Application of chaotic maps in encryption algorithms