Browse Definitions :
Definition

rolling code

Rolling code, also known as hopping code, is a security technology commonly used to provide a fresh code for each authentication of a remote keyless entry (RKE) or passive keyless entry (PKE) system. The use of rolling codes prevents replay attacks, in which an eavesdropper accesses and records the code sent and then replays it to breach the system.

In a non-cryptographic system for rolling code, the transmitter and receiver use the same pseudo-random number generator (PRNG), which maintains information about the last code that was used and a calculation to be performed. Performing the calculation results in the generation of a non-repeating and specific sequence of numbers. When one end of the communication -- the key fob, for example, or the module in the vehicle -- transmits the next number in the sequence, the other end can check it with its own PRNG. A current system might use a 40-bit rolling code for about a trillion possible codes. 

If the code matches, the system authenticates and the car door unlocks. Otherwise, the system will roll through the sequence of numbers looking for the one that was sent. Each successful use of the system results in synchronization of the end points, which means that the system should work on the first try next time.

Cryptographic rolling code systems add the further element of a secret key that is shared by the transmitter and receiver.

This was last updated in April 2017

Continue Reading About rolling code

Networking
  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's ...

  • host (in computing)

    A host is a computer or other device that communicates with other hosts on a network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

Security
  • WebAuthn API

    The Web Authentication API (WebAuthn API) is a credential management application program interface (API) that lets web ...

  • Common Vulnerability Scoring System (CVSS)

    The Common Vulnerability Scoring System (CVSS) is a public framework for rating the severity of security vulnerabilities in ...

  • Dridex malware

    Dridex is a form of malware that targets victims' banking information, with the main goal of stealing online account credentials ...

CIO
  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

  • blockchain decentralization

    Decentralization is the distribution of functions, control and information instead of being centralized in a single entity.

  • outsourcing

    Outsourcing is a business practice in which a company hires a third party to perform tasks, handle operations or provide services...

HRSoftware
  • team collaboration

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal ...

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

Customer Experience
  • market segmentation

    Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share ...

  • sales pipeline

    A sales pipeline is a visual representation of sales prospects and where they are in the purchasing process.

  • market basket analysis

    Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing...

Close