x Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications - human insight

Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications


HumanInsight Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications

Comput Intell Neurosci. 2021 Sep 10;2021:3583275. doi: 10.1155/2021/3583275. eCollection 2021.

ABSTRACT

The technology world is developing fast with the developments made in the hardware and software areas. Considering that privacy and security of telemedicine applications are among the main necessities of this industry, as a result, there is a need to use lightweight and practical algorithms to be used in applications in the field of telemedicine, while security have the least negative impact. The distinct and contradicting components in the design and implementation of the cryptography algorithm, to achieve various objectives in medicine-based applications, have made it a complicated system. It is natural that, without identifying the components, indices, and properties of each system component, the hardware and software resources are lost and a proper algorithm cannot be designed. Accordingly, this paper presents a leveled model of cryptography algorithms using the cybernetic method. First, the main objectives and measures in the design of the cryptography algorithms are extracted using the measure reduction methods, and some of the excess and overlapping measures are eliminated. Then, three general classes of the cryptography algorithm design and implementation measures, applications of cryptography algorithms, and cryptography implementation techniques are extracted. Since the complexity of the cryptography algorithm design is relatively high, the cybernetic methodology is used to present a supermodel to make the cryptography algorithm design objective. Such design prevents examining unnecessary details and establishes a bidirectional relationship between the main design and implementation process and the support process. This relationship provides the support requirements of the main process by the support process at each step. Finally, the Q-analysis tools are used to analyse the proposed method, and the efficiency results are represented.

PMID:34545280 | PMC:PMC8449735 | DOI:10.1155/2021/3583275

Powered by WPeMatico

, ,