Research Article
Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications
Table 4
A part of the interaction matrix between the cryptography algorithm implementation techniques and the seven objectives.
| | Level 3 | Security | Simplicity | Using resources | Flexibility | Scalability | Speed | Reliability |
| | Support process | Avalanche effect | 32 | 0 | 0 | 0 | 0 | 0 | 0 | | Digital signature | 1 | 0 | 0 | 0 | 0 | 0 | 0 | | Block size | 1 | 1 | 0 | 0 | 2 | 0 | 0 | | Image sharing | 0 | 0 | 0 | 1 | 0 | 0 | 0 | | Parallel processing | 0 | 0 | 0 | 1 | 12 | 0 | 0 | | Threshold technique | 3 | 1 | 0 | 0 | 0 | 0 | 0 | | Data mining | 1 | 0 | 0 | 0 | 0 | 0 | 0 | | Binary tree | 1 | 0 | 0 | 0 | 3 | 0 | 0 | | Cycle | 5 | 2 | 0 | 0 | 12 | 0 | 0 | | Multistage crypto | 1 | 0 | 0 | 0 | 0 | 0 | 0 | | Hybrid method | 30 | 3 | 0 | 2 | 9 | 0 | 2 | | Hardware | 0 | 0 | 7 | 0 | 0 | 0 | 0 |
|
|