Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications.
Autor: | Norouzzadeh Gil Molk AM; Department of Computer Engineering, Islamic Azad University, North Tehran Branch, Tehran, Iran., Aref MR; Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran., Ramazani Khorshiddoust R; Department of Industrial Engineering & Management Systems, Amirkabir University of Technology, Tehran, Iran. |
---|---|
Jazyk: | angličtina |
Zdroj: | Computational intelligence and neuroscience [Comput Intell Neurosci] 2021 Sep 10; Vol. 2021, pp. 3583275. Date of Electronic Publication: 2021 Sep 10 (Print Publication: 2021). |
DOI: | 10.1155/2021/3583275 |
Abstrakt: | The technology world is developing fast with the developments made in the hardware and software areas. Considering that privacy and security of telemedicine applications are among the main necessities of this industry, as a result, there is a need to use lightweight and practical algorithms to be used in applications in the field of telemedicine, while security have the least negative impact. The distinct and contradicting components in the design and implementation of the cryptography algorithm, to achieve various objectives in medicine-based applications, have made it a complicated system. It is natural that, without identifying the components, indices, and properties of each system component, the hardware and software resources are lost and a proper algorithm cannot be designed. Accordingly, this paper presents a leveled model of cryptography algorithms using the cybernetic method. First, the main objectives and measures in the design of the cryptography algorithms are extracted using the measure reduction methods, and some of the excess and overlapping measures are eliminated. Then, three general classes of the cryptography algorithm design and implementation measures, applications of cryptography algorithms, and cryptography implementation techniques are extracted. Since the complexity of the cryptography algorithm design is relatively high, the cybernetic methodology is used to present a supermodel to make the cryptography algorithm design objective. Such design prevents examining unnecessary details and establishes a bidirectional relationship between the main design and implementation process and the support process. This relationship provides the support requirements of the main process by the support process at each step. Finally, the Q -analysis tools are used to analyse the proposed method, and the efficiency results are represented. Competing Interests: The authors declare that there are no conflicts of interest regarding the publication of this article. (Copyright © 2021 Ali Mohammad Norouzzadeh Gil Molk et al.) |
Databáze: | MEDLINE |
Externí odkaz: |