28.01.2015 Views

Proceedings of Topical Meeting on Optoinformatics (pdf-format, 1.21 ...

Proceedings of Topical Meeting on Optoinformatics (pdf-format, 1.21 ...

Proceedings of Topical Meeting on Optoinformatics (pdf-format, 1.21 ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

SAINT-PETERSBURG, October 17 – 20, 2005 5<br />

SOME ASPECTS OF SECURITY OF CHAOS-BASED<br />

COMMUNICATIONS<br />

V. S. Udaltsov a , A. Locquet a,b , L. Larger a , J. P. Goedgebuer a , and D. S. Citrin a,b<br />

a GTL-CNRS TELECOM, UMR FEMTO-ST 6174, Georgia Tech Lorraine, 2-3 rue<br />

Marc<strong>on</strong>i, 57070 Metz, France<br />

b School <str<strong>on</strong>g>of</str<strong>on</strong>g> Electrical and Computer Engineering, Georgia Institute <str<strong>on</strong>g>of</str<strong>on</strong>g> Technology,<br />

Atlanta, Georgia 30332-0250, USA<br />

E-mail: udaltsov@georgiatech-metz.fr<br />

Chaotic dynamics ruled by delay-differential equati<strong>on</strong>s (DDE) and chaos-based<br />

communicati<strong>on</strong> systems are explored from the point <str<strong>on</strong>g>of</str<strong>on</strong>g> view <str<strong>on</strong>g>of</str<strong>on</strong>g> security. The<br />

problem <str<strong>on</strong>g>of</str<strong>on</strong>g> the identificati<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g> the time-delay is the main security aspect<br />

c<strong>on</strong>sidered here. It is shown that carefully chosen architectures <str<strong>on</strong>g>of</str<strong>on</strong>g> the chaotic<br />

transmitter can increase the degree <str<strong>on</strong>g>of</str<strong>on</strong>g> security.<br />

The idea to use a chaotic carrier and synchr<strong>on</strong>ized chaotic waveforms for secure<br />

communicati<strong>on</strong>s proposed originally in the beginning <str<strong>on</strong>g>of</str<strong>on</strong>g> the nineties was revised precisely<br />

in c<strong>on</strong>juncti<strong>on</strong> with security issues. Several papers dedicated to the security <str<strong>on</strong>g>of</str<strong>on</strong>g> chaotic<br />

cryptosystems have been published in the last years. In the very beginning, systems using<br />

low-dimensi<strong>on</strong>al chaotic carriers have been explored and broken successfully. Then, it was<br />

shown that even a high chaos complexity characterized by a large number <str<strong>on</strong>g>of</str<strong>on</strong>g> positive<br />

Lyapunov exp<strong>on</strong>ents, is not sufficient to ensure a high degree <str<strong>on</strong>g>of</str<strong>on</strong>g> security. This means that<br />

hyperchaotic cryptosystems can also be broken, as it was is shown in our paper [1] .<br />

We c<strong>on</strong>sider here optoelectr<strong>on</strong>ic cryptosystems ruled by delay-differential equati<strong>on</strong>s<br />

(a DDE in its simplest normalized form is known as Ikeda’s equati<strong>on</strong> [2] ). They are <str<strong>on</strong>g>of</str<strong>on</strong>g><br />

particular interest because they can produce highly complex chaos and, at the same time,<br />

are relatively easy to realize [3] . Message encoding is performed by a chaotic modulati<strong>on</strong><br />

technique [3] . Actually, the DDE-emitter represents a circuit with the feedback loop that<br />

includes a c<strong>on</strong>trolled source (for example, a tunable laser diode), a n<strong>on</strong>linear element (for<br />

example, a birefringent plate placed between two polarizers or an interferometer), and a<br />

detecting photodiode that c<strong>on</strong>verts optical signals to electrical <strong>on</strong>es and also limits the<br />

bandwidth <str<strong>on</strong>g>of</str<strong>on</strong>g> chaotic oscillati<strong>on</strong>s. In numerical models such a limitati<strong>on</strong> can be modeled<br />

by low- or band-pass filters [4] .<br />

If the topology <str<strong>on</strong>g>of</str<strong>on</strong>g> the system (the block-diagrams and the equati<strong>on</strong>s describing the<br />

dynamics <str<strong>on</strong>g>of</str<strong>on</strong>g> the system) is known to an eavesdropper (this assumpti<strong>on</strong> is usual for<br />

cryptanalysis), the rec<strong>on</strong>structi<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g> the parameters <str<strong>on</strong>g>of</str<strong>on</strong>g> the system allows decoding <str<strong>on</strong>g>of</str<strong>on</strong>g> the<br />

transmitted in<strong>format</strong>i<strong>on</strong>. The eavesdropper’s attack can be fulfilled with a real receiver that<br />

should be synchr<strong>on</strong>ized with the chaotic emitter [5] , or by numerical modeling <str<strong>on</strong>g>of</str<strong>on</strong>g> this<br />

receiver.<br />

In our previous article [1] , we have shown that the rec<strong>on</strong>structi<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g> all the parameters<br />

characterizing a hyperchaotic system with a single feedback loop c<strong>on</strong>taining a str<strong>on</strong>g<br />

n<strong>on</strong>linearity is possible, when the value <str<strong>on</strong>g>of</str<strong>on</strong>g> the time delay T is known or recovered. When<br />

there is no way to identify the time delay, the chaos-based communicati<strong>on</strong> system becomes<br />

difficult to break using the cryptanalysis techniques published in the literature. In that<br />

sense, the main problem for an eavesdropper is to recover T. Thus, we have c<strong>on</strong>centrated<br />

our attenti<strong>on</strong> <strong>on</strong> the problem <str<strong>on</strong>g>of</str<strong>on</strong>g> identifying the value <str<strong>on</strong>g>of</str<strong>on</strong>g> the time delay T.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!