{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:45:08Z","timestamp":1762004708757,"version":"build-2065373602"},"reference-count":62,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2015,3,19]],"date-time":"2015-03-19T00:00:00Z","timestamp":1426723200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have become a topic of active research in computer science and network security such as robotic systems, encryption, and communication. The main aim of deploying a chaos-based cryptosystem is to provide encryption with several advantages over traditional encryption algorithms such as high security, speed, and reasonable computational overheads and computational power requirements. These challenges have motivated researchers to explore novel chaos-based data encryption techniques with digital logics dealing with hiding information for fast secure communication networks. This work provides an overview of how traditional data encryption techniques are revised and improved to achieve good performance in a secure communication network environment. A comprehensive survey of existing chaos-based data encryption techniques and their application areas are presented. The comparative tables can be used as a guideline to select an encryption technique suitable for the application at hand. Based on the limitations of the existing techniques, an adaptive chaos based data encryption framework of secure communication for future research is proposed<\/jats:p>","DOI":"10.3390\/e17031387","type":"journal-article","created":{"date-parts":[[2015,3,19]],"date-time":"2015-03-19T10:38:57Z","timestamp":1426761537000},"page":"1387-1410","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing"],"prefix":"10.3390","volume":"17","author":[{"given":"Piyush","family":"Shukla","sequence":"first","affiliation":[{"name":"Computer Science & Engineering, University Institute of Technology, RGPV, Bhopal, Airport Bypass Road, Gandhi Nagar, Bhopal 462033, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ankur","family":"Khare","sequence":"additional","affiliation":[{"name":"Computer Science, Government Women's Polytechnic College, Sehore 462033, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Murtaza","family":"Rizvi","sequence":"additional","affiliation":[{"name":"National Institute of Technical Teachers' Training and research, Shamla Hills, Bhopal 462001, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shalini","family":"Stalin","sequence":"additional","affiliation":[{"name":"AISECT, Scope Campus, Nh-12, Near Misrod,Hoshangabad Road, Bhopal 462047, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sanjay","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Information Technology, National Institutes of Technology, Raipur 492010, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2015,3,19]]},"reference":[{"key":"ref_1","unstructured":"Blackledge, J.M. Available online: http:\/\/konwersatorium.pw.edu.pl\/wyklady\/2010_VLZ7_02_wyklad.pdf."},{"key":"ref_2","unstructured":"Guo, X., and Zhang, J. Cryptanalysis of the Chaotic-based Key Agreement Protocols."},{"key":"ref_3","first-page":"170","article-title":"A new joint lossless compression and encryption scheme combining a binary arithmetic coding with a pseudo random bit generator","volume":"8","author":"Masmoudi","year":"2010","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1145\/219717.219797","article-title":"Principles and Applications of Chaotic System","volume":"38","author":"Ditto","year":"1995","journal-title":"Comm. ACM."},{"key":"ref_5","unstructured":"Zhang, B., and Jin, C. Cryptanalysis of a Chaos-based Stream Cipher."},{"key":"ref_6","first-page":"551","article-title":"A Chaotic Encryption Scheme for Real-Time Embedded Systems: Design and Implementation","volume":"52","author":"Pande","year":"2013","journal-title":"Telecommun. Syst."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1016\/S1007-0214(11)70030-X","article-title":"Block Cipher Design: Generalized Single-Use-Algorithm Based on Chaos","volume":"16","author":"Geng","year":"2011","journal-title":"Tsinghua Sci. Tech."},{"key":"ref_8","unstructured":"Pan, J., Ding, Q., and Qi, N. The Research of Chaos-based SMS Encryption in Mobile Phone."},{"key":"ref_9","first-page":"219","article-title":"A New Chaotic Encryption Algorithm to Enhance the Security of ZigBee and Wi-Fi networks","volume":"2","author":"Bakhache","year":"2011","journal-title":"Int. J. Intell. Comput. Res."},{"key":"ref_10","unstructured":"Bakhache, B., Ahmad, K., and el Assad, S. Chaos Based Improvement of the Security of ZigBee and Wi-Fi Networks Used for Industrial Controls."},{"key":"ref_11","unstructured":"Chen, C.K., and Lin, C.L. Text Encryption Using ECG signals with Chaotic Logistic Map."},{"key":"ref_12","unstructured":"Elkamshoushy, D.H., and Aboulsoud, A.K. Cryptographic Schemes Using Chaotic System."},{"key":"ref_13","unstructured":"Curiac, D.I., Iercan, D., Dranga, O., Dragan, F., and Banias, O. Chaos-Based Cryptography: End of the Road?."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1142\/S0218127405012260","article-title":"Cryptanalysis of Observer Based Discrete-Time Chaotic Encryption Schemes","volume":"15","author":"Solak","year":"2005","journal-title":"Int. J. Bifurcat. Chaos Appl. Sci. Eng."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/S0016-0032(00)00087-9","article-title":"Use of chaotic dynamical systems in cryptography","volume":"338","author":"Schmitz","year":"2001","journal-title":"J. Franklin Inst."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Palacios, A., and Juarez, H. (2002). Cryptography with cycling chaos. Phys. Lett., 345\u2013351.","DOI":"10.1016\/S0375-9601(02)01323-3"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"6922","DOI":"10.1016\/j.physleta.2008.10.022","article-title":"Cryptanalysis of a cryptosystem based on discretized two-dimensional chaotic maps","volume":"372","author":"Solak","year":"2008","journal-title":"Phys. Lett."},{"key":"ref_18","unstructured":"Linda, F.R., Hammami, S., Benrejeb, M., and Borne, P. Synchronization of Discrete-Time Hyperchaotic Maps Based on an Aggregation Technique for Encryption."},{"key":"ref_19","unstructured":"Babu, G.S., and Ilango, P. Higher Dimensional Chaos for Audio Encryption. 52\u201358."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/81.904880","article-title":"Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps","volume":"48","author":"Jakimoski","year":"2001","journal-title":"IEEE Trans. Circ. Syst. Fund. Theor. Appl."},{"key":"ref_21","unstructured":"Tang, G., Liao, X., Xiao, D., and Li, C. A Secure Communication Scheme Based on Symbolic Dynamics."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/7384.963463","article-title":"Chaos-Based Cryptography: A Brief Overview","volume":"1","author":"Kocarev","year":"2001","journal-title":"IEEE Circ. Syst. Mag."},{"key":"ref_23","first-page":"1248","article-title":"Lorenz-Based Chaotic Secure Communication Schemes","volume":"7","author":"Kamil","year":"2008","journal-title":"Ubiq. Comput. Commun. J"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Sobhy, M.I., and Shehata, A.R. Chaotic Algorithm for Data Encryption. 997\u20131000.","DOI":"10.1109\/ICASSP.2001.941085"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Mansour, I., Chalhoub, G., and Barkhache, B. Evaluation of a fast symmetric cryptographic algorithm based on the chaos theory for wireless sensor networks. 913\u2013919.","DOI":"10.1109\/TrustCom.2012.154"},{"key":"ref_26","unstructured":"Wei, J., Zheng, J., Yu, J., and Shuai, Y. Selection of Chaotic States in Cryptosystem Based on Chaos with Differential Analysis."},{"key":"ref_27","unstructured":"Wei, J., Shuai, Y., and Yu, J. Cryptography with Two Discretized Chaotic Maps."},{"key":"ref_28","unstructured":"Wei, J., Zheng, J., Yu, J., and Shuai, Y. Application of Unicity distance in a cryptosystem based on chaos."},{"key":"ref_29","unstructured":"Luo, J., and Shi, H. Research of Chaos Encryption Algorithm Based on Logistic Mapping."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.physleta.2007.02.021","article-title":"Theory and practice of chaotic cryptography","volume":"366","author":"Amigo","year":"2007","journal-title":"Phys. Lett."},{"key":"ref_31","unstructured":"Kocarev, L., Amigo, J.M., and Szczepanski, J. Chaos-based Cryptography: an overview."},{"key":"ref_32","first-page":"122","article-title":"Public key cryptosystems based on chaotic Chebyshev polynomials","volume":"1","author":"Prasadh","year":"2009","journal-title":"J. Eng. Tech. Res."},{"key":"ref_33","unstructured":"Wei, J., Zheng, X., Yu, J., and Shuai, Y. A Novel Authentication Scheme Based on Chaos."},{"key":"ref_34","first-page":"1193","article-title":"Embedding Compression in Chaos-Based Cryptography","volume":"55","author":"Wong","year":"2008","journal-title":"IEEE Trans. Circ. Syst."},{"key":"ref_35","first-page":"146","article-title":"Simultaneous Arithmetic Coding and Encryption Using Chaotic Maps","volume":"57","author":"Wong","year":"2010","journal-title":"IEEE Trans. Circ. Syst."},{"key":"ref_36","unstructured":"Rani, P.J., and Bhavani, S.D. Symmetric Encryption using Logistic Map."},{"key":"ref_37","unstructured":"Assad, S.E. Chaos Based Information Hiding and Security."},{"key":"ref_38","unstructured":"Sheng, S., and Wu, X. A New Digital Anti-counterfeiting Scheme Based on Chaotic Cryptography."},{"key":"ref_39","unstructured":"Kartalopoulos, S.V. Chaotic Quantum Cryptography: The Ultimate for Network Security."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1016\/j.cnsns.2007.10.011","article-title":"A block encryption algorithm based on dynamic sequences of multiple chaotic systems","volume":"14","author":"Yuan","year":"2009","journal-title":"Comm. Nonlinear. Sci. Numer. Simulat."},{"key":"ref_41","unstructured":"Xiao, Y.P., and Han, Y. An Encrypt Approach Using Dynamic Encrypt Keys."},{"key":"ref_42","unstructured":"Zhang, Z., Liu, K., Niu, X., and Bai, X. The Research of Hardware Encryption Card Based on Chaos."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"5588","DOI":"10.1016\/j.physleta.2008.06.066","article-title":"Determination of the Parameters for a Lorenz System and Application to Break the Security of Two-channel Chaotic Cryptosystems","volume":"372","author":"Orue","year":"2008","journal-title":"Phys. Lett."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"2533","DOI":"10.1109\/JLT.2013.2267891","article-title":"Optical Image Encryption Based on Chaotic Baker Map and Double Random Phase Encoding","volume":"31","author":"Elshamy","year":"2013","journal-title":"J. Lightwave Tech."},{"key":"ref_45","first-page":"1","article-title":"Survey Report on Chaos Based Cryptography","volume":"2","author":"Agrawal","year":"2012","journal-title":"Int. J. Appl. Sci. Eng. Tech."},{"key":"ref_46","unstructured":"Aimone, B., and Larson, S. Available online: http:\/\/edrf.ucsd.edu\/neurophysics\/courses\/physics_173_273\/AimoneLarsonChaos.pdf."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1199","DOI":"10.1016\/S0960-0779(00)00089-8","article-title":"Adaptive synchronization of uncertain chaotic systems via backstepping design","volume":"12","author":"Wang","year":"2001","journal-title":"Chaos Solitons Fractals."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"1688","DOI":"10.1109\/TIFS.2013.2259819","article-title":"An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos","volume":"8","author":"Peng","year":"2013","journal-title":"IEEE Trans. Inf. Foren. Sec."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/S0375-9601(00)00642-3","article-title":"Cryptanalysis of a Chaotic Encryption System","volume":"276","author":"Alvarez","year":"2000","journal-title":"Phyc. Lett."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","article-title":"Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems","volume":"16","author":"Alvarez","year":"2006","journal-title":"Int. J. Bifurcat. Chaos Appl. Sci. Eng."},{"key":"ref_51","unstructured":"Kelber, K., and Schwarz, W. General Design Rules for Chaos-Based Encryption Systems."},{"key":"ref_52","first-page":"1057","article-title":"A Two-Channel Secure Communication Using Fractional Chaotic Systems","volume":"41","author":"Sheu","year":"2010","journal-title":"Proc. World Acad. Sci. Eng. Tech."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Azzaz, M.S., Tanougast, C., Sadoudi, S., and Dandache, A. New Hardware Cryptosystem Based Chaos for the Secure Real-Time of Embedded Applications. 251\u2013254.","DOI":"10.1109\/SiPS.2011.6088984"},{"key":"ref_54","first-page":"58","article-title":"Low-complexity chaotic encryption system","volume":"53","author":"Beltran","year":"2007","journal-title":"Revista Mexicana De Fisica."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/S0375-9601(01)00612-0","article-title":"Improving Security of a Chaotic Encryption Approach","volume":"290","author":"Li","year":"2001","journal-title":"Phys. Lett."},{"key":"ref_56","unstructured":"Li, S., Alvarez, G., Li, Z., and Halang, W.A. Analog Chaos-based Secure Communications and Cryptanalysis: A Brief Survey."},{"key":"ref_57","first-page":"4635","article-title":"A Chaos based Multiple Security Encryption system for Compressed Video","volume":"7","author":"Hong","year":"2011","journal-title":"Int. J. Innov. Comput. Inf. Control."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/ijcses.2012.3303","article-title":"Complete Synchronization of Hyperchaotic Xu and Hyperchaotic Lu Systems via Active Control","volume":"3","author":"Vaidyanathan","year":"2012","journal-title":"Int. J. Comput. Sci. Eng. Survey."},{"key":"ref_59","first-page":"81","article-title":"A Survey of Chaotic Secure Communication Systems","volume":"2","author":"Yang","year":"2004","journal-title":"Int. J. Comput. Cognit."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"1319","DOI":"10.1142\/S0218127493001070","article-title":"Secure Communications via Chaotic Synchronization II: Noise Reduction by Cascading Two Identical Receivers","volume":"3","author":"Lozi","year":"1993","journal-title":"Int. J. Bifurcat. Chaos Appl. Sci. Eng."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1109\/TNNLS.2012.2236356","article-title":"Sampled-Data Synchronization of Chaotic Lur\u2019e Systems with Time Delays","volume":"24","author":"Wu","year":"2013","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"1306","DOI":"10.1109\/TCOMM.2003.815058","article-title":"A New Chaotic Secure Communication System","volume":"51","author":"Li","year":"2003","journal-title":"IEEE Trans. Commun."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/17\/3\/1387\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T20:43:43Z","timestamp":1760215423000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/17\/3\/1387"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,19]]},"references-count":62,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2015,3]]}},"alternative-id":["e17031387"],"URL":"https:\/\/doi.org\/10.3390\/e17031387","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2015,3,19]]}}}