A Key Establishment Attempt Based on Genetic Algorithms Applied to RFID Technologies
Nabil Kannouf,
Mohamed Labbi,
Yassine Chahid,
Mohammed Benabdellah and
Abdelmalek Azizi
Additional contact information
Nabil Kannouf: Abdelmalek Essaâdi University, Morocco
Mohamed Labbi: Mohamed I University, Morocco
Yassine Chahid: Mohamed I University, Morocco
Mohammed Benabdellah: Mohamed I University, Morocco
Abdelmalek Azizi: Mohamed I University, Morocco
International Journal of Information Security and Privacy (IJISP), 2021, vol. 15, issue 3, 33-47
Abstract:
In RFID technology, communication is based on random numbers, and the numbers used there are pseudo-random too (PRN). As for the PRN, it is generated by the computational tool that creates a sequence of numbers that are generally not related. In cryptography, we usually need to generate the encrypted and decrypted keys, so that we can use the genetic algorithm (GA) to find and present those keys. In this paper, the authors use the GA to find the random keys based on GA operators. The results of this generation attempt are tested through five statistical tests by which they try to determine the keys that are mostly responsible for message-encryption.
Date: 2021
References: Add references at CitEc
Citations:
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/IJISP.2021070103 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:igg:jisp00:v:15:y:2021:i:3:p:33-47
Access Statistics for this article
International Journal of Information Security and Privacy (IJISP) is currently edited by Yassine Maleh
More articles in International Journal of Information Security and Privacy (IJISP) from IGI Global
Bibliographic data for series maintained by Journal Editor ().