当前位置: X-MOL 学术Comput. Intell. Neurosci. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications
Computational Intelligence and Neuroscience Pub Date : 2021-09-11 , DOI: 10.1155/2021/3583275
Ali Mohammad Norouzzadeh Gil Molk 1 , Mohammad Reza Aref 2 , Reza Ramazani Khorshiddoust 3
Affiliation  

The technology world is developing fast with the developments made in the hardware and software areas. Considering that privacy and security of telemedicine applications are among the main necessities of this industry, as a result, there is a need to use lightweight and practical algorithms to be used in applications in the field of telemedicine, while security have the least negative impact. The distinct and contradicting components in the design and implementation of the cryptography algorithm, to achieve various objectives in medicine-based applications, have made it a complicated system. It is natural that, without identifying the components, indices, and properties of each system component, the hardware and software resources are lost and a proper algorithm cannot be designed. Accordingly, this paper presents a leveled model of cryptography algorithms using the cybernetic method. First, the main objectives and measures in the design of the cryptography algorithms are extracted using the measure reduction methods, and some of the excess and overlapping measures are eliminated. Then, three general classes of the cryptography algorithm design and implementation measures, applications of cryptography algorithms, and cryptography implementation techniques are extracted. Since the complexity of the cryptography algorithm design is relatively high, the cybernetic methodology is used to present a supermodel to make the cryptography algorithm design objective. Such design prevents examining unnecessary details and establishes a bidirectional relationship between the main design and implementation process and the support process. This relationship provides the support requirements of the main process by the support process at each step. Finally, the Q-analysis tools are used to analyse the proposed method, and the efficiency results are represented.

中文翻译:

在远程医疗应用中使用控制论方法的密码算法的分级设计

随着硬件和软件领域的发展,技术世界正在快速发展。考虑到远程医疗应用的隐私性和安全性是该行业的主要需求,因此需要使用轻量级实用的算法用于远程医疗领域的应用中,而安全性的负面影响最小。为了实现医学应用中的各种目标,密码算法的设计和实现中的不同和相互矛盾的组件使其成为一个复杂的系统。很自然地,如果不识别每个系统组件的组件、索引和属性,就会丢失硬件和软件资源,无法设计出合适的算法。因此,本文提出了一个使用控制论方法的密码算法的层次模型。首先,采用度量约简方法提取密码算法设计的主要目标和度量,并剔除一些多余和重叠的度量。然后,提取了密码算法设计与实现措施、密码算法应用和密码实现技术三个大类。由于密码算法设计的复杂度较高,因此采用控制论的方法来呈现超模型,使密码算法设计具有客观性。这种设计可以防止检查不必要的细节,并在主要设计和实现过程与支持过程之间建立双向关系。这种关系通过支持流程在每个步骤提供了主流程的支持需求。最后,使用Q-分析工具对所提出的方法进行分析,并表示效率结果。
更新日期:2021-09-12
down
wechat
bug