Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications. 2021

Ali Mohammad Norouzzadeh Gil Molk, and Mohammad Reza Aref, and Reza Ramazani Khorshiddoust
Department of Computer Engineering, Islamic Azad University, North Tehran Branch, Tehran, Iran.

The technology world is developing fast with the developments made in the hardware and software areas. Considering that privacy and security of telemedicine applications are among the main necessities of this industry, as a result, there is a need to use lightweight and practical algorithms to be used in applications in the field of telemedicine, while security have the least negative impact. The distinct and contradicting components in the design and implementation of the cryptography algorithm, to achieve various objectives in medicine-based applications, have made it a complicated system. It is natural that, without identifying the components, indices, and properties of each system component, the hardware and software resources are lost and a proper algorithm cannot be designed. Accordingly, this paper presents a leveled model of cryptography algorithms using the cybernetic method. First, the main objectives and measures in the design of the cryptography algorithms are extracted using the measure reduction methods, and some of the excess and overlapping measures are eliminated. Then, three general classes of the cryptography algorithm design and implementation measures, applications of cryptography algorithms, and cryptography implementation techniques are extracted. Since the complexity of the cryptography algorithm design is relatively high, the cybernetic methodology is used to present a supermodel to make the cryptography algorithm design objective. Such design prevents examining unnecessary details and establishes a bidirectional relationship between the main design and implementation process and the support process. This relationship provides the support requirements of the main process by the support process at each step. Finally, the Q-analysis tools are used to analyse the proposed method, and the efficiency results are represented.

UI MeSH Term Description Entries
D003491 Cybernetics That branch of learning which brings together theories and studies on communication and control in living organisms and machines. Cybernetic
D000465 Algorithms A procedure consisting of a sequence of algebraic formulas and/or logical steps to calculate or determine a given task. Algorithm
D016494 Computer Security Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data. Computer Viruses,Data Protection,Data Security,Compromising of Data,Computer Hackers,Computer Worms,Cyber Security,Cybersecurity,Data Encryption,Information Protection,Computer Hacker,Computer Virus,Computer Worm,Data Compromising,Data Encryptions,Encryption, Data,Encryptions, Data,Hacker, Computer,Hackers, Computer,Protection, Data,Protection, Information,Security, Computer,Security, Cyber,Security, Data,Virus, Computer,Viruses, Computer,Worm, Computer,Worms, Computer
D017216 Telemedicine Delivery of health services via remote telecommunications. This includes interactive consultative and diagnostic services. Tele-Care,Tele-ICU,Tele-Intensive Care,Tele-Referral,Telecare,Virtual Medicine,Mobile Health,Telehealth,eHealth,mHealth,Health, Mobile,Medicine, Virtual,Tele Care,Tele ICU,Tele Intensive Care,Tele Referral,Tele-Referrals
D018907 Privacy The state of being free from intrusion or disturbance in one's private life or affairs. (Random House Unabridged Dictionary, 2d ed, 1993) Privacy Act,Public Law 93-579,PL 93-579,PL93-579,Act, Privacy,Law 93-579, Public,PL 93 579,PL93 579,Public Law 93 579

Related Publications

Ali Mohammad Norouzzadeh Gil Molk, and Mohammad Reza Aref, and Reza Ramazani Khorshiddoust
January 2022, Journal of materials science,
Ali Mohammad Norouzzadeh Gil Molk, and Mohammad Reza Aref, and Reza Ramazani Khorshiddoust
January 1997, Medical informatics = Medecine et informatique,
Ali Mohammad Norouzzadeh Gil Molk, and Mohammad Reza Aref, and Reza Ramazani Khorshiddoust
October 2017, Journal of telemedicine and telecare,
Ali Mohammad Norouzzadeh Gil Molk, and Mohammad Reza Aref, and Reza Ramazani Khorshiddoust
January 2016, Evolutionary computation,
Ali Mohammad Norouzzadeh Gil Molk, and Mohammad Reza Aref, and Reza Ramazani Khorshiddoust
January 1963, Activitas nervosa superior,
Ali Mohammad Norouzzadeh Gil Molk, and Mohammad Reza Aref, and Reza Ramazani Khorshiddoust
January 2016, Critical reviews in biotechnology,
Ali Mohammad Norouzzadeh Gil Molk, and Mohammad Reza Aref, and Reza Ramazani Khorshiddoust
June 2024, BMC medical informatics and decision making,
Ali Mohammad Norouzzadeh Gil Molk, and Mohammad Reza Aref, and Reza Ramazani Khorshiddoust
August 1972, Voprosy okhrany materinstva i detstva,
Ali Mohammad Norouzzadeh Gil Molk, and Mohammad Reza Aref, and Reza Ramazani Khorshiddoust
June 2023, Sensors (Basel, Switzerland),
Ali Mohammad Norouzzadeh Gil Molk, and Mohammad Reza Aref, and Reza Ramazani Khorshiddoust
October 1973, Computers and biomedical research, an international journal,
Copied contents to your clipboard!