An Intelligent and Fast Chaotic Encryption Using Digital Logic Circuits for Ad-hoc and Ubiquitous Computing

Delays added by the encryption process represent an overhead for smart computing devices in ad-hoc and ubiquitous computing intelligent systems. Digital Logic Circuits are faster than other computing techniques, so these can be used for fast encryption to minimize processing delays. Chaotic Encryption is more attack-resilient than other encryption techniques. One of the most attractive properties of cryptography is known as an avalanche effect, in which two different keys produce distinct cipher text for the same information. Important properties of chaotic systems are sensitivity to initial conditions and nonlinearity, which makes two similar keys that generate different cipher text a source of confusion. In this paper a novel fast and secure Chaotic Map-based encryption technique using 2's Compliment (CET-2C) has been proposed, which uses a logistic map which implies that a negligible difference in parameters of the map generates different cipher text. Cryptanalysis of the proposed algorithm shows the strength and security of algorithm and keys. Performance of the proposed algorithm has been analyzed in terms of running time, throughput and power consumption. It is to be shown in comparison graphs that the proposed algorithm gave better results compare to different algorithms like AES and some others.


Introduction
As a ubiquitous trend in the environment, chaos is a type of deterministic random process provided by nonlinear dynamical systems.The main characteristics of chaotic systems are sensitive to initial conditions, randomness, diffusion, confusion and ergodicity.Chaotic systems have become an important topic of research because of these properties and are widely used in cryptography [1,2].The existing-related research about chaos-based cryptography includes symmetric encryptions; security protocols and algorithms, asymmetric encryption and hash functions [3][4][5].
In recent years, the one way hash functions based on chaotic logistic maps, including 1D & 2D piecewise linear/nonlinear logistical map, high dimensional chaotic map, chaotic neural networks, hyper chaos and chaos S-Box have been modified [6][7][8].Chaos map-based different algorithms, techniques and methods are constructed using hash functions, so high dimensionality dynamic systems have become an important and interesting research area in several scientific fields in the areas of computer science and secure communications [9][10][11].Chaotic functions are sensitive to initial conditions-any negligible difference in the initial value generates a completely different cipher text.This means the cryptosystem using chaos theory will be strong against brute force attacks [12][13][14][15].These properties of chaos have high potential for several applications in cryptosystems provided long term predictions on chaotic systems [16,17].
A novel chaos-based cryptographic technique using digital logic circuits is proposed in this paper for fast and secure encryption and decryption of information for several real time applications [18,19].A chaotic logistic map provides a high degree of randomness and ergodicity to resist the linear and differential attacks and also enhances the security by providing confusion and diffusion to the system [20][21][22][23][24].
These previous techniques have solved many problems of cryptography and enhanced security and performance, but these techniques have some major drawbacks.The existing algorithms and methods are not easily understandable for users because they employ many mathematical functions.Symmetric key cryptosystems use the same single key every time for encryption and decryption.If the key is known by an intruder then the message is easily deduced.In a symmetric key cryptosystem, if an intruder knows the chaos function and the initial value of the chaos function, then the intruder can easily deduce the message.The encryption speed of chaotic cryptography is much slower than traditional cryptography, so a symmetric key cryptography technique is proposed, which uses more than one key for encryption and decryption.These keys are the same for encryption and decryption at one time but different keys are used for distinct messages.Security has been enhanced by using multiple keys and the randomness of keys is also enhanced by using digital concepts like 2's complement.Even if an intruder knows the keys used one time, then the keys are changed the next time for the same message.The speed of encryption has been also increased by using digital concepts like XORing gate rather than difficult mathematical functions.
The rest of the paper is organized into several sections.Related works and a literature survey are briefly described in Section 2. In Section 3 the proposed cryptosystem and algorithms are described.In Section 4, an example of the proposed crypto systemis explained.Then the security of keys is analyzed in Section 5 with the help of key parameters.In Section 6, the proposed technique is analyzed against all four cryptanalysis attacks.Its performance is evaluated in terms of encryption time, throughput and power consumption in Section 7. In Section 8, the performance of the algorithm is compared with some algorithms like AES and others, which are described in different papers.In Section 9, the paper is concluded.

Related Work
Industrial and communication systems largely use unpredictable and practical cryp to systems for highly secure and fast transmission of information with little memory capacity [10,18], so they can satisfy the requirements of industrial control and military used in WiFi and ZigBee networks [6,14].These proposed methods are analyzed in the UACI, NPCR and NIST environment.
An electrocardiogram (ECG) encryption system for biometric recognition collects ECG signals from an encrypted person using a portable instrument [18].Simulation results show that the secrecy and security are enhanced by using an efficient large key size and complex algorithms widely used in multimedia applications [25].
Entropy 2016, 18, 201 4 of 27 Some mathematical properties have also determined the security and performance of distinct algorithms and systems using dynamic, chaotic cryptography [11,26].Periodic switching of cryptographic keys is a different concept to boost the security of cryptographic systems in which chaotic behavior is combined with the periodic switching of keys [8].It is represented that the running time complexity of the chosen plaintext, and a cipher text attack can be reduced to yield a simple set of linear equations [27,28].The performance of the algorithm is measured in terms of cost, time and speed.Several one-dimension chaotic maps have been used to generate independent and approximately uniform pseudo-dynamic sequences for faster and time efficient encryption on blocks of data.Simulation results analyzed the efficiency and resistance against difference and linear cryptanalysis attacks and showed the high performance of the algorithm [5,29].Fast encryption provides reliability and high security slightly, but at the same time highly reduces the running time [21,30,31].Table 1 summarizes all the author's works on chaotic based encryption scheme on the basis of some characteristics.

Proposed Methodology/Scheme
A novel, fast and secure "Chaotic Map based Encryption Technique using 2's Compliment (CET-2C)" has been proposed using one or more than one keys for the encryption and decryption process but at any time instant the encryption and decryption keys are similar.It means different messages are encrypted via different multiple keys to increase the security against known cryptanalysis attacks.Firstly, the number of keys has been generated with the help of chaos logistic function (logistic map) providing only the initial condition.
These keys have been prohibited from providing some proper condition, so all the characters of the information are encrypted and decrypted with these difference and multiple keys.Multiple keys have been used to increase the randomness as well as security, and it is not necessary that any repeated characters in the information be encrypted and decrypted with a similar key.
The complexity of keys has been increased by using some digital logic like 2's compliment code so the randomness of keys is enhanced with better security.These complex random keys have provided fast, feasible and efficient encryption in secure communication so the intruder is not sure about the generation of keys.
The necessary notations which are used for the key generation, encryption and decryption scheme are the following: P i = Plain text; C i = Cipher text; EpP i q = Encryption of the plain text P i ; DpC i q = Decryption of the cipher text C i .

Scheme for Key Generation
(1) Initially the pseudo random numbers are generated by using the chaotic map function at both ends (sender and receiver).
For n = 1 to j: X n`1 " tA ˆXn pX n ´1qu MOD 256 (2) The multiple different keys are generated by applying 2's compliment on different values of X n`1 and the number of keys is fixed by providing some suitable condition j.
(3) Complexity and security of keys are enhanced by applying 2's compliment code on X n+1 so keys are random and independent with each other.
(4) These keys are converted into 8-bit binary form.

Scheme for Encryption Process
Each character is represented in ASCII character format which are converted into 8-bit binary numbers with respect to their decimal numbers.These characters are encrypted by using a digital logic bitwise XNOR gate function.This XNOR operation is performed on each character by a single binary coded key.Keys are also repeated for encrypting and decrypting the whole information.
P 1 = ASCII (Character 1); P 1 is represented in 8-bit binary numbers: . ., P i = ASCII (Character i); P i is represented in 8-bit binary numbers: where m = 1 to j.

Scheme for Decryption Process
The cipher texts have been decrypted (converted into plain text) by using the reverse process of the encryption technique: P 1 is represented into ASCII (P 1 ) with respect to its decimal value.Character 1 = ASCII (P 1 ): P 2 is represented into ASCII (P 2 ) with respect to its decimal value.Character 2 = ASCII (P 2 ): . . ., where m = 1 to j; P i is represented in ASCII (P i ) with respect to its decimal value; Character i = ASCII (P i )

Key Generation Algorithm
(1) Select the values of parameter (M, A, X n ).
(2) Generate the pseudo random numbers from the logistic map equation.

Encryption Algorithm
(1) Each character is converted into an ASCII character,P i = ASCII (Character i).ASCII character P i is represented into 8-bit binary form.E k m pP i q " C i for all i > 0, and m = 1 to j, using this equation for encrypting the message.Where E k m pP i q is bit wise XNOR perform on plaintext P i with a single key K m .

Decryption Algorithm
(1) P i " D k m pC i q for all i > 0 and m = 1 to j, using this equation for decrypting the cipher text.where D k m pC i q is bit wise XNOR perform on cipher text C i with a single key K m .
(2) Plain text P i is represented into ASCII (P i ) with respect to its decimal value.

Example
Given plain text-PIYUSHS Let A = 6, X n = 4, Number of Keys j = 5 For j = 1 The keys are established by applying 2's compliment code on pseudo random numbers X n`1 .1's compliment is generated by converting 0 to 1 and 1 to 0 then 2's compliment is generated by adding 1 in 1's compliment of numbers:

Encryption Algorithm
Encryption scheme converts the plain text into unreadable cipher text by using different multiple keys (Table 2). Given

Encryption Algorithm
Encryption scheme converts the plain text into unreadable cipher text by using different multiple keys (Table 2).

Encryption Algorithm
Encryption scheme converts the plain text into unreadable cipher text by using different multiple keys (Table 2).
Cipher text for plain text.

Analysis of Key Security
To find and compute all the values (J, A, X n ) is difficult.In this section the sensitivity of the secret key has been represented with negligible difference in the key parameters: X n`1 " tA ˆXn pX n ´1qu MOD 256 Plain text-PIYUSHS; Parameter (J, A, X n ); Keys (K 1 , K 2 , K 3 , . . . . . . . . . . . . . .K j ).

Sensitivity of Number of Keys J
It has been described that if a number of keys are changed, then the cipher texts are also fully changed from one another for the same plain text.In Table 4 negligible dissimilarity in the j (number of keys) generates different cipher text.

Encryption Algorithm
Encryption scheme converts the plain text into unreadable cipher text by using different multiple keys (Table 2).

Encryption Algorithm
Encryption scheme converts the plain text into unreadable cipher text by using different multiple keys (Table 2).

Encryption Algorithm
Encryption scheme converts the plain text into unreadable cipher text by using different multiple keys (Table 2).

Encryption Algorithm
Encryption scheme converts the plain text into unreadable cipher text by using different multiple keys (Table 2).It has been described that little changes in the initial condition X n produces fully different keys, so cipher texts are completely different.This is known as confusion.In Table 6 it has been shown that little difference in values of initial variable X n produced fully different cipher text.

Cryptanalysis
Cryptanalysis is a method which is used to verify the security of an algorithm by breaking the codes of the algorithm and getting the possible encryption keys and plain text as well.

Cipher Text Only Attacks
Parameter (j = 5, A = 6, n X =4) Keys (184,48,224,192,128) Given: , , , , ; Or an algorithm to deduce 184,48,224,192,128) Example: (QQQQQQ) = ▬₧Nn.▬ From the above example, it is to be said that if any character is repeated many times in the text, the cipher text is completely different for same letter Q.The Cipher text of Character Q finding as the first letter is dissimilar from Q finding as nth character in plaintext.

Cryptanalysis
Cryptanalysis is a method which is used to verify the security of an algorithm by breaking the codes of the algorithm and getting the possible encryption keys and plain text as well.

Cryptanalysis
Cryptanalysis is a method which is used to verify the security of an algorithm by breaking the codes of the algorithm and getting the possible encryption keys and plain text as well.

Cipher Text Only Attacks
Parameter (j = 5, A = 6, n X =4) Keys (184,48,224,192,128) Given: , , , , ; K K K K K Or an algorithm to deduce 184,48,224,192,128) Example: (QQQQQQ) = ▬₧Nn.▬ From the above example, it is to be said that if any character is repeated many times in the text, the cipher text is completely different for same letter Q.The Cipher text of Character Q finding as the first letter is dissimilar from Q finding as nth character in plaintext.

Known Plain Text Attack
Parameter (j = 5, A = 6, n X = 4)   Keys (184,48,224,192,128) Given: Example: 1 From the above example, it is to be said that if any character is repeated many times in the text, the cipher text is completely different for same letter Q.The Cipher text of Character Q finding as the first letter is dissimilar from Q finding as nth character in plaintext.

Known Plain Text Attack
Parameter (j = 5, A = 6, X n = 4) Keys (184,48,224,192,128) Given: P 1 , C 1 " E k 1 pP 1 q, P 2 , C 2 " E k 2 pP 2 q, . . . . . . . . . . . . . .P i , C i " E k m pP i q where m = 1 to j Deduce: -Either K 1 , K 2 , K 3 , K 4 , K 5 ; Or an algorithm to deduce P i`1 From C i`1 " E k m pP i`1 q Keys (184, 48,224,192,128) Example: From the example, it can be said that there are several plain texts with their corresponding cipher text.It is hard to compute the key or the algorithm which is used for encryption of plain texts for decrypting them.Keys are generated by very restricted and sensitive parameters.The cipher text of the Character R found as the first letter is different as that of the letter R found as the nth character in the plaintext.

Chosen Cipher Text Attack
Parameter (j = 5, A = 6, X n = 4) Keys (184,48,224,192,128) Example: Keys are produced by two different parameters X n and A which are very sensitive and independent, so it is not easy to deduce the keys by knowing the cipher text and its decrypted plaintext.

Performance Analysis
In this paper, pertinent metrics are recognized.Performance of the proposed chaotic algorithm(CET-2C) is measured, and finally compared with the existing one secret key, AES, encryption algorithm and also compared with different algorithms using same data size published in Springer [12], Hindawi [17] and EEA [3] publications.It is to be shown that CET-2C is not affected by the data set, and only depends upon the data size.

Metrics and Performance
In this paper, five significant metrics is described to estimate the performance of the proposed algorithm (CET-2C).The metrics include: encryption/decryption time, CPU time, cipher size, power consumption, and encryption throughput.Then the experiment is performed, and performance results are measured using a laptop having a Intel (R) Core (TM) i3-3110M processor CPU @ 2.40GHz, and a RAM of 2GB.The results are also calculated using a laptop having an Intel Pentium Dual-Core CPU @ 2.60 GHz processor and 2 GB RAM and a laptop having an Intel (R) Pentium (R) Dual CPU T2370 @ 1.73 GHz processor and 1 GB RAM for comparison with other algorithms.

Encryption Time
The encryption time is based on the running time complexity of the algorithm, length of the key, and the plaintext size to be encrypted with various encryption algorithms.Hence, in this paper, a number of encryption times for different plaintext sizes and key length are selected and analyzed by using CPU clock time [3].A variety of data sizes ranging from 0 MB to 80 MB are encrypted and their corresponding encryption times are collected.It is shown by a graph that the encryption time increases with increasing the data size.The encryption time and data size are linearly increased in Figure 1.

Metrics and Performance
In this paper, five significant metrics is described to estimate the performance of the proposed algorithm (CET-2C).The metrics include: encryption/decryption time, CPU time, cipher size, power consumption, and encryption throughput.Then the experiment is performed, and performance results are measured using a laptop having a Intel (R) Core (TM) i3-3110M processor CPU @ 2.40GHz, and a RAM of 2GB.The results are also calculated using a laptop having an Intel Pentium Dual-Core CPU @ 2.60 GHz processor and 2 GB RAM and a laptop having an Intel (R) Pentium (R) Dual CPU T2370 @ 1.73 GHz processor and 1 GB RAM for comparison with other algorithms.

Encryption Time
The encryption time is based on the running time complexity of the algorithm, length of the key, and the plaintext size to be encrypted with various encryption algorithms.Hence, in this paper, a number of encryption times for different plaintext sizes and key length are selected and analyzed by using CPU clock time [3].A variety of data sizes ranging from 0 MB to 80 MB are encrypted and their corresponding encryption times are collected.It is shown by a graph that the encryption time increases with increasing the data size.The encryption time and data size are linearly increased in Figure 1.

Encryption Throughput, Xe
It is defined as the number of bytes of plaintext encrypted (cipher text completed) during an observation period (encryption time) [3].Mathematically: In the proposed algorithm, Throughput linearity is enhanced as the data size is increased in Figure 2.

Encryption Throughput, X e
It is defined as the number of bytes of plaintext encrypted (cipher text completed) during an observation period (encryption time) [3].Mathematically:

Number of Completions in Bytes Encryption Time (sq
In the proposed algorithm, Throughput linearity is enhanced as the data size is increased in Figure 2.

Number of Completions in Bytes
Encryption Time ( ) e X s  In the proposed algorithm, Throughput linearity is enhanced as the data size is increased in Figure 2.

Power Consumption
Power is needed for running fast CPUs and memory based on the usability of devices and algorithms.The energy cost of the encryption process is defined as the product of the total number of clock cycles required by the encryption process and average current drawn by each CPU clock cycle in the ampere cycle.The total energy cost is calculated in ampere seconds by dividing the ampere cycles by the clock frequency in cycles/second of a processor [3].Then results are multiplied with the processor's operating voltage to obtain the energy cost in joule.The CET-2C consumed the amount of energy for encryption or decryption is given by: E " V cc ˆI ˆT J where V cc = Processor's operating voltage; T = Encryption time; I = Average current per CPU cycle.
In this paper, the experiments were performed and results were collected using a laptop equipped with an Intel (R) Core (TM) i3-3110M processor CPU.The approximate average current consumed is 100 mA and the CPU voltage is V cc = 1.25 V (both obtained from the Intel Manual).
The variations of energy consumption with different data sizes are shown in the graph which is represented that the energy consumed during an encrypting process is directly proportional to the encryption time in Figure 3.

Power Consumption
Power is needed for running fast CPUs and memory based on the usability of devices and algorithms.The energy cost of the encryption process is defined as the product of the total number of clock cycles required by the encryption process and average current drawn by each CPU clock cycle in the ampere cycle.The total energy cost is calculated in ampere seconds by dividing the ampere cycles by the clock frequency in cycles/second of a processor [3].Then results are multiplied with the processor`s operating voltage to obtain the energy cost in joule.The CET-2C consumed the amount of energy for encryption or decryption is given by: In this paper, the experiments were performed and results were collected using a laptop equipped with an Intel (R) Core (TM) i3-3110M processor CPU.The approximate average current consumed is 100 mA and the CPU voltage is cc V = 1.25 V (both obtained from the Intel Manual).
The variations of energy consumption with different data sizes are shown in the graph which is represented that the energy consumed during an encrypting process is directly proportional to the encryption time in Figure 3.

CPU Time
The CPU process time is defined as the time when the CPU is busy in the calculation of a particular process.When the load of CPU is increased then CPU time is also enhanced linearly [3].In this paper, the CPU time is given by: CPU utilization CPU busytime, Observation period

CPU T 
where CPU utilization = Obtained from the task manager; Observation period = Encryption Time in Figure 4.

CPU Time
The CPU process time is defined as the time when the CPU is busy in the calculation of a particular process.When the load of CPU is increased then CPU time is also enhanced linearly [3].In this paper, the CPU time is given by: CPU busytime, T CPU " CPU utilization Observation period where CPU utilization = Obtained from the task manager; Observation period = Encryption Time in Figure 4.
The CPU process time is defined as the time when the CPU is busy in the calculation of a particular process.When the load of CPU is increased then CPU time is also enhanced linearly [3].In this paper, the CPU time is given by: CPU utilization CPU busytime, Observation period

CPU T 
where CPU utilization = Obtained from the task manager; Observation period = Encryption Time in Figure 4. Cipher Size Shannon's Characteristics of "Good" Ciphers states that the size of the encrypted text should be no larger than the plaintext of the original message.In this work, the size of plaintext and cipher text are shown to be the same, thus satisfying Shannon's size Characteristics of "Good" Ciphers rule.

Comparison with AES and Chaotic Algorithms [3]
The performance of the proposed algorithm (CET-2C) is compared with a popular secret key encryption algorithm, AES, and with Chaotic Algorithms [3,12] using the data size same as provided in [3,12,17].The plaintexts used in the proposed algorithm, are encrypted using AES, and a Chaotic Algorithm [3,12] and their performance is evaluated and analyzed using the same metrics as above.

Encryption Time
Encryption times for the same set of several data sizes (200 KB to 450 KB) are collected using a laptop equipped with an Intel (R) Pentium (R) Dual CPU T2370 @ 1.73 GHz processor, and 1 GB RAM and used to analyze the performance of the CET-2C, and the results put into graphic form and tabular form (Table 7).Figure 5 shows the proposed algorithm CET-2C is much faster compared to AES [3] and the Chaotic Algorithm for multiple message sizes from 200 KB to 450 KB [3].CET-2C is also applied for large data sizes with lower encryption time.The results illustrate that the encryption time increases linearly when it is compared with other algorithms.Figure 5 shows the proposed algorithm CET-2C is much faster compared to AES [3] and the Chaotic Algorithm for multiple message sizes from 200 KB to 450 KB [3].CET-2C is also applied for large data sizes with lower encryption time.The results illustrate that the encryption time increases linearly when it is compared with other algorithms.Overall % Gain of CET-2C over Chaotic Algorithm [3] for Encryption Time with increasing the message size:
Overall % Gain of CET-2C over Chaotic Algorithm [3] for Encryption Time with increasing the message size:  8 illustrates that overall gain % of CET-2C for encryption time is higher as compared with the Chaotic Algorithm [3] and AES [3].For the 350 KB message size the overall % gain of CET-2C is 96.85% and 91.09% when it is compared with the Chaotic Algorithm [3] and AES [3].It shows that the performance of CET-2C is increased with multiple message sizes.The encryption time is also calculated for large data sizes in MB (10 MB to 80 MB) using a laptop with an Intel (R) Pentium (R) Dual CPU T2370 processor of @ 1.73 GHz, and 1 GB RAM (Table 9).Table 8.Overall % Gain of CET-2C over Chaotic Algorithm [3] and AES [3] for encryption time.

Message Sizes in KB
Overall % Gain for Encryption Figure 6 shows that the time required for encryption in the proposed CET-2C algorithm is lower compared to the algorithm [12] for different message sizes in MB.For 80 MB message the encryption time of CET-2C is 12 sand for the comparison algorithm [12] it is 13.8 s.This shows that CET-2C is much faster than the comparable algorithm [12].Overall % Gain of CET-2C over Compared Algorithm [12] for Encryption Time with increasing message size.

(at Different MessageSizes)
(at Different Message Sizes) f CET-2C over CA (at Different MessageSizes) Here p G = Overall % Gain at Different Message Sizes; ET = Encryption Time; CA = Compared Algorithm; CET-2C = Chaotic Map based Encryption Technique using 2's Compliment % Gain of CET-2C over Compared Algorithm [12] when message size is 10 MB 2 % Gain of CET-2C 100 16.67 1250 1500 100 1500 [12] when message size is 20 MB
Overall % Gain of CET-2C over Compared Algorithm [12]  Table 10 illustrates that the overall encryption time gain % of CET-2C is higher as compared with the compared algorithm [12].At the message size 20 MB the overall % gain of CET-2C is 31.43%when compared with the compared algorithm [12].This shows that the performance of CET-2C is increased with multiple message sizes.The data sizes was also taken in bytes and experiments performed to calculate the encryption time using a laptop with an Intel (R) Core (TM) i3-3110M processor @ 2.40GHzCPU, and a RAM of 2GB (Table 11).Figure 7 shows that for small dataset sizes (100 KB and 500 KB) the comparison algorithms [17] performed the encryption with slightly higher speed, but for large data sizes (larger than 500 KB) the encryption time is instantly increased.The graph of our proposed algorithm CET-2C increased linearly for small to large data sizes.

Bytes
Compared Figure 7 shows that for small dataset sizes (100 KB and 500 KB) the comparison algorithms [17] performed the encryption with slightly higher speed, but for large data sizes (larger than 500 KB) the encryption time is instantly increased.The graph of our proposed algorithm CET-2C increased linearly for small to large data sizes.

Encryption Time
Compared Algorithm1 [17] Compared Algorithm2 [17] CET-2C Overall % Gain of CET-2C over compared Algorithm 1 [17] for encryption time with increasing the message size: Table 12 illustrates that the overall gain % of CET-2C for encryption time is negative as compared with the compared Algorithms 1 and 2 [17] for small data sizes (up to 500 KB), meaning that CET-2C takes a longer time for encryption.After 500 KB the encryption time is lower than for comparable Algorithms 1 and 2 [17] so the overall performance of CET-2C is enhanced for larger data sizes.At the message size of 700 KB the overall % gain of CET-2C is 76.34% and 92.11% when it is compared with compared Algorithm 1 and 2, respectively [17].This shows that the performance of CET-2C is increased with increased message size.

Encryption Throughput
The graph representing the throughput performance of the proposed algorithm CET-2C is much higher for any data size compared to the AES and Chaotic Algorithm [3].It was analyzed using a laptop having an Intel (R) Pentium (R) Dual T2370 @ 1.73 GHz processor CPU, and 1 GB RAM (Table 13).Figure 8 shows that the throughput of the proposed algorithm CET-2C is much higher compared to the chaotic algorithm [3] and AES [3] for different message sizes in bytes.For a 50,000 byte message the throughput of CET-2C is 64,049 bytes/s and the Chaotic Algorithm [3] and AES [3] have throughputs of 16,400 and 2000 bytes/s, respectively.This shows that CET-2C is much faster than the comparable algorithm [3].Overall % Gain of CET-2C over Chaotic Algorithm [3] for Encryption Throughput with increasing the message size

Encryption Throughput
Chaotic Algorithm [3] AES [3] CET-2C Overall % Gain of CET-2C over Chaotic Algorithm [3]  The graph demonstrates that the proposed algorithm has lesser power consumption than AES and the Chaotic Algorithm [3] for any data size.This was analyzed using a laptop having an Intel (R) Pentium (R) Dual processor T2370 @ 1.73 GHzCPU, and 1 GB RAM (Table 15). Figure 9 shows the proposed algorithm CET-2C has less power consumption compared to AES [3] and the chaotic algorithm for multiple message sizes ranging from 200 KB to 450 KB [3].The results illustrate that the energy consumptionincreases linearly like the encryption time when it is compared with other algorithms.
Entropy 2016, 18, x 23 of 27 Figure 9 shows the proposed algorithm CET-2C has less power consumption compared to AES [3] and the chaotic algorithm for multiple message sizes ranging from 200 KB to 450 KB [3].The results illustrate that the energy consumptionincreases linearly like the encryption time when it is compared with other algorithms.Overall % Gain of CET-2C over Chaotic Algorithm [3] for Energy Consumption with increasing the message size.
Overall % Gain of CET-2C over Chaotic Algorithm [3]  is 97.19% and 89.46% when it is compared with the chaotic algorithm [3] and AES [3].This shows that the performance of CET-2C is increased with increasing message size.

Conclusions
Chaotic functions have been widely used in different applications to generate pseudo-random numbers to produce random values in short times, which may be used for various real time applications.In this paper a novel digital logic-based, chaotic encryption technique has been developed, which works based on chaos theory, using the sensitivity of parameters like a constant A and initial condition Xn with the properties of chaotic systems for ubiquitous and ad-hoc computing.The efficiency of the encryption technique also depends on the number of keys, which are generated by the use of the chaotic function.It has been also shown that keys are completely different when the parameters are changed slightly.This demonstrates the security of the keys.Cryptanalysis of the proposed algorithm shows the strength and security of the algorithm and keys.The performance of a proposed algorithm has been analyzed in terms of running time, throughput and power consumption.It is to be shown in comparison graphs that the proposed algorithm gave better results compared to different algorithms like AES and some others.The graphs show that the CET-2C gives 97% better encryption time, 95% better throughput and 98% better power consumption as compared to the other algorithms.This could be used for providing a better trade-off between security and computational complexity.In the future chaos theory could be used in highly secure and fast encryption systems, capable of processing very large dataset sizes on the order of GB with low space complexity.Digital circuits are very useful for fast encryption, as they are easily understandable and maintainable for processing messages compared to mathematical models.The private networks have security concerns and they need several techniques for hiding and encoding the messages moving between their private systems.This could be achieved by using chaos-based cryptography in the future.

Figure 1 .
Figure 1.Message size versus encryption time.

Figure 1 .
Figure 1.Message size versus encryption time.
's operating voltage; T = Encryption time; I = Average current per CPU cycle.

Figure 3 .
Figure 3. Message size versus energy consumption.

Figure 3 .
Figure 3. Message size versus energy consumption.

2 0% 2 %% 2 %%
% Gain at Different Message Sizes; EC = Energy Consumption; CA = Chaotic Algorithm.%Gain of CET-2C over Chaotic Algorithm[3] when message size is 200 KB Gain of CET-2 Cover Chaotic Algorithm[3] when message size is 250 KB Gain of CET-Gain of CET-2C over Chaotic Algorithm[3] when message size is 300 KB Gain of CET-2C over Chaotic Algorithm[3] when message size is 350 KB

Table 2 .
Cipher text for plain text.

Table 2 .
Cipher text for plain text.

Table 2 .
Cipher text for plain text.

Table 2 .
Cipher text for plain text.

Table 2 .
Cipher text for plain text.

Table 2 .
Cipher text for plain text.

Table 3 .
Plain text for cipher text.

Table 2 .
Cipher text for plain text.

Table 4 .
Sensitivity of Number of Keys j.

Table 2 .
Cipher text for plain text.

Table 2 .
Cipher text for plain text.

Table 2 .
Cipher text for plain text.

Table 2 .
Cipher text for plain text.It has been described that negligible changes in constant A produce fully different keys so cipher texts are also different from each other.In Table5it has been shown that little difference in the values of constant A produced different cipher text.

Table 5 .
Sensitivity of Constant A.It has been described that negligible changes in constant A produce fully different keys so cipher texts are also different from each other.In Table5it has been shown that little difference in the values of constant A produced different cipher text.

Table 5 .
Sensitivity of Constant A.It has been described that little changes in the initial condition Xn produces fully different keys, so cipher texts are completely different.This is known as confusion.In Table6it has been shown that little difference in values of initial variable

Table 6 .
Sensitivity of initial condition X n .

Table 6 .
Sensitivity of initial condition
over CA " ET CET´2C pat Different Message Sizesq ´ET CA pat Different MessageSizesq ET CA pat Different Message Sizesq Here G p = Overall % Gain at Different Message Sizes; ET = Encryption Time; CA = Chaotic Algorithm; CET-2C = Chaotic Map based Encryption Technique using 2's Compliment.% Gain of CET-2C over Chaotic Algorithm [3] when message size is 200 KB ET CET´2C pat Different Message Sizesq ´ET AES pat Different Message Sizesq ET AES pat Different Message Sizesq [3]rall % Gain of CET-2C over AES[3]for Encryption Time with increasing the message size G p of CET-2C over AES "
for Encryption Time with increasing message size.G p of CET-2C over CA " ET CET´2C pat Different Message Sizesq ´ET CA pat Different Message Sizesq ET CA pat Different Message Sizesq
CET-2C over CA1 " ET CET´2C pat Different Message Sizesq ´ET CA1 pat Different Message Sizesq ET CA1 pat Different Message Sizesq Here G p = Overall % Gain at Different Message Sizes; ET = Encryption Time; CA1 = Compared Algorithm 1; CET-2C = Chaotic Map based Encryption Technique using 2's Compliment.% Gain of CET-2C over Compared Algorithm 1 [17] when message size is 100,000 Bytes ET CET´2C pat Different Message Sizesq ´ET CA2 pat Different Message Sizesq ET CA2 pat Different Message Sizesq = Overall % Gain at Different Message Sizes; ET = Encryption Time; CA2 = Compared Algorithm 2; CET-2C = Chaotic Map based Encryption Technique using 2's Compliment.% Gain of CET-2C over compared Algorithm 1 [17] when message size is 100,000 Bytes

in Bytes/Sec Message Size in Bytes
[3]ain of CET-2C over Chaotic Algorithm[3]when message size is 50,000 bytes for Encryption Throughput with increasing the message size G p of CET-2C over CA " ETh CET´2C pat Different Message Sizesq ´ETh CA pat Different Message Sizesq ETh CA pat Different Message Sizesq
for Energy Consumption with increasing the message size.G p of CET-2C over CA " EC CET´2C pat Different Message Sizesq ´EC CA pat Different Message Sizesq EC CA pat Different Message Sizesq Here G p = Overall % Gain at Different Message Sizes; EC = Energy Consumption; CA = Chaotic Algorithm.% Gain of CET-2C over Chaotic Algorithm [3] when message size is 200 KB