Affiliation:
1. Abdelmalek Essaâdi University, Morocco
2. Mohamed I University, Morocco
Abstract
In RFID technology, communication is based on random numbers, and the numbers used there are pseudo-random too (PRN). As for the PRN, it is generated by the computational tool that creates a sequence of numbers that are generally not related. In cryptography, we usually need to generate the encrypted and decrypted keys, so that we can use the genetic algorithm (GA) to find and present those keys. In this paper, the authors use the GA to find the random keys based on GA operators. The results of this generation attempt are tested through five statistical tests by which they try to determine the keys that are mostly responsible for message-encryption.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Elliptic Curve Cryptography signing algorithms behind blockchain 2.0;Proceedings of the 6th International Conference on Networking, Intelligent Systems & Security;2023-05-24
2. Machine Learning-Based Intrusion Detection System: Review and Taxonomy;Proceedings of the 6th International Conference on Big Data and Internet of Things;2023
3. Improved adaptive genetic algorithm based RFID positioning;Journal of Systems Engineering and Electronics;2022-04