Chaos theory has applications in several disciplines and is focusing on the behavior of dynamical systems that are highly sensitive to initial conditions. Chaotic dynamics are the impromptu behavior displayed by some nonlinear dynamical frameworks and have been used as a source of diffusion in cybersecurity for more than two decades. With the addition of chaos, the overall strength of communication security systems can be increased, as seen in recent proposals. However, there is a major drawback of using chaos in communication security systems. Chaotic communication security systems rely on private keys, which are the initial values and parameters of chaotic systems. This paper shows that these chaotic communication security systems can be broken by identifying those initial values through the statistical analysis of standard deviation and variance. The proposed analyses are done on the chaotic sequences of Lorenz chaotic system and Logistic chaotic map and show that the initial values and parameters, which serve as security keys, can be retrieved and broken in short computer times. Furthermore, the proposed model of identifying the initial values can also be applied on other chaotic maps as well.The identification procedure adopted is based on the nonlinear systems synchronization theory. Formally, chaos theory was introduced by a meteorologist, Edward N. Lorenz [25], who examined the weather system and found it to be a chaotic system. He also coined the term "The Butterfly Effect", for chaos theory, in analogy to the term being sensitively dependant on the initial conditions. The sensitive dependence of weather on the initial conditions in physical interpretation means that a small puff of wind can cause a storm after few months. In other words, a hurricane's formation is contingent on whether a distant butterfly had flapped its wings several weeks before. This effect is the main reason of application of chaotic theory in biometrics security, along with the other applications in the fields of natural sciences, engineering, stock exchange and so on [26,27]. In [28], an experimental robust synchronization of hyperchaotic circuits is proposed. Based on the concept of the master stability function, the two circuits are coupled through a unique scalar signal. Experimental results obtained from two hyperchaotic circuits are presented to show that synchronization occurs widely in the range of electronic component tolerances.Chaotic cryptosystems [29][30][31][32] were first proposed in the early 1990s and gained popularity instantly. It has been seen by numerous specialists [33] that there exists a nearby relationship in the middle of chaos and cryptography; numerous properties of chaotic frameworks have their relatives in conventional cryptosystems. Chaotic systems have a few convincing gimmicks ideal to secure correspondences, such as sensitivity to initial condition, ergodicity, control parameters and irregular-like conduct, which can be associated with some traditional cryptographic properties of great ciphers, for...