Development of some encryption algorithms using chaotic functions: An example of chaos based information security