security and performance, but these techniques have some major drawbacks. The existing algorithms and methods are not easily understandable for users because they employ many mathematical functions. Symmetric key cryptosystems use the same single key every time for encryption and decryption. If the key is known by an intruder then the message is easily deduced. In a symmetric key cryptosystem, if an intruder knows the chaos function and the initial value of the chaos function, then the intruder can easily deduce the message. The encryption speed of chaotic cryptography is much slower than traditional cryptography, so a symmetric key cryptography technique is proposed, which uses more than one key for encryption and decryption. These keys are the same for encryption and decryption at one time but different keys are used for distinct messages. Security has been enhanced by using multiple keys and the randomness of keys is also enhanced by using digital concepts like 2’s complement. Even if an intruder knows the keys used one time, then the keys are changed the next time for the same message. The speed of encryption has been also increased by using digital concepts like XORing gate rather than difficult mathematical functions.
The rest of the paper is organized into several sections. Related works and a literature survey are briefly described in Section 2. In Section 3 the proposed cryptosystem and algorithms are described. In Section 4, an example of the proposed crypto systemis explained. Then the security of keys is analyzed in Section 5 with the help of key parameters. In Section 6, the proposed technique is analyzed against all four cryptanalysis attacks. Its performance is evaluated in terms of encryption time, throughput and power consumption in Section 7. In Section 8, the performance of the algorithm is compared with some algorithms like AES and others, which are described in different papers. In Section 9, the paper is concluded.

2. Related Work

Industrial and communication systems largely use unpredictable and practical cryp to systems for highly secure and fast transmission of information with little memory capacity [10,18], so they can satisfy the requirements of industrial control and military used in WiFi and ZigBee networks [6,14]. These proposed methods are analyzed in the UACI, NPCR and NIST environment.
An electrocardiogram (ECG) encryption system for biometric recognition collects ECG signals from an encrypted person using a portable instrument [18]. Simulation results show that the secrecy and security are enhanced by using an efficient large key size and complex algorithms widely used in multimedia applications [25].
Some mathematical properties have also determined the security and performance of distinct algorithms and systems using dynamic, chaotic cryptography [11,26]. Periodic switching of cryptographic keys is a different concept to boost the security of cryptographic systems in which chaotic behavior is combined with the periodic switching of keys [8]. It is represented that the running time complexity of the chosen plaintext, and a cipher text attack can be reduced to yield a simple set of linear equations [27,28]. The performance of the algorithm is measured in terms of cost, time and speed. Several one-dimension chaotic maps have been used to generate independent and approximately uniform pseudo-dynamic sequences for faster and time efficient encryption on blocks of data. Simulation results analyzed the efficiency and resistance against difference and linear cryptanalysis attacks and showed the high performance of the algorithm [5,29]. Fast encryption provides reliability and high security slightly, but at the same time highly reduces the running time [21,30,31]. Table 1 summarizes all the author’s works on chaotic based encryption scheme on the basis of some characteristics.

3. Proposed Methodology/Scheme

A novel, fast and secure “Chaotic Map based Encryption Technique using 2’s Compliment (CET-2C)” has been proposed using one or more than one keys for the encryption and decryption process but at any time instant the encryption and decryption keys are similar. It means different messages are encrypted via different multiple keys to increase the security against known cryptanalysis attacks. Firstly, the number of keys has been generated with the help of chaos logistic function (logistic map) providing only the initial condition.
These keys have been prohibited from providing some proper condition, so all the characters of the information are encrypted and decrypted with these difference and multiple keys. Multiple keys have been used to increase the randomness as well as security, and it is not necessary that any repeated characters in the information be encrypted and decrypted with a similar key.
The complexity of keys has been increased by using some digital logic like 2’s compliment code so the randomness of keys is enhanced with better security. These complex random keys have provided fast, feasible and efficient encryption in secure communication so the intruder is not sure about the generation of keys.
The necessary notations which are used for the key generation, encryption and decryption scheme are the following: P i = Plain text; Ci = Cipher text; E ( P i ) = Encryption of the plain text P i ; D ( C i ) = Decryption of the cipher text C i .
For n = 1 to j:
X n + 1 = { A × X n ( X n 1 ) }   M O D   256
A = any integer (1, 2, 3, ...); X n = initial value of chaotic function which is 2, 3, 4,……, j = Number of keys; X n + 1 = keys K 1 , K 2 , K 3 , .............. K j (after applying gray code on X n + 1 ).

3.1. Scheme for Key Generation

(1) Initially the pseudo random numbers are generated by using the chaotic map function at both ends (sender and receiver).
For n = 1 to j:
X n + 1 = { A × X n ( X n 1 ) }   M O D   256
(2) The multiple different keys are generated by applying 2’s compliment on different values of X n + 1 and the number of keys is fixed by providing some suitable condition j.
(3) Complexity and security of keys are enhanced by applying 2’s compliment code on Xn+1 so keys are random and independent with each other.
(4) These keys are converted into 8-bit binary form.

3.2. Scheme for Encryption Process

Each character is represented in ASCII character format which are converted into 8-bit binary numbers with respect to their decimal numbers. These characters are encrypted by using a digital logic bitwise XNOR gate function. This XNOR operation is performed on each character by a single binary coded key. Keys are also repeated for encrypting and decrypting the whole information.
P 1 = ASCII (Character 1); P 1 is represented in 8-bit binary numbers:
E k 1 ( P 1 ) = C 1
P 2 = ASCII (Character 2); P 2 is represented in 8-bit binary numbers:
E k 2 ( P 2 ) = C 2
…,
P i = ASCII (Character i); P i is represented in 8-bit binary numbers:
E k m ( P i ) = C i
where m = 1 to j.

3.3. Scheme for Decryption Process

The cipher texts have been decrypted (converted into plain text) by using the reverse process of the encryption technique:
P 1 = D k 1 ( C 1 )
P 1 is represented into ASCII ( P 1 ) with respect to its decimal value. Character 1 = ASCII ( P 1 ):
P 2 = D k 2 ( C 2 )
P 2 is represented into ASCII ( P 2 ) with respect to its decimal value. Character 2 = ASCII ( P 2 ):
…,
P i = D k m ( C i )
where m = 1 to j; P i is represented in ASCII ( P i ) with respect to its decimal value; Character i = ASCII ( P i )

3.4. Key Generation Algorithm

(1) Select the values of parameter (M, A, X n ).
(2) Generate the pseudo random numbers from the logistic map equation.
For n = 1 to j:
X n + 1 = { A × X n ( X n 1 ) }   M O D   256
(3) Apply 2’s compliment code on these pseudo random numbers which are generated from X n + 1 to generate the keys K 1 , K 2 , K 3 , .............. K j .
(4) Keys are converted into 8-bit binary form.

3.5. Encryption Algorithm

(1) Each character is converted into an ASCII character, P i = ASCII (Character i).
ASCII character P i is represented into 8-bit binary form.
E k m ( P i ) = C i for all i > 0, and m = 1 to j, using this equation for encrypting the message. Where E k m ( P i ) is bit wise XNOR perform on plaintext P i with a single key K m .

3.6. Decryption Algorithm

(1)  P i = D k m ( C i ) for all i > 0 and m = 1 to j, using this equation for decrypting the cipher text. where D k m ( C i ) is bit wise XNOR perform on cipher text C i with a single key K m .
(2) Plain text P i is represented into ASCII ( P i ) with respect to its decimal value.
(3) So Character i = ASCII ( P i ).

4. Example

Given plain text–PIYUSHS
LetterASCIIBinary Number
P8001010000
I7301001001
Y8901011001
U8501010101
S8301010011
H7201001000
S8301010011

4.1. Key Generation

X n + 1 = { A × X n ( X n 1 ) }   M O D   256
Let A = 6, X n = 4, Number of Keys j = 5
For j = 1
  • X n + 1 = {6 × 4 × (4 − 1)} MOD 256
  • X n + 1 = 72
For j = 2
  • X n + 1 = {6 × 72 × (72 − 1)} MOD 256
  • X n + 1 = 208
For j = 3
  • X n + 1 = {6 × 208 × (208 − 1)} MOD 256
  • X n + 1 = 32
For j = 4
  • X n + 1 = {6 × 32 × (32 − 1)} MOD 256
  • X n + 1 = 64
For j = 5
  • X n + 1 = {6 × 64 × (64 − 1)} MOD 256
  • X n + 1 = 128
  • X n + 1 = 72, 208, 32, 64, 128.
The keys are established by applying 2’s compliment code on pseudo random numbers X n + 1 . 1’s compliment is generated by converting 0 to 1 and 1 to 0 then 2’s compliment is generated by adding 1 in 1’s compliment of numbers:
   X n + 1 = 72 = 01001000
1’s compliment 10110111
          + 1
2’s compliment 10111000 = 184
72 = 010010002’s compliment=10111000=184
208 = 110100002’s compliment=00110000=48
32 = 001000002’s compliment=11100000=224
64 = 010000002’s compliment=11000000=192
128 = 100000002’s compliment=10000000=128
Keys (K1 = 184, K2 = 48, K3 = 224, K4 = 192, K5 = 128).

4.2. Encryption Algorithm

Encryption scheme converts the plain text into unreadable cipher text by using different multiple keys (Table 2).
Given Text: -PIYUSHS
P
ASCII–80
01010000
Key ( K 1 ) = 184 (10111000)
Cipher Text–
PlaintextXNORKey
PXNOR184
80XNOR184
01010000XNOR10111000
0XNOR1=0
1XNOR0=0
0XNOR1=0
1XNOR1=1
0XNOR1=0
0XNOR0=1
0XNOR0=1
0XNOR0=1
Cipher Text–00010111 = 23 = ↨

4.3. Decryption Algorithm

Decryption scheme converts the unreadable cipher text into readable plain text by using the similar keys (Table 3).
Cipher text–↨ÅFj,☼£
ASCII–23
00010111
Key ( K 1 ) = 184 (10111000)
Plain Text:
Cipher TextXNORKey
XNOR184
23XNOR184
00010111XNOR10111000
0XNOR1=0
0XNOR0=1
0XNOR1=0
1XNOR1=1
0XNOR1=0
1XNOR0=0
1XNOR0=0
1XNOR0=0
Plain Text–01010000 = 80 = P

5. Analysis of Key Security

To find and compute all the values (J, A, X n ) is difficult. In this section the sensitivity of the secret key has been represented with negligible difference in the key parameters:
X n + 1 = { A × X n ( X n 1 ) }   M O D   256
Plain text–PIYUSHS; Parameter (J, A, X n ); Keys ( K 1 , K 2 , K 3 , .............. K j ).

5.1. Sensitivity of Number of Keys J

It has been described that if a number of keys are changed, then the cipher texts are also fully changed from one another for the same plain text. In Table 4 negligible dissimilarity in the j (number of keys) generates different cipher text.

5.2. Sensitivity of Constant A

It has been described that negligible changes in constant A produce fully different keys so cipher texts are also different from each other. In Table 5 it has been shown that little difference in the values of constant A produced different cipher text.

5.3. Sensitivity of Initial Condition Xn

It has been described that little changes in the initial condition Xn produces fully different keys, so cipher texts are completely different. This is known as confusion. In Table 6 it has been shown that little difference in values of initial variable X n produced fully different cipher text.

6. Cryptanalysis

Cryptanalysis is a method which is used to verify the security of an algorithm by breaking the codes of the algorithm and getting the possible encryption keys and plain text as well.

6.1. Cipher Text Only Attacks

Parameter (j = 5, A = 6, X n = 4)
Keys (184,48,224,192,128)
Given: C 1 = E k 1 ( P 1 ) , C 2 = E k 2 ( P 2 ) , ................ , C i = E k m ( P i ) where m = 1 to j.
Deduce: -Either P 1 , P 2 , P 3 , ..................... P i ;
K 1 , K 2 , K 3 , K 4 , K 5 ;
Or an algorithm to deduce P i + 1
From C i + 1 = E k m ( P i + 1 )
Keys (184,48,224,192,128)
Example:
P 1 = Q then C 1 = E k 1 ( P 1 ) = E 184 (Q) = ▬
P 2 = QQ then C 2 = E k 1 , 2 ( P 2 ) = E 184 , 48 (QQ) = ▬₧
P 3 = QQQ then C 3 = E k 1 , 2 , 3 ( P 3 ) = E 184 , 48 , 224 (QQQ) = ▬₧N
P 4 = QQQQ then C 4 = E k 1 , 2 , 3 , 4 ( P 4 ) = E 184 , 48 , 224 , 192 (QQQQ) = ▬₧Nn
P 5 = QQQQQ then C 5 = E k 1 , 2 , 3 , 4 , 5 ( P 5 ) = E 184 , 48 , 224 , 192 , 128 (QQQQQ) = ▬₧Nn.
P 6 = QQQQQQ then C 6 = E k 1 , 2 , 3 , 4 , 5 , 1 ( P 6 ) = E 184 , 48 , 224 , 192 , 128 , 184 (QQQQQQ) = ▬₧Nn.▬
From the above example, it is to be said that if any character is repeated many times in the text, the cipher text is completely different for same letter Q. The Cipher text of Character Q finding as the first letter is dissimilar from Q finding as nth character in plaintext.

6.2. Known Plain Text Attack

Parameter (j = 5, A = 6, X n = 4)
Keys (184,48,224,192,128)
Given: P 1 , C 1 = E k 1 ( P 1 ) , P 2 , C 2 = E k 2 ( P 2 ) , .............. P i , C i = E k m ( P i ) where m = 1 to j
Deduce: -Either K 1 , K 2 , K 3 , K 4 , K 5 ;
Or an algorithm to deduce P i + 1
From C i + 1 = E k m ( P i + 1 )
Keys (184,48,224,192,128)
Example:
P 1 = R then C 1 = E k 1 ( P 1 ) = E 184 (R) = §
P 2 = RR then C 2 = E k 1 , 2 ( P 2 ) = E 184 , 48 (RR)= §¥
P 3 = RRR then C 3 = E k 1 , 2 , 3 ( P 3 ) = E 184 , 48 , 224 (RRR) = §¥M
P 4 = RRRR then C 4 = E k 1 , 2 , 3 , 4 ( P 4 ) = E 184 , 48 , 224 , 192 (RRRR) = §¥Mm
P 5 = RRRRR then C 5 = E k 1 , 2 , 3 , 4 , 5 ( P 5 ) = E 184 , 48 , 224 , 192 , 128 (RRRRR) = §¥Mm-
P 6 = RRRRRR then C 6 = E k 1 , 2 , 3 , 4 , 5 , 1 ( P 6 ) = E 184 , 48 , 224 , 192 , 128 , 184 (RRRRRR) = §¥Mm-§
From the example, it can be said that there are several plain texts with their corresponding cipher text. It is hard to compute the key or the algorithm which is used for encryption of plain texts for decrypting them. Keys are generated by very restricted and sensitive parameters. The cipher text of the Character R found as the first letter is different as that of the letter R found as the nth character in the plaintext.

6.3. Chosen Plaintext Attacks

Parameter (j = 5, A = 6, X n = 4)
Keys (184,48,224,192,128)
Given: P 1 , C 1 = E k 1 ( P 1 ) , P 2 , C 2 = E k 2 ( P 2 ) , .............. P i , C i = E k m ( P i ) Where the cryptanalysis gets to decide P 1 , P 2 , P 3 , ..................... P i and m = 1 to j.
Deduce: -Either P 1 , P 2 , P 3 , ..................... P i ;
Or an algorithm to deduce P i + 1
From C i + 1 = E k m ( P i + 1 )
Keys (184,48,224,192,128)
Example:
  • P 1 = DE then cipher text C 1 = E k 1 , 2 ( P 1 ) = E 184 , 48 (DE) = ♥è
  • P 2 = ED then cipher text C 2 = E k 1 , 2 ( P 2 ) = E 184 , 48 (ED) = ☻ï
It is not easy to find out the key or the algorithm to decrypt the cipher text which is to be encrypted with the same keys.

6.4. Chosen Cipher Text Attack

Parameter (j = 5, A = 6, X n = 4)
Keys (184,48,224,192,128)
Given: C 1 , P 1 = D k 1 ( C 1 ) , C 2 , P 2 = D k 2 ( C 2 ) , .......... , C i , P i = D k m ( C i ) where m = 1 to j
Deduce: - K 1 , K 2 , K 3 , K 4 , K 5 ;
Example:
  • C 1 = ♥è then plaintext P 1 = D k 1 , 2 ( C 1 ) = D 184 , 48 (♥è) = DE
  • C 2 = ☻ï then plain text P 2 = D k 1 , 2 ( C 2 ) = D 184 , 48 (☻ï) = ED
Keys are produced by two different parameters X n and A which are very sensitive and independent, so it is not easy to deduce the keys by knowing the cipher text and its decrypted plaintext.

7. Performance Analysis

In this paper, pertinent metrics are recognized. Performance of the proposed chaotic algorithm(CET-2C) is measured, and finally compared with the existing one secret key, AES, encryption algorithm and also compared with different algorithms using same data size published in Springer [12], Hindawi [17] and EEA [3] publications. It is to be shown that CET-2C is not affected by the data set, and only depends upon the data size.

Metrics and Performance

In this paper, five significant metrics is described to estimate the performance of the proposed algorithm (CET-2C). The metrics include: encryption/decryption time, CPU time, cipher size, power consumption, and encryption throughput. Then the experiment is performed, and performance results are measured using a laptop having a Intel (R) Core (TM) i3-3110M processor CPU @ 2.40GHz, and a RAM of 2GB. The results are also calculated using a laptop having an Intel Pentium Dual-Core CPU @ 2.60 GHz processor and 2 GB RAM and a laptop having an Intel (R) Pentium (R) Dual CPU T2370 @ 1.73 GHz processor and 1 GB RAM for comparison with other algorithms.

Encryption Time

The encryption time is based on the running time complexity of the algorithm, length of the key, and the plaintext size to be encrypted with various encryption algorithms. Hence, in this paper, a number of encryption times for different plaintext sizes and key length are selected and analyzed by using CPU clock time [3]. A variety of data sizes ranging from 0 MB to 80 MB are encrypted and their corresponding encryption times are collected. It is shown by a graph that the encryption time increases with increasing the data size. The encryption time and data size are linearly increased in Figure 1.

Encryption Throughput, Xe

It is defined as the number of bytes of plaintext encrypted (cipher text completed) during an observation period (encryption time) [3]. Mathematically:
X e = Number of Completions in Bytes Encryption Time ( s )
In the proposed algorithm, Throughput linearity is enhanced as the data size is increased in Figure 2.

Power Consumption

Power is needed for running fast CPUs and memory based on the usability of devices and algorithms. The energy cost of the encryption process is defined as the product of the total number of clock cycles required by the encryption process and average current drawn by each CPU clock cycle in the ampere cycle. The total energy cost is calculated in ampere seconds by dividing the ampere cycles by the clock frequency in cycles/second of a processor [3]. Then results are multiplied with the processor’s operating voltage to obtain the energy cost in joule. The CET-2C consumed the amount of energy for encryption or decryption is given by:
E = V c c × I × T    J
where V c c = Processor’s operating voltage; T = Encryption time; I = Average current per CPU cycle.
In this paper, the experiments were performed and results were collected using a laptop equipped with an Intel (R) Core (TM) i3-3110M processor CPU. The approximate average current consumed is 100 mA and the CPU voltage is V c c = 1.25 V (both obtained from the Intel Manual).
The variations of energy consumption with different data sizes are shown in the graph which is represented that the energy consumed during an encrypting process is directly proportional to the encryption time in Figure 3.

CPU Time

The CPU process time is defined as the time when the CPU is busy in the calculation of a particular process. When the load of CPU is increased then CPU time is also enhanced linearly [3]. In this paper, the CPU time is given by:
CPU busytime , T C P U = CPU utilization Observation period
where CPU utilization = Obtained from the task manager; Observation period = Encryption Time in Figure 4.

Cipher Size

Shannon’s Characteristics of “Good” Ciphers states that the size of the encrypted text should be no larger than the plaintext of the original message. In this work, the size of plaintext and cipher text are shown to be the same, thus satisfying Shannon’s size Characteristics of “Good” Ciphers rule.

8. Comparison with AES and Chaotic Algorithms [3]

The performance of the proposed algorithm (CET-2C) is compared with a popular secret key encryption algorithm, AES, and with Chaotic Algorithms [3,12] using the data size same as provided in [3,12,17]. The plaintexts used in the proposed algorithm, are encrypted using AES, and a Chaotic Algorithm [3,12] and their performance is evaluated and analyzed using the same metrics as above.

8.1. Encryption Time

Encryption times for the same set of several data sizes (200 KB to 450 KB) are collected using a laptop equipped with an Intel (R) Pentium (R) Dual CPU T2370 @ 1.73 GHz processor, and 1 GB RAM and used to analyze the performance of the CET-2C, and the results put into graphic form and tabular form (Table 7).
Figure 5 shows the proposed algorithm CET-2C is much faster compared to AES [3] and the Chaotic Algorithm for multiple message sizes from 200 KB to 450 KB [3]. CET-2C is also applied for large data sizes with lower encryption time. The results illustrate that the encryption time increases linearly when it is compared with other algorithms.
Overall % Gain of CET-2C over Chaotic Algorithm [3] for Encryption Time with increasing the message size:
G p o f  CET-2C over  C A = E T C E T 2 C ( at Different Message Sizes ) E T C A ( at Different MessageSizes ) E T C A ( at Different Message Sizes )
Here G p = Overall % Gain at Different Message Sizes; ET = Encryption Time; CA = Chaotic Algorithm; CET-2C = Chaotic Map based Encryption Technique using 2’s Compliment.
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 200 KB
% Gain of CET-2C  = E T C E T 2 C E T C A E T C A × 100 = | 0.0698 1.65 1.65 | × 100 =   95.77
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 250 KB
%  Gain of CET-2C  = E T C E T 2 C E T C A E T C A × 100 = | 0.076 2.05 2.05 | × 100 = 96 . 29
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 300 KB
%  Gain of CET-2C  = E T C E T 2 C E T C A E T C A × 100 = | 0.082 2.48 2.48 | × 100 = 96 . 69
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 350 KB
%  Gain of CET-2C  = E T C E T 2 C E T C A E T C A × 100 = | 0.0891 2.83 2.83 | × 100 = 96 . 85
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 400 KB
%  Gain of CET-2C  = E T C E T 2 C E T C A E T C A × 100 = | 0.0976 3.35 3.35 | × 100 = 97 . 09
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 450 KB
%  Gain of CET-2C  = E T C E T 2 C E T C A E T C A × 100 = | 0.1054 3.75 3.75 | × 100 = 97 . 19
Overall % Gain of CET-2C over AES [3] for Encryption Time with increasing the message size
G p of CET-2C over AES = E T C E T 2 C ( at Different Message Sizes ) E T A E S ( at Different Message Sizes ) E T A E S ( at Different Message Sizes )
where, AES = Advance Encryption Standard.
% Gain of CET-2C over AES [3] when message size is 200 KB
%  Gain of CET-2C  = E T C E T 2 C E T A E S E T A E S × 100 = | 0.0698 1 1 | × 100 = 93.02
% Gain of CET-2C over AES [3] when message size is 250 KB
%  Gain of CET-2C  = E T C E T 2 C E T A E S E T A E S × 100 = | 0.076 1 1 | × 100 = 92.4
% Gain of CET-2C over AES [3] when message size is 300 KB
%  Gain of CET-2C  = E T C E T 2 C E T A E S E T A E S × 100 = | 0.082 1 1 | × 100 = 91.8
% Gain of CET-2C over AES [3] when message size is 350 KB
%  Gain of CET-2C  = E T C E T 2 C E T A E S E T A E S × 100 = | 0.0891 1 1 | × 100 = 91.09
% Gain of CET-2C over AES [3] when message size is 400 KB
%  Gain of CET-2C  = E T C E T 2 C E T A E S E T A E S × 100 = | 0.0976 1 1 | × 100 = 90.24
% Gain of CET-2C over AES [3] when message size is 450 KB
%  Gain of CET-2C  = E T C E T 2 C E T A E S E T A E S × 100 = | 0.1054 1 1 | × 100 = 89.46
Table 8 illustrates that overall gain % of CET-2C for encryption time is higher as compared with the Chaotic Algorithm [3] and AES [3]. For the 350 KB message size the overall % gain of CET-2C is 96.85% and 91.09% when it is compared with the Chaotic Algorithm [3] and AES [3]. It shows that the performance of CET-2C is increased with multiple message sizes. The encryption time is also calculated for large data sizes in MB (10 MB to 80 MB) using a laptop with an Intel (R) Pentium (R) Dual CPU T2370 processor of @ 1.73 GHz, and 1 GB RAM (Table 9).
Figure 6 shows that the time required for encryption in the proposed CET-2C algorithm is lower compared to the algorithm [12] for different message sizes in MB. For 80 MB message the encryption time of CET-2C is 12 sand for the comparison algorithm [12] it is 13.8 s. This shows that CET-2C is much faster than the comparable algorithm [12].
Overall % Gain of CET-2C over Compared Algorithm [12] for Encryption Time with increasing message size.
G p o f CET-2C over CA = E T C E T 2 C ( at Different Message Sizes ) E T C A ( at Different Message Sizes ) E T C A ( at Different Message Sizes )
Here G p = Overall % Gain at Different Message Sizes; ET = Encryption Time; CA = Compared Algorithm; CET-2C = Chaotic Map based Encryption Technique using 2’s Compliment
% Gain of CET-2C over Compared Algorithm [12] when message size is 10 MB
%  Gain of CET-2C  = E T C E T 2 C E T C A E T C A × 100 = | 1250 1500 1500 | × 100 = 16.67
% Gain of CET-2C over Compared Algorithm [12] when message size is 20 MB
%  Gain of CET-2C  = E T C E T 2 C E T C A E T C A × 100 = | 2400 3500 3500 | × 100 = 31.43
% Gain of CET-2C over Compared Algorithm [12] when message size is 30 MB
%  Gain of CET-2C  = E T C E T 2 C E T C A E T C A × 100 = | 4876 5300 5300 | × 100 = 8.00
% Gain of CET-2C over Compared Algorithm [12] when message size is 40 MB
%  Gain of CET-2C  = E T C E T 2 C E T C A E T C A × 100 = | 6050 6800 6800 | × 100 = 11.03
% Gain of CET-2C over Compared Algorithm [12] when message size is 50 MB
%  Gain of CET-2C  = E T C E T 2 C E T C A E T C A × 100 = | 8000 8500 8500 | × 100 = 5.88
% Gain of CET-2C over Compared Algorithm [12] when message size is 60 MB
%  Gain of CET-2C  = E T C E T 2 C E T C A E T C A × 100 = | 9700 10300 10300 | × 100 = 5.83
% Gain of CET-2C over Compared Algorithm [12] when message size is 70 MB
%  Gain of CET-2C  = E T C E T 2 C E T C A E T C A × 100 = | 10800 12100 12100 | × 100 = 10.74
% Gain of CET-2C over Compared Algorithm [12] when message size is 80 MB
%  Gain of CET-2C  = E T C E T 2 C E T C A E T C A × 100 = | 12000 13800 13800 | × 100 = 13.04
Table 10 illustrates that the overall encryption time gain % of CET-2C is higher as compared with the compared algorithm [12]. At the message size 20 MB the overall % gain of CET-2C is 31.43% when compared with the compared algorithm [12]. This shows that the performance of CET-2C is increased with multiple message sizes.
The data sizes was also taken in bytes and experiments performed to calculate the encryption time using a laptop with an Intel (R) Core (TM) i3-3110M processor @ 2.40GHzCPU, and a RAM of 2GB (Table 11).
Figure 7 shows that for small dataset sizes (100 KB and 500 KB) the comparison algorithms [17] performed the encryption with slightly higher speed, but for large data sizes (larger than 500 KB) the encryption time is instantly increased. The graph of our proposed algorithm CET-2C increased linearly for small to large data sizes.
Overall % Gain of CET-2C over compared Algorithm 1 [17] for encryption time with increasing the message size:
G p of CET-2C over CA1 = E T C E T 2 C ( at Different Message Sizes ) E T C A 1 ( at Different Message Sizes ) E T C A 1 ( at Different Message Sizes )
Here G p = Overall % Gain at Different Message Sizes; ET = Encryption Time; CA1 = Compared Algorithm 1; CET-2C = Chaotic Map based Encryption Technique using 2’s Compliment.
% Gain of CET-2C over Compared Algorithm 1 [17] when message size is 100,000 Bytes
%  Gain of CET-2C  = E T C E T 2 C E T C A 1 E T C A 1 × 100 = | 54 1 54 | × 100 = 98.15
% Gain of CET-2C over compared Algorithm 1 [17] when message size is 500,000 Bytes
%  Gain of CET-2C  = E T C E T 2 C E T C A 1 E T C A 1 × 100 = | 75 4 75 | × 100 = 94.67
% Gain of CET-2C over compared Algorithm 1 [17] when message size is 600,000 Bytes
%  Gain of CET-2C  = E T C E T 2 C E T C A 1 E T C A 1 × 100 = | 82 204 204 | × 100 = 59.08
% Gain of CET-2C over compared Algorithm 1 [17] when message size is 700,000 Bytes
%  Gain of CET-2C  = E T C E T 2 C E T C A 1 E T C A 1 × 100 = | 97 410 410 | × 100 = 76.34
% Gain of CET-2C over Compared Algorithm 1 [17] when message size is 800,000 Bytes
%  Gain of CET-2C  = E T C E T 2 C E T C A 1 E T C A 1 × 100 = | 120 640 640 | × 100 = 81.25
Overall % Gain of CET-2C over Compared Algorithm 2 [17] for Encryption Time with increasing the message size
G p o f CET-2C over CA2 = E T C E T 2 C ( at Different Message Sizes ) E T C A 2 ( at Different Message Sizes ) E T C A 2 ( at Different Message Sizes )
Here G p = Overall % Gain at Different Message Sizes; ET = Encryption Time; CA2 = Compared Algorithm 2; CET-2C = Chaotic Map based Encryption Technique using 2’s Compliment.
% Gain of CET-2C over compared Algorithm 1 [17] when message size is 100,000 Bytes
%  Gain of CET-2C  = E T C E T 2 C E T C A 2 E T C A 2 × 100 = | 54 3 54 | × 100 = 94.44
% Gain of CET-2C over compared Algorithm 1 [17] when message size is 500,000 Bytes
%  Gain of CET-2C  = E T C E T 2 C E T C A 2 E T C A 2 × 100 = | 75 5 75 | × 100 = 93.33
% Gain of CET-2C over compared Algorithm 1 [17] when message size is 600,000 Bytes
%  Gain of CET-2C  = E T C E T 2 C E T C A 2 E T C A 2 × 100 = | 82 620 620 | × 100 = 86.77
% Gain of CET-2C over compared Algorithm 1 [17] when message size is 700,000 Bytes
%  Gain of CET-2C  = E T C E T 2 C E T C A 2 E T C A 2 × 100 = | 97 1230 1230 | × 100 = 92.11
% Gain of CET-2C over compared Algorithm1 [17] when message size is 800,000 Bytes
%  Gain of CET-2C  = E T C E T 2 C E T C A 2 E T C A 2 × 100 = | 120 1930 1930 | × 100 = 93.78
Table 12 illustrates that the overall gain % of CET-2C for encryption time is negative as compared with the compared Algorithms 1 and 2 [17] for small data sizes (up to 500 KB), meaning that CET-2C takes a longer time for encryption. After 500 KB the encryption time is lower than for comparable Algorithms 1 and 2 [17] so the overall performance of CET-2C is enhanced for larger data sizes. At the message size of 700 KB the overall % gain of CET-2C is 76.34% and 92.11% when it is compared with compared Algorithm 1 and 2, respectively [17].This shows that the performance of CET-2C is increased with increased message size.

8.2. Encryption Throughput

The graph representing the throughput performance of the proposed algorithm CET-2C is much higher for any data size compared to the AES and Chaotic Algorithm [3]. It was analyzed using a laptop having an Intel (R) Pentium (R) Dual T2370 @ 1.73 GHz processor CPU, and 1 GB RAM (Table 13).
Figure 8 shows that the throughput of the proposed algorithm CET-2C is much higher compared to the chaotic algorithm [3] and AES [3] for different message sizes in bytes. For a 50,000 byte message the throughput of CET-2C is 64,049 bytes/s and the Chaotic Algorithm [3] and AES [3] have throughputs of 16,400 and 2000 bytes/s, respectively. This shows that CET-2C is much faster than the comparable algorithm [3].
Overall % Gain of CET-2C over Chaotic Algorithm [3] for Encryption Throughput with increasing the message size
G p of CET-2C over CA = E T h C E T 2 C ( at Different Message Sizes ) E T h C A ( at Different Message Sizes ) E T h C A ( at Different Message Sizes )
Here G p = Overall % Gain at Different Message Sizes; ETh = Encryption Throughput; CA = Chaotic Algorithm.
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 10,000 bytes
%  Gain of CET-2C  = E T h C E T 2 C E T h C A E T h C A × 100 = | 50000 20000 20000 | × 100 = 150
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 20,000 bytes
%  Gain of CET-2C  = E T h C E T 2 C E T h C A E T h C A × 100 = | 44847 17000 17000 | × 100 = 164
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 30,000 bytes
%  Gain of CET-2C  = E T h C E T 2 C E T h C A E T h C A × 100 = | 49342 16700 16700 | × 100 = 195
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 40,000 bytes
%  Gain of CET-2C  = E T h C E T 2 C E T h C A E T h C A × 100 = | 57405 16500 16500 | × 100 = 248
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 50,000 bytes
%  Gain of CET-2C  = E T h C E T 2 C E T h C A E T h C A × 100 = | 64049 16400 16400 | × 100 = 490
Overall % Gain of CET-2C over AES [3] for Encryption Throughput with increasing the message size
G p of CET-2C over CA = E T h C E T 2 C ( at Different Message Sizes ) E T h A E S ( at Different Message Sizes ) E T h A E S ( at Different Message Sizes )
where AES = Advance Encryption Standard.
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 10,000 bytes
%  Gain of CET-2C  = E T h C E T 2 C E T h A E S E T h A E S × 100 = | 50000 2000 2000 | × 100 = 2400
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 20,000 bytes
%  Gain of CET-2C  = E T h C E T 2 C E T h A E S E T h A E S × 100 = | 44847 2000 2000 | × 100 = 2142
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 30,000 bytes
%  Gain of CET-2C  = E T h C E T 2 C E T h A E S E T h A E S × 100 = | 49342 2000 2000 | × 100 = 2367
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 40,000 bytes
%  Gain of CET-2C  = E T h C E T 2 C E T h A E S E T h A E S × 100 = | 57405 2000 2000 | × 100 = 2770
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 50,000 bytes
%  Gain of CET-2C  = E T h C E T 2 C E T h A E S E T h A E S × 100 = | 64049 2000 2000 | × 100 = 3102
Table 14 illustrates that overall gain % of CET-2C for encryption throughput is much higher as compared with the chaotic algorithm [3] and AES [3]. For the message size of 30,000 bytes the overall % gain of CET-2C is 195% and 2367% when it is compared with the Chaotic Algorithm [3] and AES [3]. This shows that the performance of CET-2C is increased with increasing message size. AES provides sconstant encryption time, so the throughput of AES is also constant. This indicates that CET-2Cprovidesmuchhigher encryption throughput than AES [3].

8.3. Encryption Power Consumption

The graph demonstrates that the proposed algorithm has lesser power consumption than AES and the Chaotic Algorithm [3] for any data size. This was analyzed using a laptop having an Intel (R) Pentium (R) Dual processor T2370 @ 1.73 GHzCPU, and 1 GB RAM (Table 15).
Figure 9 shows the proposed algorithm CET-2C has less power consumption compared to AES [3] and the chaotic algorithm for multiple message sizes ranging from 200 KB to 450 KB [3]. The results illustrate that the energy consumptionincreases linearly like the encryption time when it is compared with other algorithms.
Overall % Gain of CET-2C over Chaotic Algorithm [3] for Energy Consumption with increasing the message size.
G p of CET-2C over CA = E C C E T 2 C ( at Different Message Sizes ) E C C A ( at Different Message Sizes ) E C C A ( at Different Message Sizes )
Here G p = Overall % Gain at Different Message Sizes; EC = Energy Consumption; CA = Chaotic Algorithm.
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 200 KB
%  Gain of CET-2C  = E C C E T 2 C E C A E S E C A E S × 100 = | 0.008725 0.20625 0.20625 | × 100 = 95.77
% Gain of CET-2 Cover Chaotic Algorithm [3] when message size is 250 KB
%  Gain of CET-2C  = E C C E T 2 C E C A E S E C A E S × 100 = | 0.0095 0.25625 0.25625 | × 100 = 96.29
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 300 KB
%  Gain of CET-2C  = E C C E T 2 C E C A E S E C A E S × 100 = | 0.01025 0.31 0.31 | × 100 = 96.69
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 350 KB
%  Gain of CET-2C  = E C C E T 2 C E C A E S E C A E S × 100 = | 0.011138 0.35375 0.35375 | × 100 = 96.85
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 400 KB
%  Gain of CET-2C  = E C C E T 2 C E C A E S E C A E S × 100 = | 0.0122 0.41875 0.41875 | × 100 = 97.09
% Gain of CET-2C over Chaotic Algorithm [3] when message size is 450 KB
%  Gain of CET-2C  = E C C E T 2 C E C A E S E C A E S × 100 = | 0.013175 0.46875 0.46875 | × 100 = 97.19
Overall % Gain of CET-2C over AES [3] for Encryption Time with increasing the message size
G p of CET-2C over AES = E C C E T 2 C ( at Different Message Sizes ) E C A E S ( at Different Message Sizes ) E C A E S ( at Different Message Sizes )
where AES = Advance Encryption Standard.
% Gain of CET-2C over AES [3] when message size is 200 KB
%  Gain of CET-2C  = E C C E T 2 C E C A E S E C A E S × 100 = | 0.008725 0.125 0.125 | × 100 = 93.02
% Gain of CET-2C over AES [3] when message size is 250 KB
%  Gain of CET-2C  = E C C E T 2 C E C A E S E C A E S × 100 = | 0.0095 0.125 0.125 | × 100 = 92.4
% Gain of CET-2C over AES [3] when message size is 300 KB
%  Gain of CET-2C  = E C C E T 2 C E C A E S E C A E S × 100 = | 0.01025 0.125 0.125 | × 100 = 91.8
% Gain of CET-2C over AES [3] when message size is 350 KB
%  Gain of CET-2C  = E C C E T 2 C E C A E S E C A E S × 100 = | 0.011138 0.125 0.125 | × 100 = 91.09
% Gain of CET-2C over AES [3] when message size is 400 KB
%  Gain of CET-2C  = E C C E T 2 C E C A E S E C A E S × 100 = | 0.0122 0.125 0.125 | × 100 = 90.24
% Gain of CET-2C over AES [3] when message size is 450 KB
%  Gain of CET-2C  = E C C E T 2 C E C A E S E C A E S × 100 = | 0.013175 0.125 0.125 | × 100 = 89.46
Table 16 illustrates that the overall gain % of CET-2C of energy consumption is lower as compared with the chaotic algorithm [3] and AES [3]. At the message size of 450 Kb the overall % gain of CET-2C is 97.19% and 89.46% when it is compared with the chaotic algorithm [3] and AES [3]. This shows that the performance of CET-2C is increased with increasing message size.

9. Conclusions

Chaotic functions have been widely used in different applications to generate pseudo-random numbers to produce random values in short times, which may be used for various real time applications. In this paper a novel digital logic-based, chaotic encryption technique has been developed, which works based on chaos theory, using the sensitivity of parameters like a constant A and initial condition Xn with the properties of chaotic systems for ubiquitous and ad-hoc computing. The efficiency of the encryption technique also depends on the number of keys, which are generated by the use of the chaotic function. It has been also shown that keys are completely different when the parameters are changed slightly. This demonstrates the security of the keys. Cryptanalysis of the proposed algorithm shows the strength and security of the algorithm and keys. The performance of a proposed algorithm has been analyzed in terms of running time, throughput and power consumption. It is to be shown in comparison graphs that the proposed algorithm gave better results compared to different algorithms like AES and some others. The graphs show that the CET-2C gives 97% better encryption time, 95% better throughput and 98% better power consumption as compared to the other algorithms. This could be used for providing a better trade-off between security and computational complexity. In the future chaos theory could be used in highly secure and fast encryption systems, capable of processing very large dataset sizes on the order of GB with low space complexity. Digital circuits are very useful for fast encryption, as they are easily understandable and maintainable for processing messages compared to mathematical models. The private networks have security concerns and they need several techniques for hiding and encoding the messages moving between their private systems. This could be achieved by using chaos-based cryptography in the future.

Author Contributions

Ankur Khare and Piyush Kumar Shukla studied the chaotic map based encryption techniques which are used both stream cipher and block cipher. They generate an encryption algorithm using chaos function and digital circuits with the help of other information for fast and secure encryption using multiple keys and compare the performance of encryption technique with some standard research papers on the basis of encryption time, energy consumption and CPU time etc and show the performance result on the tabular and graphical format. Murtaza Abbas Rizvi is studied the digital circuit systems and help us to make an encryption algorithm using digital logic concept like XOR and XNOR gates for secure and fast encryption and decryption. He helps us to improve the security of keys which are used for encryption and decryption by using 2’s compliment concept. Shalini Stalin helps us to check the robustness and security of algorithm against all four cryptanalysis attacks like cipher text only, known plain text, chosen cipher text, chosen plain text attacks. So we show that the algorithm is highly attack resilient.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zaher, A.A. Digital Communication using a Novel Combination of Chaotic Shift Keying and Duffing Oscillators. Int. J. Innov. Comput. Inf. Control 2013, 9, 1865–1879. [Google Scholar]
  2. Ozkaynak, F.; Yavuz, S. Designing chaotic S-boxes on time-delay chaotic system. Nonlinear Dyn. 2013, 74, 551–557. [Google Scholar] [CrossRef]
  3. Fitwi, A.H.; Nouh, S. Performance Analysis of Chaotic Encryption using a Shared Image as a Key. Zede J. 2011, 28, 17–29. [Google Scholar]
  4. Mousa, A.; Nigm, E.; El-Rabaie, S.; Faragallah, O. Query Processing Performance on Encrypted Databases by Using the REA Algorithm. Int. J. Netw. Secur. 2012, 14, 280–288. [Google Scholar]
  5. Yuan, W.X.; Qing, Y. A block encryption algorithm based on dynamic sequences of multiple chaotic systems. Commun. Nonlinear Sci. Numer. Simul. 2009, 14, 574–581. [Google Scholar]
  6. Bakhache, B.; Ahmad, K.; El Assad, S. A New Chaotic Encryption Algorithm to Enhance the Security of ZigBee and Wi-Fi networks. Int. J. Intell. Comput. Res. 2011, 2, 219–227. [Google Scholar]
  7. Mansour, I.; Chalhoub, G.; Barkhache, B. Evaluation of a fast symmetric cryptographic algorithm based on the chaos theory for wireless sensor networks. In Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, 25–27 June 2012; pp. 913–919.
  8. Assad, S.E. Chaos Based Information Hiding and Security. In Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, London, UK, 10–12 December 2012; pp. 67–72.
  9. Agrawal, B.; Agrawal, H. Implementation of AES and RSA using Chaos System. Int. J. Sci. Eng. Res. 2013, 4, 1413–1417. [Google Scholar]
  10. Pan, J.; Ding, Q.; Qi, N. The Research of Chaos-Based SMS Encryption in Mobile Phone. In Proceedings of the Second International Conference on Instrumentation & Measurement, Computer, Communication and Control, Harbin, China, 8–10 December 2012; pp. 501–504.
  11. Beltran, R.H. Low-complexity chaotic encryption system. Rev. Mex. Fis. 2007, 53, 58–65. [Google Scholar]
  12. Akhvan, A.; Samsudin, A.; Akhshani, A. A novel parallel hash function based on 3D chaotic map. EURASIP J. Adv. Signal Process. 2013, 126, 1–12. [Google Scholar] [CrossRef]
  13. Linda, F.R.; Hammami, S.; Benrejeb, M.; Borne, P. Synchronization of discrete-time hyperchaotic maps based on an aggregation technique for encryption. In Proceedings of the 9th International Multi-Conference on systems, Signals and Devices, Chemnitz, Germany, 20–23 March 2012; pp. 1–6.
  14. Amigo, J.M.; Kocarev, L.; Szczepanski, J. Theory and practice of chaotic cryptography. Phys. Lett. A 2007, 366, 211–216. [Google Scholar] [CrossRef]
  15. Kocarev, L. Chaos-Based Cryptography: A Brief Overview. IEEE Circuits Syst. Mag. 2001, 1, 1–16. [Google Scholar] [CrossRef]
  16. Soltani, M. A new Secure Cryptography Algorithm based on Symmetric Key Encryption. J. Basic Appl. Sci. Res. 2013, 3, 465–472. [Google Scholar]
  17. Wang, X.; Chen, D. A Parallel Encryption Algorithm based on the Piecewise Linear Chaotic Map. Math. Probl. Eng. 2013, 1–7. [Google Scholar] [CrossRef]
  18. Wei, J.; Zheng, J.; Yu, J.; Shuai, Y. Selection of chaotic states in cryptosystem based on chaos with differential analysis. In Proceedings of the 7th International Conference on Computer Science & Education, Melbourne, Australia, 14–17 July 2012; pp. 325–330.
  19. Wong, K.-W.; Lin, Q.; Chen, J. Simultaneous Arithmetic Coding and Encryption Using Chaotic Maps. IEEE Trans. Circuits Syst. 2010, 57, 146–150. [Google Scholar] [CrossRef]
  20. Pande, A.; Zambreno, J. A Chaotic Encryption Scheme for Real-Time Embedded Systems: Design and Implementation. Telecommun. Syst. 2013, 52, 551–561. [Google Scholar]
  21. Guo, X.; Zhang, J. Cryptanalysis of the Chaotic-based Key Agreement Protocols. In Proceedings of the International Symposium on Biometrics and Security Technologies (ISBAST), Islamabad, Pakistan, 23–24 April 2008; pp. 1–3.
  22. Zhao, G.; Chen, G.; Fang, J.; Xu, G. Block Cipher Design: Generalized Single-Use-Algorithm Based on Chaos. Tsinghua Sci. Technol. 2011, 16, 194–206. [Google Scholar] [CrossRef]
  23. Tong, X.; Liu, Y.; Zhang, M.; Xu, H.; Wang, Z. An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos Maps. Entropy 2015, 17, 181–196. [Google Scholar] [CrossRef]
  24. Soleymani, A.; Nordin, M.J.; Sundararajan, E. A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map. Sci. World J. 2014. [Google Scholar] [CrossRef] [PubMed]
  25. Wei, J.; Zheng, X.; Yu, J.; Shuai, Y. A novel authentication scheme based on chaos. In Proceedings of the 8th International Conference on Computer Science & Education, Colombo, Sri Lanka, 26–28 April 2013; pp. 879–882.
  26. Rani, P.J.; Bhavani, S.D. Symmetric Encryption using the logistic map. In Proceedings of the 1st International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, 15–17 March 2012; pp. 1–5.
  27. Azzaz, M.S.; Tanougast, C.; Sadoudi, S.; Dandache, A. New Hardware Cryptosystem Based Chaos for the Secure Real-Time of Embedded Applications. In Proceedings of the IEEE Workshop Signal Processing System SIPS, Beirut, Lebanon, 4–7 October 2011; pp. 251–254.
  28. Sheng, S.; Wu, X. A New Digital Anti-counterfeiting Scheme Based on Chaotic Cryptography. In Proceedings of the International Conference on ICT Convergence (ICTC), Jeju Island, Korea, 15–17 October 2012; pp. 687–691.
  29. Zhang, Z.; Liu, K.; Niu, X.; Bai, X. The Research of Hardware Encryption Card Based on Chaos. In Proceedings of The International Conference on Sensor Network Security Technology and Privacy Communication System (SNS & PCS), Nangang, Taiwan, 18–19 May 2013; pp. 116–119.
  30. Shukla, P.K.; Khare, A.; Rizvi, M.A.; Stalin, S.; Kumar, S. Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing. Entropy 2015, 17, 1387–1410. [Google Scholar] [CrossRef]
  31. Shi, Z.; Bi, S.; Zhang, H.; Lu, R.; Shen, X. Improved auxiliary particle filter-based synchronization of chaotic Colpitts circuit and its application to secure communication. Wirel. Commun. Mob. Comput. 2013, 1–15. [Google Scholar] [CrossRef]
Figure 1. Message size versus encryption time.
Figure 1. Message size versus encryption time.
Entropy 18 00201 g001
Figure 2. Message size versus throughput.
Figure 2. Message size versus throughput.
Entropy 18 00201 g002
Figure 3. Message size versus energy consumption.
Figure 3. Message size versus energy consumption.
Entropy 18 00201 g003
Figure 4. Message size versus CPU time.
Figure 4. Message size versus CPU time.
Entropy 18 00201 g004
Figure 5. Encryption times of Chaotic Algorithm [3], AES [3] and CET-2C.
Figure 5. Encryption times of Chaotic Algorithm [3], AES [3] and CET-2C.
Entropy 18 00201 g005
Figure 6. Encryption time of compared Algorithm [12] and CET-2C.
Figure 6. Encryption time of compared Algorithm [12] and CET-2C.
Entropy 18 00201 g006
Figure 7. Encryption times of compared Algorithms 1 and 2 [17] and CET-2C.
Figure 7. Encryption times of compared Algorithms 1 and 2 [17] and CET-2C.
Entropy 18 00201 g007
Figure 8. Encryption throughput of Chaotic Algorithm [3], AES [3] and CET-2C.
Figure 8. Encryption throughput of Chaotic Algorithm [3], AES [3] and CET-2C.
Entropy 18 00201 g008
Figure 9. Energy consumption of AES [3], Chaotic Algorithm [3] and CET-2C.
Figure 9. Energy consumption of AES [3], Chaotic Algorithm [3] and CET-2C.
Entropy 18 00201 g009
Table 1. Comparison table (Authors’ names and performance comparison of their research papers).
Table 1. Comparison table (Authors’ names and performance comparison of their research papers).
FeaturesAlem Haddush Fitwi et al. [3]Amir Akhavan1 et al. [12]Amit Pande et al. [20]Ashraf Zaher et al. [1]Ayman Mousa et al. [4]Bassem Bakhache et al. [6]Bhavana Agrawal et al. [9]
SecuritySecure enoughHighComparatively highSecure EnoughHighHighMedium
Cryptanalysis Attack PreventionBrute ForceForgery and Birthday AttackExcept Known plaintext --Linear and DifferentialAll Four
Cipher typeStreamStreamStreamStreamBlockStreamStream
Application AreaMultimedia SystemReal Time ApplicationsReal Time Embedded SystemsCommunication System-Industrial ControlCommunication System
Space ComplexityHighMediumHighMediumEnough HighLowHigh
Implementation of algorithmComplexComplexHardHardComplex EnoughHighly ComplexComplex
Used techniqueHysteresis Switched SystemHigh Dimensional Chaotic MapMLM based PRNGChaos Shift Keying-PWLCMChaos based RSA and AES
Efficiency/ReliabilityMediumHighMediumMediumMediumHighHigh
Methodology/EnvironmentNIST and Monte Carlo TestSP800-22 and DIEHARD Test SuitsXilinxVirtex-6 FPGADuffing OscillatorMicrosoft SQLNIST Environment-
Speed (Processing)LowHighEnoughMediumHighHighMedium
Prediction PossibilityNoNoNoYesNoSlightlyYes
FeasibleAt Some ConditionYesNoYesYesNoYes
AccuracyMediumHighMediumHighMediumMediumMedium
Key lengthLargeLarge EnoughHighLarge EnoughLargeSlightly LargeLarge
CostHighHighHighMediumMediumLowHigh
Quality AssuranceHighHighApplicableHighReasonableResemblanceApplicable
Table 2. Cipher text for plain text.
Table 2. Cipher text for plain text.
Plain Text (ASCII)XNORKey K j Cipher Text
P 18400010111
80 23
01010000XNOR10111000
I 4810000110
73 134
01001001XNOR00110000Å
Y 22401000110
89 70
01011001XNOR11100000F
U 19201101010
85 106
01010101XNOR11000000j
S 12800101100
83 44
01010011XNOR10000000,
H 18400001111
72 15
01001000XNOR10111000
S 4810011100
83 156
01010011XNOR00110000£
Cipher text—↨ÅFj,☼£
Table 3. Plain text for cipher text.
Table 3. Plain text for cipher text.
Cipher TextXNORKey K j Plain Text (ASCII)
18401010000
23 80
00010111XNOR10111000P
Å 4801001001
134 73
10000110XNOR00110000I
F 22401011001
70 89
01000110XNOR11100000Y
j 19201010101
106 85
01101010XNOR11000000U
, 12801010011
44 83
00101100XNOR10000000S
18401001000
15 72
00001111XNOR10111000H
£ 4801010011
156 83
10011100XNOR00110000S
Plain text–PIYUSHS.
Table 4. Sensitivity of Number of Keys j.
Table 4. Sensitivity of Number of Keys j.
jA X n X n + 1 Keys ( K j )Cipher Text
26472,208184,48,184,48,184,48,184↨Å▲Üç
36472,208,32184,48,224,184,48,224,184↨ÅF↕£W
46472,208,32,64184,48,224,192,184,48,224↨ÅFjçL
56472,208,32,64,128184,48,224,192,128,184,48↨ÅFj,☼£
Table 5. Sensitivity of Constant A.
Table 5. Sensitivity of Constant A.
jA X n X n + 1 Keys ( K j )Cipher Text
52424,80,96,64,128232,176,160,192,128,232,176G♠♠j,_∟
53436,196,228,132,164220,60,28,124,92,220,60sè║╓≡kÉ
55460,80,192,0,0196,176,64,1,1,196,176k♠µ½¡s∟
56472,208,32,64,128184,48,224,192,128,184,48↨ÅFj,☼£
Table 6. Sensitivity of initial condition X n .
Table 6. Sensitivity of initial condition X n .
jA X n X n + 1 Keys ( K j )Cipher Text
56212,24,240,96,192244,232,16,160,64,244,232[^╢LF∞CD
56336,136,80,32,64220,120,176,224,192,220,120s╬▬Jlk╘
56472,208,32,64,128184,48,224,192,128,184,48↨ÅFj,☼£
565120,176,224,192,128136,80,32,64,128,136,80'µÅΩ,?ⁿ
Table 7. Encryption times of Chaotic Algorithm [3], AES [3] and CET-2C.
Table 7. Encryption times of Chaotic Algorithm [3], AES [3] and CET-2C.
Message Sizes in KBEncryption Time in Seconds
Chaotic Algorithm [3]AES [3]CET-2C
2001.6510.0698
2502.0510.076
3002.4810.082
3502.8310.0891
4003.3510.0976
4503.7510.1054
Table 8. Overall % Gain of CET-2C over Chaotic Algorithm [3] and AES [3] for encryption time.
Table 8. Overall % Gain of CET-2C over Chaotic Algorithm [3] and AES [3] for encryption time.
Message Sizes in KBOverall % Gain for Encryption Time of CET-2C
CET-2C over Chaotic Algorithm [3]CET-2C over AES [3]
20095.7793.02
25096.2992.4
30096.6991.8
35096.8591.09
40097.0990.24
45097.1989.46
Table 9. Encryption time of compared Algorithm [12] and CET-2C.
Table 9. Encryption time of compared Algorithm [12] and CET-2C.
Message Sizes in MBEncryption Time in Milliseconds
Compared Algorithm [12]CET-2C
1015001250
2035002400
3053004876
4068006050
5085008000
6010,3009700
7012,10010,800
8013,80012,000
Table 10. Overall %Gain of CET-2C over the compared Algorithm [12] for encryption time.
Table 10. Overall %Gain of CET-2C over the compared Algorithm [12] for encryption time.
Message Sizes in MBOverall % Gain for Encryption Time of CET-2C
CET-2C over Compared Algorithm [12]
1016.67
2031.43
308.00
4011.03
505.88
605.83
7010.74
8013.04
Table 11. Encryption time of compared Algorithms 1 and 2 [17] and CET-2C.
Table 11. Encryption time of compared Algorithms 1 and 2 [17] and CET-2C.
Message Sizes in BytesEncryption Time in Milliseconds
Compared Algorithm1 [17]Compared Algorithm2 [17]CET-2C
100,0001354
500,0004575
600,00020462082
700,000410123097
800,0006401930120
Table 12. Overall %Gain of CET-2C over compared Algorithms 1 and 2 [17] for encryption time.
Table 12. Overall %Gain of CET-2C over compared Algorithms 1 and 2 [17] for encryption time.
Message Sizes in BytesOverall % Gain for Encryption Time of CET-2C
CET-2C over Compared Algorithm 1 [17]CET-2C over Compared Algorithm 2 [17]
100,000−98.15−94.44
500,000−94.67−93.33
600,00059.8086.77
700,00076.3492.11
800,00081.2593.78
Table 13. Encryption throughput of Chaotic Algorithm [3], AES [3] and CET-2C.
Table 13. Encryption throughput of Chaotic Algorithm [3], AES [3] and CET-2C.
Message Sizes in BytesEncryption Throughput in Bytes/Second
Chaotic Algorithm [3]AES [3]CET-2C
10,00020,000200050,000
20,00017,000200044,847
30,00016,700200049,342
40,00016,500200057,405
50,00016,400200064,049
Table 14. Overall %Gain of CET-2C over Chaotic Algorithm [3] and AES [3] for encryption throughput.
Table 14. Overall %Gain of CET-2C over Chaotic Algorithm [3] and AES [3] for encryption throughput.
Message Sizes in BytesOverall % Gain for Encryption Throughput of CET-2C
CET-2C over Chaotic Algorithm [3]CET-2C over AES [3]
10,0001502400
20,0001642142
30,0001952367
40,0002482770
50,0004903102
Table 15. Energy consumption of AES [3], Chaotic Algorithm [3] and CET-2C.
Table 15. Energy consumption of AES [3], Chaotic Algorithm [3] and CET-2C.
Message Sizes in KbEnergy Consumption in J
Chaotic Algorithm [3]AES [3]CET-2C
2000.206250.1250.008725
2500.256250.1250.0095
3000.310.1250.01025
3500.353750.1250.011138
4000.418750.1250.0122
4500.468750.1250.0225
Table 16. Overall % Gain of CET-2C over Chaotic Algorithm [3] and AES [3] for energy consumption.
Table 16. Overall % Gain of CET-2C over Chaotic Algorithm [3] and AES [3] for energy consumption.
Message Sizes in KbOverall % Gain for Energy Consumption of CET-2C
CET-2C over Chaotic Algorithm [3]CET-2C over AES [3]
20095.7793.02
25096.2992.4
30096.6991.8
35096.8591.09
40097.0990.24
45097.1989.46

Share and Cite

MDPI and ACS Style

Khare, A.; Shukla, P.K.; Rizvi, M.A.; Stalin, S. An Intelligent and Fast Chaotic Encryption Using Digital Logic Circuits for Ad-Hoc and Ubiquitous Computing. Entropy 2016, 18, 201. https://doi.org/10.3390/e18050201

AMA Style

Khare A, Shukla PK, Rizvi MA, Stalin S. An Intelligent and Fast Chaotic Encryption Using Digital Logic Circuits for Ad-Hoc and Ubiquitous Computing. Entropy. 2016; 18(5):201. https://doi.org/10.3390/e18050201

Chicago/Turabian Style

Khare, Ankur, Piyush Kumar Shukla, Murtaza Abbas Rizvi, and Shalini Stalin. 2016. "An Intelligent and Fast Chaotic Encryption Using Digital Logic Circuits for Ad-Hoc and Ubiquitous Computing" Entropy 18, no. 5: 201. https://doi.org/10.3390/e18050201

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop