We propose a scheme whereby a time domain fractional Fourier transform (FRFT) is used to post process the optical chaotic carrier generated by an electro-optic oscillator. The time delay signature of the delay dynamics is successfully masked by the FRFT when some conditions are satisfied. Meanwhile the dimension space of the physical parameters is increased. Pseudo random binary sequence (PRBS) with low bit rate (hundreds of Mbps) is introduced to control the parameters of the FRFT. The chaotic optical carrier, FRFT parameters and the PRBS are covered by each other so that the eavesdropper has to search the whole key space to crack the system. The scheme allows enhancing the security of communication systems based on delay dynamics without modifying the chaotic source. In this way, the design of chaos based communication systems can be implemented in a modular manner.
© 2014 Optical Society of America
Chaos based optical communication systems have attracted considerable attention due to their superiority [1, 2]. It is worth noting that most recent results reported in the literatures focus on electro-optic chaotic systems with delayed dynamics [3–9]. In these systems, the message security relies essentially on the difficulty of identifying the hardware parameters of chaotic transmitters. However, many different techniques have been proposed to estimate the parameters of chaotic system. Of all the parameters in delayed dynamical systems, time delay is of great importance, since it is the key to generate high dimensional chaotic signals which is the foundation of chaos based communications. An effective type of attack is to recover the time delay by using some statistical methods, such as autocorrelation function (ACF), delayed mutual information (DMI), extrema statistics and filling factor [10–13]. On the other hand, since U. Parlitz suggested exploiting the adaptive synchronization of chaotic systems to solve parameter estimation problem, various synchronization-based schemes have been studied by researchers [14–16].
To resist these attacks, several methods attempt to conceal the delay signature by adjusting the delay time itself. In , the delay time is chosen to be close to the laser relaxation period. However, chaos complexity is weak in this regime. Moreover, in , it has been demonstrated that the delay signature can still be retrieved from the phase time series, even in the presence of noise. Time delay modulation  has also been considered as a theoretically feasible way to prevent the time delay extraction, but it is difficult to implement practically. These methods are also threatened by synchronization-based parameter identification methods . Therefore efforts have been made to modify the system structure. A cross feedback configuration is introduced in semiconductor ring lasers . With such a feedback, the time delay signature can be eliminated both in the intensity and the phase dynamics. In , the time delay is successfully hidden by combining all-optical and electro-optical schemes. Another currently effective method is proposed by R. M. Nguimdo, et al. [8, 9]. Both serial and parallel configurations of the electro-optic phase chaos system with two feedback loops have been considered in their schemes. An external PRBS was mixed within the chaotic carrier to perform time delay concealment.
In this paper, we propose an alternative way to enhance the secure strategy for electro-optic chaotic system by using a post-processing technique, without modifying the chaotic source. Similar concept has been proposed in . A non-linear, non-invertible transmission function (implemented by a Mach-Zehnder (MZ) modulator) is used to improve the security of chaotic signal. Although time delay concealment is not one of the concerns in the literature, it gives us an inspiration. In our scheme, the transform adopted should be invertible, since a non-invertible transform may have some difficulties in synchronization. Another concern is that the transform should be an encryption transform. Otherwise the original chaotic carrier will easily be obtained by an illegal receiver. At last, the transform should be implementable in optical field.
Motivated by the above discussion, we found that the FRFT in time domain fits our requirements perfectly. FRFT has been widely used in signal processing and image encryption [24–29]. Thanks to the principle of space-time duality theory , FRFT becomes a new way to analyze and process optical time signals [28, 29]. In this work we introduce, time domain FRFT is used as an encryption transform to post process the electro-optical chaotic carrier. As we will show below, when certain conditions are satisfied, the time delay signature can be masked perfectly. Last but not least, PRBS is also introduced in our scheme. It is noteworthy that the PRBS is not necessary for time delay mask, which makes our method conceptually different from the method proposed in , but still, it is indispensable for resisting brute force attack.
2. System setup
Here we propose a configuration built on electro-optic chaotic system and time domain FRFT. The proposed setup is illustrated in Fig. 1. Both the transmitter and the receiver consist of an electro-optic chaotic system and a FRFT (IFRFT) module, connected in serial. In the electro-optic chaotic system , a continuous-wave (CW) laser diode (LD) at the telecom wavelength of 1550 nm is seeded to a MZ modulator whose radio-frequency (RF) and direct-current (DC) half-wave voltages are Vπ and Vπdc. After an optical coupler (OC) and an optical fiber delay line (DL) of delay time TD, the optical signal is detected by a photodiode (PD). Before fed back into the MZ modulator, the generated electrical signal is amplified by a RF driver. Intransmitter, the message is added inside the loop by the OC. And in receiver, the message is obtained via canceling the chaotic carrier. The dynamical modeling of chaotic system in the transmitter and the receiver can be described in Eqs. (1) and (2), which were proposed and studied in [4–7].Eqs. (1) and (2), x1,2(t) = πV1,2(t)/2Vπ, V1,2(t) are the input voltages for the MZ electrode. m(t) is the message signal, β is the feedback strength of the loop, is the offset phase, τ and θ are the characteristic response times of the loop, and TC is the propagation time of light between the transmitter and receiver.
FRFT is a generalization of the Fourier transform, and can be seen as the projection of a given signal between time and frequency axis. Next, let us consider the implementation of the FRFT in time domain. The FRFT of a given signal x(t) is defined as
The FRFT (IFRFT) module consists of a phase modulator and two dispersive elements, as shown in Fig. 2. The FRFT (IFRFT) has a negative (positive) second order dispersion coefficient for the dispersive media and positive (negative) drive voltage for the phase modulator. The function of parabolic phase modulator can be written as
According to the principles and theoretical analysis reported in , let the relationships between c1, S and the fractional order p be
The quadratic phase modulation can be approached by a sinusoidal phase modulation. Consider a sinusoidal waveform cos(ωmt), where ωm = 2πfm, fm is the frequency of the sinusoidal waveform. Tw = 1/fm is the time window of the transform. The sinusoidal signal can be expressed by the Taylor expansion asEqs. (4) and (10), the drive voltage should beEqs. (9) and (11), the drive voltage can be expressed by
To analyze the security performance of the chaotic carrier after being processed by the FRFT, we consider that no message is added into the loop. The FRFT is used as a post-processing module in our scheme. Therefore it is independent to the delay dynamics. It can be seen as a “black box” to the input signal. As a result, the time delay signature of the input signal is eliminated in the output signal. The message amplitude is usually attenuated with respect to the carrier in order to be masked effectively. So whether the message signal is added into the chaotic dynamics will not affect the transformation as well as the simulation results.
The main parameters of the electro-optic chaotic system and the FRFT used in our simulations are given in Table 1.
3. Time delay mask
As stated before, statistical analysis and synchronization-based parameter estimation are the most competitive methods for breaking the delayed-chaotic systems. First we focus on the statistical analysis. These techniques, such as the ACF and the DMI, can be used to identify the time delay, which is a key parameter for the security of electro-optic chaotic systems. For a time series v(t), the ACF C(s) is defined as
Figures 3(a) and 3(b) display that the chaotic time series have a clear time delay signature before being transformed: obvious peaks appear in both the ACF and the DMI at s = TD as expected. Then we set the order of FRFT as p = 1. The time window of the transform Tw is varied from 0.1ns to 4ns. Interestingly, we found that distinguishable peaks appear in ACF and DMI at s = TD on condition that TD = MTw, where M is an integer. For example, Tw = 0.1ns(M = 310), 0.2ns(M = 155), 0.5ns(M = 62), 1ns(M = 31), etc. Without loss of generality, Figs. 3(c)–3(f) show the ACF and DMI when Tw = 0.9ns and 1ns respectively. When TD≠MTw, peaks only appear at s = Tw and its multiples. The mechanism behind this phenomenon is that when TD≠MTw, the statistical feature of the chaotic signal in t and t + TD is masked by the windowing transformed waveform, the original delay properties are distorted in time axis. Next, we consider the acceptable range of fractional order p. Figures 4(a) and 4(b) show the size of peaks found in C(s) and D(s) at s = TD and s = Tw as a function of the absolute value of p, the peak size in ACF and DMI at s = γ is defined asFigs. 4(a) and 4(b), when 0.8<|p|, the delay feature is completely masked. It is important that the condition of TD≠MTw should be maintained when varying the value of p. According to our simulations, if TD = MTw, the time delay signature cannot be masked regardless of the value of p. Therefore the conditions of TD≠MTw and 0.8<|p| should be satisfied simultaneously. Another natural concern is whether the spectrum and dimensionality of the chaotic system affect the hiding behavior. According to the theoretical and experimental analyses in literatures [5–7], the spectrum and dimensionality are related to the feedback strength β under current setup. When the time delay TD is away from the characteristic time and the feedback strength β is larger than 3.5, the system enter the chaotic zone, and the upper bound of β is restricted by physical devices. So we varying the feedback strength β from 2.5 to 8 in our simulations, it turns out that the hiding behavior of time delay is not affected and the results are similar to those shown in Figs. 3 and 4. On the other hand, the parameters of FRFT are mainly restricted by the physical devices. For the dispersion media, fiber bragg grating (FBG) is a good candidate. The range of dispersion adjustment could reach up to 2000ps/nm, and this range can be enlarged by cascading multiple FBGs. The precision of the dispersion adjustment could reach up to 2ps/nm. The value of Tw is mainly restricted by the frequency of the drive voltage , and the range can easily be from hundreds of ps to several ns. In our simulations, S∈[300, 4000]ps2 and Tw∈[0.1, 4]ns are considered, and the results show that the masking conditions are not affected obviously (the threshold of |p| may be slightly different from 0.8).
Several theoretical and experimental analyses have demonstrated the influence of chaotic parameters to synchronization [30–33], and the channel dispersion can be compensated by using dispersion-compensating fiber (DCF) or dispersion-shifted fiber (DSF). This problem has also been investigated comprehensively in the literature . So we only focus on the FRFT here. We use the root-mean square synchronization error to quantify the quality of chaos synchronization, which is defined asFigures 5(a) and 5(b) display the sensitivity of synchronization with respect to fractional order p and dispersion S respectively. σ grows fast from 0 when the fractional order p’ and dispersion S’ in the IFRFT are different from p and S in the FRFT. More important, we found that when the time window of the IFRFT (Tw’) in receiver has a slight difference with the time window of FRFT (Tw) in transmitter, the instant synchronization error |δ(t)|/<|x1(t)|> increase very fast along with time as shown in Fig. 5(c), which indicates that the synchronization degrades rapidly. This is because when there exists a mismatch of time window between the transmitter and receiver, an inevitable accumulation error of synchronization is produced over time due to the unmatched clock. For a legal receiver, the clock should be synchronize with the transmitter, and this can be achieved by extracting a clock from the decoded message signal. Similar technique has been used in optical OFDM system based on time domain Fourier transform . Thus the chaos synchronization error will not accumulate over time and remains in an acceptable range. However, for a illegal receiver, such clock synchronization could be very hard to achieve in absence of the message.
The analyses above indicate that the original chaotic carrier of the transmitter is unacquirable without knowing the parameters of FRFT in transmitter, which makes synchronization based parameter estimation difficult to perform. And if an eavesdropper can only get the transmitted signal (the output of the FRFT), the individual will not be able to crack the parameters of the transformation without the input.
5. The role of PRBS
At last, we discuss the role of PRBS in our scheme. As stated before, when certain conditions are satisfied (TD≠MTw, 0.8<|p|), time delay signature can be mask by the FRFT. However, we could not ignore the fact that the information of Tw is exposed, which will cause potential security vulnerabilities. To overcome this drawback, an effective way is to vary the time window and the fractional order by using external PRBS, which will introduce another degree of freedom to enhance the security of the system.
To realize this, we only need to vary fm and c1 along with time. Since the second order dispersion S is fixed and f0 can be chosen arbitrary, given an expected p, f0 can be calculated through Eq. (7) and c1 can be obtained by Eq. (6). Such implementation only needs one additional processing: varying the drive voltage for phase modulator, which will not cause remarkable system complexity. The updating period of Tw and p should be smaller than TD, since the statistical analyses against the time delay needs at least a time series with a length larger than TD. In our simulation, four different Tws (0.25ns, 0.35ns, 045ns, and 0.55ns) and four ps (0.8, 1.0, 1.2 and 1.4) are chosen and controlled by two series of external PRBS in each side, and the mathematical model can be described asFigs. 6(a) and 6(b). The updating period is set as 20ns, and the total bit rate of the two PRBS are 100Mbps accordingly. Note that with the time window and fractional order switched by the PRBS, the signature of TD is eliminated in ACF and DMI, as well as Tw.
To further explain the role of PRBS in our scheme, let us consider the following attack scenario: if the parameters of the FRFT are chosen carefully (let TD≠MTw) and remain unchanged over time, an eavesdropper may still crack the time-delay by “random guess” method. The attacker could perform the IFRFT to the transmitted signal (chaotic carrier after being transformed) with an arbitrary parameter set (p’, S’, Tw’), and then perform the ACF or DMI to the obtained waveform. If there is a peak appears at s = TD, the time-delay is clearly identified. When we varying the parameters by using the PRBS, the simulations show that there are no obvious features appear in ACF and DMI (see Fig. 7) under the aforementioned attack. Peaks only appear at s = Tw’ and its multiples. These will not give the attacker any useful information. On the other hand, the cross correlation coefficient between the transmitted signal and the PRBS is under 10−2, which means the PRBS cannot be extracted from the chaotic carrier. To attack the system, the eavesdropper has to perform the exhaustive search of p, S, Tw and the PRBS.
The PRBS used here can be produced in two different places separately as long as the initial states are the same. In our scheme, the initial states of PRBS along with the physical parameters are considered as the secret keys which can be distributed in other secure ways, i.e. the key exchange protocol base on public key technique  or quantum key distribution . And the time synchronization of the PRBS can be achieved by extracting a clock signal form the decoded message. The PRBS can be generated by using conventional algorithm cryptography or digital chaos technique , which results in a large key space. One of the major restrictions is that the speed may be relatively slow due to the computation complexity. However, in our scheme, the bit rate of the PRBS only needs to be hundreds of Mbps, which is certainly acceptable in practice.
In summary, we have studied the role of FRFT in electro-optic chaotic secure communication systems. The FRFT is used as a post-processing module in our scheme which is independent to the delay dynamics. As a result, the time delay signature of the input signal is eliminated in the output signal when some conditions are satisfied. PRBS with low bit rate (hundreds of Mbps) are introduced to resist brute force attack. The chaotic carrier, FRFT parameters and the PRBS are covered by each other so that the eavesdropper has to search the whole key space, including the digital key and the analog one. Conceptually speaking, our method should be effective for any delayed chaos-based encryption. But we only perform the simulations based on Intensity chaos electro-optic delay system in the current paper, other types of chaotic system, e.g. phase chaos electro-optic system and all-optical chaotic system will be studied in our next step of work. From the designer’s viewpoint, we suggest using an optical encryption transform to resist the attacks against the parameters of chaotic systems, so the setup of chaotic sources can focus on the complexity. Thus, the design of chaos based secure communication systems can be implemented in a modular manner.
This work was supported by the Fundamental Research Funds for the Central Universities, HUST: CXY12M005 and 2013TS049, and the National Nature Science Foundation of China (NSFC) under Grant 61307091.
References and links
3. A. Argyris, D. Syvridis, L. Larger, V. Annovazzi-Lodi, P. Colet, I. Fischer, J. García-Ojalvo, C. R. Mirasso, L. Pesquera, and K. A. Shore, “Chaos-based communications at high bit rates using commercial fibre-optic links,” Nature 438(7066), 343–346 (2005). [CrossRef] [PubMed]
4. L. Larger, J. Goedgebuer, and V. Udaltsov, “Ikeda-based nonlinear delayed dynamics for application to secure optical transmission systems using chaos,” C. R. Phys. 5(6), 669–681 (2004). [CrossRef]
6. M. Peil, M. Jacquot, Y. K. Chembo, L. Larger, and T. Erneux, “Routes to chaos and multiple time scale dynamics in broadband bandpass nonlinear delay electro-optic oscillators,” Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 79(2), 026208 (2009). [CrossRef] [PubMed]
10. R. Hegger, M. J. Bünner, H. Kantz, and A. Giaquinta, “Identifying and modeling delay feedback systems,” Phys. Rev. Lett. 81(3), 558–561 (1998). [CrossRef]
11. V. S. Udaltsov, J. P. Goedgebuer, L. Larger, J. B. Cuenot, P. Levy, and W. T. Rhodes, “Cracking chaos-based encryption systems ruled by nonlinear time delay differential equations,” Phys. Lett. A 308(1), 54–60 (2003). [CrossRef]
12. M. D. Prokhorov, V. I. Ponomarenko, A. S. Karavaev, and B. P. Bezruchko, “Reconstruction of time-delayed feedback systems from time series,” Physica D 203(3–4), 209–223 (2005). [CrossRef]
13. L. Zunino, M. C. Soriano, I. Fischer, O. A. Rosso, and C. R. Mirasso, “Permutation-information-theory approach to unveil delay dynamics from time-series analysis,” Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 82(4), 046212 (2010). [CrossRef] [PubMed]
17. D. Rontani, A. Locquet, M. Sciamanna, D. S. Citrin, and S. Ortin, “Time-delay identification in a chaotic semiconductor laser with optical feedback: a dynamical point of view,” IEEE J. Quantum Electron. 45(7), 879–891 (2009). [CrossRef]
18. R. M. Nguimdo, M. C. Soriano, and P. Colet, “Role of the phase in the identification of delay time in semiconductor lasers with optical feedback,” Opt. Lett. 36(22), 4332–4334 (2011). [CrossRef] [PubMed]
19. D. Rontani, M. Sciamanna, A. Locquet, and D. S. Citrin, “Multiplexed encryption using chaotic systems with multiple stochastic-delayed feedbacks,” Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 80(6), 066209 (2009). [CrossRef] [PubMed]
22. J. Hizanidis, S. Deligiannidis, A. Bogris, and D. Syvridis, “Enhancement of chaos encryption potential by combining all-optical and electrooptical chaos generators,” IEEE J. Quantum Electron. 46(11), 1642–1649 (2010). [CrossRef]
23. J. J. Suárez-Vargas, B. A. Marquez, and J. A. Gonzalez, “Highly complex optical signal generation using electro-optical systems with non-linear, non-invertible transmission functions,” Appl. Phys. Lett. 101(7), 071115 (2012). [CrossRef]
25. Q. Ran, H. Zhang, J. Zhang, L. Tan, and J. Ma, “Deficiencies of the cryptography based on multiple-parameter fractional Fourier transform,” Opt. Lett. 34(11), 1729–1731 (2009). [CrossRef] [PubMed]
26. M. Joshi, Chandrashakher, and K. Singh, “Color image encryption and decryption using fractional Fourier transform,” Opt. Commun. 279(1), 35–42 (2007). [CrossRef]
27. B. H. Kolner, “Space-time duality and the theory of temporal imaging,” IEEE J. Quantum Electron. 30(8), 1951–1963 (1994). [CrossRef]
28. Q. Han, W. Li, and M. Yang, “An optical waveform pre-distortion method based on time domain fractional Fourier transformation,” Opt. Commun. 284(2), 660–664 (2011). [CrossRef]
30. X. Li, W. Pan, B. Luo, and D. Ma, “Mismatch robustness and security of chaotic optical communications based on injection-locking chaos synchronization,” IEEE J. Quantum Electron. 42(9), 953–960 (2006). [CrossRef]
31. Y. C. Kouomou, P. Colet, N. Gastaud, and L. Larger, “Effect of parameter mismatch on the synchronization of chaotic semiconductor lasers with electro-optical feedback,” Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 69(5), 056226 (2004). [CrossRef] [PubMed]
33. B. Ravoori, A. B. Cohen, A. V. Setty, F. Sorrentino, T. E. Murphy, E. Ott, and R. Roy, “Adaptive synchronization of coupled chaotic oscillators,” Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 80(5), 056205 (2009). [CrossRef] [PubMed]
34. R. M. Nguimdo, R. Lavrov, P. Colet, M. Jacquot, Y. K. Chembo, and L. Larger, “Effect of fiber dispersion on broadband chaos communications implemented by electro-optic nonlinear delay phase dynamics,” J. Lightwave Technol. 28(18), 2688–2696 (2010). [CrossRef]
35. R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM 21(2), 120–126 (1978). [CrossRef]
36. N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74(1), 145–195 (2002). [CrossRef]