{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T22:43:44Z","timestamp":1701384224105},"reference-count":0,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7]]},"abstract":"In RFID technology, communication is based on random numbers, and the numbers used there are pseudo-random too (PRN). As for the PRN, it is generated by the computational tool that creates a sequence of numbers that are generally not related. In cryptography, we usually need to generate the encrypted and decrypted keys, so that we can use the genetic algorithm (GA) to find and present those keys. In this paper, the authors use the GA to find the random keys based on GA operators. The results of this generation attempt are tested through five statistical tests by which they try to determine the keys that are mostly responsible for message-encryption.<\/jats:p>","DOI":"10.4018\/ijisp.2021070103","type":"journal-article","created":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T14:21:48Z","timestamp":1623075708000},"page":"33-47","source":"Crossref","is-referenced-by-count":3,"title":["A Key Establishment Attempt Based on Genetic Algorithms Applied to RFID Technologies"],"prefix":"10.4018","volume":"15","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-6767-1026","authenticated-orcid":true,"given":"Nabil","family":"Kannouf","sequence":"first","affiliation":[{"name":"Abdelmalek Essa\u00e2di University, Morocco"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5110-5468","authenticated-orcid":true,"given":"Mohamed","family":"Labbi","sequence":"additional","affiliation":[{"name":"Mohamed I University, Morocco"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0907-073X","authenticated-orcid":true,"given":"Yassine","family":"Chahid","sequence":"additional","affiliation":[{"name":"Mohamed I University, Morocco"}]},{"given":"Mohammed","family":"Benabdellah","sequence":"additional","affiliation":[{"name":"Mohamed I University, Morocco"}]},{"given":"Abdelmalek","family":"Azizi","sequence":"additional","affiliation":[{"name":"Mohamed I University, Morocco"}]}],"member":"2432","container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=281040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T08:04:04Z","timestamp":1651824244000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2021070103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2021,7]]},"references-count":0,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2021070103","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7]]}}}