{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:19:33Z","timestamp":1760242773813,"version":"build-2065373602"},"reference-count":31,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2016,5,23]],"date-time":"2016-05-23T00:00:00Z","timestamp":1463961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Delays added by the encryption process represent an overhead for smart computing devices in ad-hoc and ubiquitous computing intelligent systems. Digital Logic Circuits are faster than other computing techniques, so these can be used for fast encryption to minimize processing delays. Chaotic Encryption is more attack-resilient than other encryption techniques. One of the most attractive properties of cryptography is known as an avalanche effect, in which two different keys produce distinct cipher text for the same information. Important properties of chaotic systems are sensitivity to initial conditions and nonlinearity, which makes two similar keys that generate different cipher text a source of confusion. In this paper a novel fast and secure Chaotic Map-based encryption technique using 2\u2019s Compliment (CET-2C) has been proposed, which uses a logistic map which implies that a negligible difference in parameters of the map generates different cipher text. Cryptanalysis of the proposed algorithm shows the strength and security of algorithm and keys. Performance of the proposed algorithm has been analyzed in terms of running time, throughput and power consumption. It is to be shown in comparison graphs that the proposed algorithm gave better results compare to different algorithms like AES and some others.<\/jats:p>","DOI":"10.3390\/e18050201","type":"journal-article","created":{"date-parts":[[2016,5,24]],"date-time":"2016-05-24T09:05:05Z","timestamp":1464080705000},"page":"201","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["An Intelligent and Fast Chaotic Encryption Using Digital Logic Circuits for Ad-Hoc and Ubiquitous Computing"],"prefix":"10.3390","volume":"18","author":[{"given":"Ankur","family":"Khare","sequence":"first","affiliation":[{"name":"Regional Institute of Education (RIE), Shyamla Hills, Bhopal 462001, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Piyush","family":"Shukla","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University Institute of Technology, RGPV, Bhopal 462033, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Murtaza","family":"Rizvi","sequence":"additional","affiliation":[{"name":"National Institute of Technical Teachers\u2019 and Research, Shyamla Hills, Bhopal 462001, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shalini","family":"Stalin","sequence":"additional","affiliation":[{"name":"AISECT University, Chiklod Road, Near Bangrasia Square, Dist. Raisen 464993, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2016,5,23]]},"reference":[{"key":"ref_1","first-page":"1865","article-title":"Digital Communication using a Novel Combination of Chaotic Shift Keying and Duffing Oscillators","volume":"9","author":"Zaher","year":"2013","journal-title":"Int. J. Innov. Comput. Inf. Control"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1007\/s11071-013-0987-4","article-title":"Designing chaotic S-boxes on time-delay chaotic system","volume":"74","author":"Ozkaynak","year":"2013","journal-title":"Nonlinear Dyn."},{"key":"ref_3","first-page":"17","article-title":"Performance Analysis of Chaotic Encryption using a Shared Image as a Key","volume":"28","author":"Fitwi","year":"2011","journal-title":"Zede J."},{"key":"ref_4","first-page":"280","article-title":"Query Processing Performance on Encrypted Databases by Using the REA Algorithm","volume":"14","author":"Mousa","year":"2012","journal-title":"Int. J. Netw. Secur."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1016\/j.cnsns.2007.10.011","article-title":"A block encryption algorithm based on dynamic sequences of multiple chaotic systems","volume":"14","author":"Yuan","year":"2009","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_6","first-page":"219","article-title":"A New Chaotic Encryption Algorithm to Enhance the Security of ZigBee and Wi-Fi networks","volume":"2","author":"Bakhache","year":"2011","journal-title":"Int. J. Intell. Comput. Res."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Mansour, I., Chalhoub, G., and Barkhache, B. (2012, January 25\u201327). Evaluation of a fast symmetric cryptographic algorithm based on the chaos theory for wireless sensor networks. Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK.","DOI":"10.1109\/TrustCom.2012.154"},{"key":"ref_8","unstructured":"Assad, S.E. (2012, January 10\u201312). Chaos Based Information Hiding and Security. Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, London, UK."},{"key":"ref_9","first-page":"1413","article-title":"Implementation of AES and RSA using Chaos System","volume":"4","author":"Agrawal","year":"2013","journal-title":"Int. J. Sci. Eng. Res."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Pan, J., Ding, Q., and Qi, N. (2012, January 8\u201310). The Research of Chaos-Based SMS Encryption in Mobile Phone. Proceedings of the Second International Conference on Instrumentation & Measurement, Computer, Communication and Control, Harbin, China.","DOI":"10.1109\/IMCCC.2012.124"},{"key":"ref_11","first-page":"58","article-title":"Low-complexity chaotic encryption system","volume":"53","author":"Beltran","year":"2007","journal-title":"Rev. Mex. Fis."},{"key":"ref_12","first-page":"1","article-title":"A novel parallel hash function based on 3D chaotic map","volume":"126","author":"Akhvan","year":"2013","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"ref_13","unstructured":"Linda, F.R., Hammami, S., Benrejeb, M., and Borne, P. (2012, January 20\u201323). Synchronization of discrete-time hyperchaotic maps based on an aggregation technique for encryption. Proceedings of the 9th International Multi-Conference on systems, Signals and Devices, Chemnitz, Germany."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.physleta.2007.02.021","article-title":"Theory and practice of chaotic cryptography","volume":"366","author":"Amigo","year":"2007","journal-title":"Phys. Lett. A"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/7384.963463","article-title":"Chaos-Based Cryptography: A Brief Overview","volume":"1","author":"Kocarev","year":"2001","journal-title":"IEEE Circuits Syst. Mag."},{"key":"ref_16","first-page":"465","article-title":"A new Secure Cryptography Algorithm based on Symmetric Key Encryption","volume":"3","author":"Soltani","year":"2013","journal-title":"J. Basic Appl. Sci. Res."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Wang, X., and Chen, D. (2013). A Parallel Encryption Algorithm based on the Piecewise Linear Chaotic Map. Math. Probl. Eng., 1\u20137.","DOI":"10.1155\/2013\/537934"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Wei, J., Zheng, J., Yu, J., and Shuai, Y. (2012, January 14\u201317). Selection of chaotic states in cryptosystem based on chaos with differential analysis. Proceedings of the 7th International Conference on Computer Science & Education, Melbourne, Australia.","DOI":"10.1109\/ICCSE.2012.6295084"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/TCSII.2010.2040315","article-title":"Simultaneous Arithmetic Coding and Encryption Using Chaotic Maps","volume":"57","author":"Wong","year":"2010","journal-title":"IEEE Trans. Circuits Syst."},{"key":"ref_20","first-page":"551","article-title":"A Chaotic Encryption Scheme for Real-Time Embedded Systems: Design and Implementation","volume":"52","author":"Pande","year":"2013","journal-title":"Telecommun. Syst."},{"key":"ref_21","unstructured":"Guo, X., and Zhang, J. (2008, January 23\u201324). Cryptanalysis of the Chaotic-based Key Agreement Protocols. Proceedings of the International Symposium on Biometrics and Security Technologies (ISBAST), Islamabad, Pakistan."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1016\/S1007-0214(11)70030-X","article-title":"Block Cipher Design: Generalized Single-Use-Algorithm Based on Chaos","volume":"16","author":"Zhao","year":"2011","journal-title":"Tsinghua Sci. Technol."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"181","DOI":"10.3390\/e17010181","article-title":"An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos Maps","volume":"17","author":"Tong","year":"2015","journal-title":"Entropy"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Soleymani, A., Nordin, M.J., and Sundararajan, E. (2014). A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map. Sci. World J.","DOI":"10.1155\/2014\/536930"},{"key":"ref_25","unstructured":"Wei, J., Zheng, X., Yu, J., and Shuai, Y. (2013, January 26\u201328). A novel authentication scheme based on chaos. Proceedings of the 8th International Conference on Computer Science & Education, Colombo, Sri Lanka."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Rani, P.J., and Bhavani, S.D. (2012, January 15\u201317). Symmetric Encryption using the logistic map. Proceedings of the 1st International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India.","DOI":"10.1109\/RAIT.2012.6194468"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Azzaz, M.S., Tanougast, C., Sadoudi, S., and Dandache, A. (2011, January 4\u20137). New Hardware Cryptosystem Based Chaos for the Secure Real-Time of Embedded Applications. Proceedings of the IEEE Workshop Signal Processing System SIPS, Beirut, Lebanon.","DOI":"10.1109\/SiPS.2011.6088984"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Sheng, S., and Wu, X. (2012, January 15\u201317). A New Digital Anti-counterfeiting Scheme Based on Chaotic Cryptography. Proceedings of the International Conference on ICT Convergence (ICTC), Jeju Island, Korea.","DOI":"10.1109\/ICTC.2012.6387119"},{"key":"ref_29","unstructured":"Zhang, Z., Liu, K., Niu, X., and Bai, X. (2013, January 18\u201319). The Research of Hardware Encryption Card Based on Chaos. Proceedings of The International Conference on Sensor Network Security Technology and Privacy Communication System (SNS & PCS), Nangang, Taiwan."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1387","DOI":"10.3390\/e17031387","article-title":"Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing","volume":"17","author":"Shukla","year":"2015","journal-title":"Entropy"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Shi, Z., Bi, S., Zhang, H., Lu, R., and Shen, X. (2013). Improved auxiliary particle filter-based synchronization of chaotic Colpitts circuit and its application to secure communication. Wirel. Commun. Mob. Comput., 1\u201315.","DOI":"10.1002\/wcm.2446"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/18\/5\/201\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T19:24:21Z","timestamp":1760210661000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/18\/5\/201"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,23]]},"references-count":31,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2016,5]]}},"alternative-id":["e18050201"],"URL":"https:\/\/doi.org\/10.3390\/e18050201","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2016,5,23]]}}}