Statement of Research Topic: Chaos-Based Secure Communication THANG MANH HOANG A. Overview Over the last few decades, communication systems have been developed rapidly to meet the increasing human needs. Those are not only in the variety of services, but also in quality of services. Hence, the conventional fundamentals of communication techniques have been faced with strict challenges such as the increase in transmission rate and in privacy. For a band wide requirement, optical systems offer a transmission about terabits per seconds in the distance of hundreds of kilometers, and wireless systems can support the services required the rate of hundreds megabits per second. It can be regarded that the most of available services can be run reliably. However, such transmission rates have not reached natural ones yet, and will be exhausted by some future services such as multimedia and others. Moreover, conventional modulation techniques are mostly based on periodic signals. As a result, the system security can not be deployed on the physical layer due that periodic signals are easily detected by eavesdroppers. For that reason, mathematic algorithms such as RAS, DES and so on are developed to maintain the systems secure. With the hope of improving bit rate as well as security, applications of nonlinear dynamics in communication have received much interest and become an active area of research. Recent years, researchers working on the nonlinear field have developed some novel modulation methods [1]-[5] which utilize non-periodic signals. More specifically, a group of logical bits can be represented by a piece of a non-periodic signal or by a sequence of real values which are generated by dynamical systems [6]. The advantage offering by such methods is that non-periodic signals are produced easily by some nonlinear circuits. In addition, security of communication systems [7] can be assured if highly-dimensional chaotic systems as well as appropriate modulation schemes are employed. My research concentrates on (i) investigation on synchronous regimes of dynamical systems which present potential applications in communications, (ii) application of synchronization of chaotic systems in communications including chaotic modulation techniques and security, and (iii) implement chaotic communication systems on VLSI. B. Background Since Pecora and Caroll introduced the model of synchronization of dynamical systems [8], there has been several synchronization models proposed and pursued [9]-[13]. Roughly speaking, one chaotic system (plays a role of master) sends a driving signal to other system(s) (plays a role of slave(s)) to establish the synchronous regime. As a result, their chaotic trajectories remain in step with each other during temporal evolution. In practical, models of synchronization of dynamical systems has been utilized in many fields, i.e. lasers [14][15], biological [16][17], control [18], etc. Recently, one of applications of synchronization has been investigated actively is in communications [6][19][20]. More specifically, synchronization of chaotic systems is applied to design chaotic secure communication systems and to propose new transmission methods. For the application of synchronization of dynamical systems in transmission, there are several models proposed to modulate the information signal on chaotic signal, i.e. multiplicative [1] and parametric [2][3] modulations, additive masking [2], chaos shift keying (CSK) [4], synchronization-manifold shift keying [5]. For a short period of development, chaotic communications has shown a potential alternative for conventional one. However, one of disadvantages of chaotic communication is the robustness. A chaotic signal is easy to be distorted by noise when it is sent via a noise channel. As a result, BER of proposed models is slightly low in compared with that of conventional ones. Recently, some new improvement in BER has been reported [21] with orthogonal-CSK. For the security application of synchronization of dynamical systems, there are many models proposed [22] in different ways but they has been broken thereafter. Anyway, a secure system must be based on existing modulation methods, and some schemes are used to hide the information in chaotic signals. So far, there are two categories of methods used to unmask message signal in chaotic secure communication systems, i.e. characteristic-based [23]-[26] and identification-based [27][28]. Characteristic-based methods are analyzed different features of transmitted signals to extract message signal without knowing the detail of chaotic system at the transmitter. In contrast to Characteristic-based methods, identification-based ones require knowing the structure of chaotic dynamics of master system at the transmitter. Full detail about structure of master can be found by some reconstruct methods by observing transmitted signals. Therefore, security of chaotic communication is considered by two main points in a secure communication system. First of all, chaotic system playing as master at the transmitter should exhibit complex dynamics (high dimension). Typically, one of choices is delay systems which create very highly-dimensional dynamics [29]. For second point, it is that the transmitter should produce and send a complex signal. Complexly transmitted signal sent on the channel make eavesdroppers difficult in reconstructing processes. In practical, observer-based synchronization schemes [30] allow to produce complex signals for modulation process. In conclusion, chaos synchronization has been applied in communication, but in fact there are numerous issues which have not been addressed yet, i.e. improving for the performance of proposed systems and making them suitable for various transmission environments of radar, ultra wide band, and CDMA systems, etc. Reference [1] G. Kolumban, M. P. Kennedy and L. O. Chua: IEEE Trans. CAS I 45 (1998), pp. 1129. [2] K. M. Cuomo and A. V. Oppenheim: Phys. Rev. Lett. 71 (1993), pp. 65. [3] U. Parlitz, L. O. Chua, L. Kocarev, K. S. Halle and A. Shang: Int. J. Bifurcation and Chaos 2 (1992), pp. 973. [4] H. Dedieu, M. P. Kennedy and M. Hasler: IEEE Trans. CAS II 40 (1993), pp. 634. [5] T. M. Hoang and M. Nakagawa, “New Encoding Model for Chaos-Based Secure Communication”, J. Phys. Soc. Jpn. vol.75, (2006), pp. 034801. [6] F. C. M. Lau, C. K. Tse: Chaos-Based Digital Communication Systems, (Springer-Verlag, Berlin Heidelberg, 2003) [7] S. Li, G. A’lvarez, G. Chen, and X. Mou, “Breaking a Chaos-noise-based Secure Communication Scheme”, Chaos, vol. 15 (2005), pp. 013703 [8] L. M. Pecora and T. L. Carroll: Phys. Rev. Lett. 64 (1990) 821 [9] N. F. Rulkov, M.M. Sushchik and L.S. Tsimring: Phys. Rev. E 51 (1995) 980 [10] R. Mainieri and J. Rehacek: Phys. Rev. Lett. 82 (1999), 3042 [11] M. G. Rosenblum, A. S. Pikovsky and J. Kurths: Phys. Rev. Lett 76 (1996), 1804 [12] M. G. Rosenblum, A. S. Pikovsky and J. Kurths: Phys. Rev. Lett. 78 (1997) 4193 [13] H. U. Voss: Phys. Rev. E 61 (2000) 5115 [14] L. Fabiny, P. Colet, R. Roy and D. Lenstra: Phys. Rev. A 47 (1993) 4287 [15] R. Roy and K. S. Thornburg: Phys. Rev. Lett. 72 (1994) 2009 [16] R. C. Elson, A. I. Selverston, R. Huerta, N. F. Rulkov, M. I. Rabinovich and H. D. I. Abarbanel: Phys. Rev. Lett. 81 (1998) 5692 [17] S. K. Han, C. Kurrer and Y. Kuramoto: Phys. Rev. Lett. 75 (1995) 3190 [18] H.G.Schuster: Handbook of Chaos Control (Wiley-VCH, Weinheim, 1999) [19] T. Yang: Chaotic Communication Systems, (Nova Science, 2002) [20] M. P. Kennedy, R. Rovatti, G. Setti: Chaotic Electronics in Telecommunications, (CRC Press, 2000) [21] P. Chargé and D. Fournier-Prunaret, Proceedings of NOLTA 2006, Bologna-Italy, pp. 811-814 [22] T. Yang: Int. J. Computational Cognition 2 (2004) 81 [23] G. Perez and H. A. Cerdeira: Phys. Rev. Lett. 74 (1995) 1970. [24] T. Yang, L.-B. Yang and C.-M. Yang: IEEE Trans. Circuits Syst. I 45 (1998) 1062. [25] T. Yang, L.-B. Yang and C.-M. Yang: Phys. Lett. A 247 (1998) 105. [26] T. Yang: Int. J. Circuit Theory Appl. 23 (1995) 611. [27] V. I. Ponomarenko and M. D. Prokhorov: Phys. Rev. E 66 (2002) 026215. [28] C. Zhou and C.-H. Lai: Phys. Rev. E 60 (1999) 320. [29] J. D. Farmer: Physica D 4 (1982) 366. [30] G. Grassi and S. Mascolo, IEEE Trans. CAS II, vol. 46 (1999), 478