cal chaotic systems, thus proving the exploitation and
efficient application of chaotic systems in communi-
cations (Pecora and Carroll, 1990). In 1993, K.M.
Cuomo et al. proved that for some chaotic systems,
Lorenz for example, the synchronization property, ac-
cording to the technique of L.M. Pecora et al. is ro-
bust despite small perturbations in the coupling sig-
nal. This property allowed these researchers to pro-
pose the first scheme of a chaotic communication sys-
tem based on the principle of Chaotic Addition Mask-
ing (Cuomo and Oppenheim, 1993).
In 2003, A.S. Dmitriev developed a new ap-
plication base-chaos in communications called Di-
rect Chaotic Communication (DCC) (Dmitriev et al.,
2003). This new chaotic-based technology has
opened a new field of application of chaos, namely
ultra-wideband communications. In 1997, T. Yang et
al. published the first work presenting the concept of
chaotic encryption systems (Yang and Chua, 1997).
In this context, they proposed to integrate cryptogra-
phy into chaotic communication systems to improve
the security degree of the latter. Chaotic pseudo-
random sequences have desirable cryptographic prop-
erties, such as good randomness, deterministic dy-
namics, structure complexity, and sensitivity to ini-
tial conditions. Therefore, cryptanalysts have adopted
several cryptographic standards based on chaos the-
ory.
Subsequently, P.G. Vaidya et al. proposed chaotic
cryptography with chaotic timing in 1998 (Vaidya and
Ronge, 1998). The chaos-based digital cryptography
system, based on pseudo-random number generators,
does not depend on the chaos timing; it uses the initial
conditions and control parameters as the secret key
(Li et al., 2001). The one-dimensional logistic map
is often used as a Pseudo-Random Number Generator
(PRNG) in encryption, for example M.H.A. Samah
et al. introduced a method where the logistic map is
used to scatter the samples and the one-dimensional
circular map is used to confuse the samples (Samah
and Eihab, 2013). E. Mosa et al. (Mosa et al., 2009)
presented cryptography in the transformation domain,
based on the two-dimensional Baker map. The three-
dimensional Lorentz map as a pseudo-random num-
ber generator is discussed by B.S. Sattar (Sadoudi and
Azzaz, 2009).
In 2009, S. Sadoudi and M.S. Azzaz, developed
a hardware implementation of the Rossler chaotic
system to secure communication (Sadoudi and Az-
zaz, 2009) (Sattar and Rana, 2015), followed by a
new auto-switched chaotic system and its Field Pro-
grammable Gate Array (FPGA) implementation is
presented in (Azzaz et al., 2013b), as well as some
work based on synchronized hybrid chaotic genera-
tors is proposed in (Azzaz et al., 2013a). In the same
year, S. Sadoudi et al. developed a wireless hyper-
chaotic communication system for secure real-time
image transmission (Sadoudi et al., 2013). Subse-
quently, in the same year, they proposed an FPGA
real-time implementation of Chen’s chaotic system
to secure chaotic communications (Sadoudi et al.,
2009). Several works are proposed founded on real-
time FPGA implementation of Lorenz’s chaotic gen-
erator, Duffing’s chaotic attractor and experimental
synchronization technique for chaotic communica-
tions (Azzaz et al., 2009), (Sadoudi et al., 2014) and
(Sadoudi et al., 2015).
Currently, from 2020 to 2022, several researchers
have been working on implementing FPGA-based
real-time chaos secure encryption systems, as well
as chaos-based video encryption algorithms (Azzaz
et al., 2019)-(Hadjadj et al., 2022). Secure commu-
nication is crucial in the digital age, with data pri-
vacy and confidentiality being paramount concerns.
One promising method for encrypting speech sig-
nals is the use of the Discrete Cosine Transform
(DCT) based on hyperchaos-system. Hyperchaos-
system employs hyper-chaotic systems, which are
even more unpredictable than traditional chaotic sys-
tems, adding an extra layer of security to the encryp-
tion process (Zghair et al., 2021). Combining the
DCT with hyperchaos-system allows efficient encryp-
tion of speech signals while ensuring accurate recon-
struction at the receiver’s end. This novel approach
presents an effective solution for secure speech sig-
nal communication (Sathiyamurthi and Ramakrish-
nan, 2022).
In this paper (Abdallah and Meshoul, 2022), au-
thors propose multilayer cryptosystems for audio
communication encryption by continuously fusing
audio signals with speech signals without silent pe-
riods. Three levels of encryption (fusion, substitu-
tion, and permutation) are considered, and the pro-
posed approach shows increased security compared to
one-dimensional logistic map-based encryption tech-
niques.
Cryptography is a mathematical discipline allow-
ing one to perform operations on an intelligible text
to ensure some security properties of the informa-
tion. This work aims to secure speech communication
via an encryption system based on the chaotic PRNG
technique using a transmission channel-based USB-
RS232. Hybrid chaotic PRNG-based cryptography
is secure and has powerful confusion and diffusion
properties necessary for strong encryption. Each unit
in the confusion and scattering area wants to block
the derivation of the secret write key or the possible
prevention of the original message. While scattering
ICINCO 2023 - 20th International Conference on Informatics in Control, Automation and Robotics
70