Research Article Open Access

Performance Evaluation of Chaotic Encryption Technique

Ancy Mariam Babu1 and K. John Singh1
  • 1 School of Information Technology and Engineering, VIT University, Vellore, Tamil Nadu, India


Drastic growth in multimedia communication resulted to numerous security issues in the transmission of data. Moreover, the network used for the digital communication does not provide much security for the data transfer. During this time, tens of millions people using the internet options for essential communication and is being a tool for commercial field increased, So that security is an enormously important issue to deal with. We need to be protected confidentiality of data and provide secure connections for it. Hence we necessitate recognizing the different aspects of security and their applications. Many of these applications ranging from secure commerce, protecting passwords or pin and payments to private communications. As we know that, Cryptography is now becoming an essential aspect of the secure communication. Cryptography is the science of writing secret code with confident algorithm and key. The basic components of cryptography are encryption and decryption algorithms, digital signature and hashed message authentication code. We know that encryption is the synonym of cryptography. Different kinds of encryption are used in this modern era. Chaotic encryption is the type of the encryption which has adopted the concept of chaos. In this study, we are studying the history of cryptography until chaotic cryptography and analyzing the performance of chaotic encryption technique. The evaluation is performed in terms of encryption speed, the CPU utilization with time and the battery power consumption. The experimental results are specified the efficiency of the algorithms.

American Journal of Applied Sciences
Volume 10 No. 1, 2013, 35-41


Submitted On: 5 November 2012 Published On: 8 January 2013

How to Cite: Babu, A. M. & Singh, K. J. (2013). Performance Evaluation of Chaotic Encryption Technique. American Journal of Applied Sciences, 10(1), 35-41.

  • 5 Citations



  • Chaotic Encryption
  • Chaotic Video Encryption Scheme
  • Non-Linear Chaotic Algorithm
  • Escrowed Encryption Scheme
  • Scaleable Encryption Algorithm