Abstract

The technology world is developing fast with the developments made in the hardware and software areas. Considering that privacy and security of telemedicine applications are among the main necessities of this industry, as a result, there is a need to use lightweight and practical algorithms to be used in applications in the field of telemedicine, while security have the least negative impact. The distinct and contradicting components in the design and implementation of the cryptography algorithm, to achieve various objectives in medicine-based applications, have made it a complicated system. It is natural that, without identifying the components, indices, and properties of each system component, the hardware and software resources are lost and a proper algorithm cannot be designed. Accordingly, this paper presents a leveled model of cryptography algorithms using the cybernetic method. First, the main objectives and measures in the design of the cryptography algorithms are extracted using the measure reduction methods, and some of the excess and overlapping measures are eliminated. Then, three general classes of the cryptography algorithm design and implementation measures, applications of cryptography algorithms, and cryptography implementation techniques are extracted. Since the complexity of the cryptography algorithm design is relatively high, the cybernetic methodology is used to present a supermodel to make the cryptography algorithm design objective. Such design prevents examining unnecessary details and establishes a bidirectional relationship between the main design and implementation process and the support process. This relationship provides the support requirements of the main process by the support process at each step. Finally, the Q-analysis tools are used to analyse the proposed method, and the efficiency results are represented.

1. Introduction

Since telemedicine technology relies on data transmission, data security is critical in order to keep information transmission confidential and patients’ privacy, and any potential threat or attack on telemedicine networks such as unauthorized access to data and alteration or destruction of patient data should be considered. In other words, any weakness in any part of the telemedicine network can affect the entire system. Therefore, in order to create security in the field of storage and exchange of information in the medical network, enforcement mechanisms using relevant standards should be considered. Accordingly, this study has focused on the surface design of cryptographic algorithms for use in telemedicine. Security of cryptography systems depends on “algorithm power” and “key size,” [1] and the general cryptography levels are divided into three levels, including cryptography algorithms, security protocols, and applications [2, 3]. However, the cryptography algorithms are designed and implemented to achieve goals such as confidentiality, authentication, and integrity [4], but various components such as speed, resource consumption, application type, flexibility, scalability, and reliability should be considered for their design. Design of a cryptography algorithm should be systematic, comprehensive, and staged. All required components of the information security should be considered in an excellence pattern in terms of technical, organization, procedural, and humanitarian aspects. Identifying new cryptographic challenges such as post-quantum cryptography and its agility, mobile applications, robustness of algorithms, and the role of implementation methods to achieve the above goals can be implemented in a comprehensive model [57]. Providing all these requirements simultaneously in the design of an algorithm is difficult and sometimes impossible. If contradictory objectives are considered for formulation of an objective/objectives of an algorithm, most algorithms might be broken, and if attacker has sufficient time, motivation, and resources, he can track the information [8]. Accordingly, presenting a model to make the cryptography algorithm design targeted is very important. Therefore, in this study, an approach is presented to design a leveled model of cryptography algorithms using the cybernetic method. The rest of this paper is structured as follows. In the second section, the literatures review is presented. In the third section, the cybernetic methodology is described, and a model is specified for design and implementation of cryptography algorithms based on extracted indices. In the fourth section, the proposed model is used to examine the design of the cryptography algorithm using the cybernetic supermodel. Finally, the proposed approach is evaluated using the Q-analysis method.

2. Literature Review

In [9], a security approach based on cryptography has been presented through examining the security issues in mobile devices and the available solutions. Also, it is mentioned that asymmetric cryptography is not a proper option for securing the resource-limited infrastructures such as IoT due to high complexity of the design and implementation. On the contrary, employing symmetric algorithms has other security issues. Accordingly, it has studied the design of cryptography algorithms based on position. To this end, an approach based on the AES algorithm and position of an efficient cryptography approach has been designed. In this approach, the application diagram is described and the user operation is studied. In the following, the operation flows of the system are described. Finally, it was evaluated that security can be increased through employing this approach. In [10], the design of stream cipher algorithms has been studied. It has been mentioned that stream cipher is one of the essential branches of symmetric cryptography, which requires limited hardware resources for execution. Therefore, considering the development of the communication technologies, the need to these algorithms is increasing. Accordingly, in the following, the design procedures and performance of various encryption algorithms, including NFSR, eStram, FCSR, and Panama, are presented through describing the main requirements of the cryptography algorithm design. The main purpose of this study is to present a perspective of stream cipher algorithm design and their performance. In 2016, NIST published a document called cipher standard and development instructions [11]. Transparency, openness, balance, accuracy, technical merit, global acceptability, usability, continuous improvement, and innovation and intellectual property (IIP) are the guidance principles of NIST cipher standards and development procedures. Also, NIST has started a procedure to request, evaluate, and standard of one or multiple public key cipher algorithms robust against quantum attacks [12]. In [11], lifecycle management processes and policies of cipher standard have been presented, where its main principles include: identifying and evaluating the needs, announcing the user’s intention on a standard or instruction, considering the requirements and solutions, defining a specific program and procedure and design and development of a standard, and evaluating and maintaining the standard. In [13], an analytical framework has been presented to hardware and software implementation using cipher programs that verifies an integrated statistical framework which can implement the classified algorithms successfully based on a combination of heterogeneous hardware features and their software applications. The model presented in this paper includes six elements of goal, input, activities, output, outcomes, and performance. In [14], software engineering methodologies have been used to propose an adaptive approach for presenting a robust cipher key generation algorithm. The technique used in this method is based on self-checking procedures that can detect the system-level errors. Therefore, it can be used to check the security keys generated via employing random factors. These factors have been presented in the NIST evaluation results. In this software method, the values of the random factors are smaller than the acceptance values, and the key is generated when a valid value is detected. The generated keys are generated through shift register and SIGBA technique. The evaluation results indicate the efficiency of the presented approach in generating valid cipher keys. In [15, 16], security issues of mobile devices and processing infrastructure, including mobile computing and edge computing, have been studied. It has been concluded the importance of cipher algorithms and necessity of employing new models consider the complexity of these infrastructures. Bhowmik et al. [17] focused on security issues in telemedicine and introduced a double-tier (nDTCS) encryption system. Accordingly, this solution has proposed a modified logistic map and a congruence-based security model to secure telemedicine medical transactions. Two keys have been used for the encryption and decryption process, intermediate key and session key. The results of the evaluation indicate the effectiveness of the solution in order to secure the information through the proposing method [18]. In order to protect telemedicine communications, a key exchange solution is proposed by improving the Diffie–Hellman cryptographic algorithm. In this method, a randomized key generation is used to generate the key. The proposed solution is naturally safe and reliable due to the use of the Diffie–Hellman algorithm, so there is no need for recalculations or key reversal. The results of the evaluation also indicate that the proposed method is safe against guessing key attacks. In [19], an intelligent and secured transmission security solution for heart disease reports based on session key-based methods is presented. For this purpose, matrix confusion operations are used. The innovation of this solution is in the process of matrix transfer, which is transmitted in the form of a number of cardiologists in particular. Finally, the efficiency of the proposed method is evaluated with regard to cryptographic engineering, transparency, and strength. The results indicate that this method provides more security in the medical data transmission process. Hosseinian et al. [20] examined the importance of information security needs in telemedicine technology in the field of information transmission. In this study, the data collection tool was a questionnaire that was designed based on the criteria of the Association of Information Management and Health Care Systems (HMISS) in the field of telemedicine network security and security standards of the American Telemedicine Association. This questionnaire has been calculated separately based on a score of 1 to 5. Table 1 summarizes the importance of each section.

3. Cybernetic Supermodel

Considering the complexity of the cipher context in terms of various aspects, designing a cipher algorithm should be systematic, comprehensive, and stage. To design cipher algorithms, different technologies, including mathematics, physics, biometric, biology, and social engineering, are used [21, 22]. Also, concepts and basic sciences such as theory of numbers, Boolean functions [23], and random functions [24, 25] are very essential. Depending of the application of cipher algorithms, various technical and nontechnical requirements should be considered for their design. Detecting new cryptography challenges such as postquantum cipher and its agility [26] and mobile applications [6, 7], making an algorithm robust, and the role of implementation methods to achieve the above goals are the issues that should be considered in a comprehensive model. Amidst, considering the large number of components in the design of cipher algorithms and their relationship and impact on each other, the design and implementation of these algorithms has become complicated. One of the best tools to design a complicated system is to present a model for that system. The steps associated with the design and implementation procedure of the cipher algorithm regardless of the triple classification of the hash, symmetric, and asymmetric functions at the highest level are shown in Figure 1.

Cryptography is one of the main information security components to transmit information from the sender to the receiver using the most secure method [27]. Design of the algorithms has different requirements depending on its application in the embedded or nonembedded system [28]. To design a robust algorithm, various technical and nontechnical factors should be considered so that the designed algorithm has sufficient robustness [29]. On the contrary, the effective factors should be in a coherent model with logical integration so that their impact on each other can be measured and evaluated; for instance, in [3033], various algorithms have been evaluated in terms of some parameters. In fact, designing a conceptual model for the cipher algorithm requires considering all factors, components, and indices that affect the design and implementation of the cipher algorithms. Accordingly, in the design of the cipher algorithm, there should be a balance between “efficiency” and “resources” required for a specific security level [34]. Considering the design and generation process of the cipher algorithm and classification of factors, components, and indices, the conceptual cybernetic supermodel is used for design and implementation. Cybernetic is mainly focused on system performance and how they control their activities and communicate with their components. Therefore, the cybernetic pattern might be a scientific basis for making the cipher algorithms targeted. The cybernetic model of the cipher algorithms has four components of approach/strategy, main process, support process, and control process. The interactions of the main and support processes constitute the structure of the cipher system. These interactions result in a complicated diagram. To overcome this complexity, a leveled structure and mathematical facilities such as graph and matrix are used. Accordingly, the general cybernetic model for the design and implementation of the cipher algorithms is shown in Figure 2. This model is comprised of four sections: development approach/strategy process, main process, support process, and control process. The main process includes cryptography algorithms. The support process is divided into two general classes of hardware and software. The control process includes controlling the design, implementation, and controlling the outcome. As mentioned, this model is designed in the general level; and, its processes and components are studied in detail in Section 3.

Since the cipher algorithms have specific complexities, the component model is used to facilitate the processes. This type of design prevents spending time on unnecessary details. The strategic model for design of cipher algorithms should be presented at a level of detail that creates a trade-odd between “inclusion” and “applicability.” “Inclusion” indicated including various cipher algorithms. Accordingly, considering the component extracted for the main, support, and control section, a cybernetic model can be used to design and implement cipher algorithms in three levels, as shown in Figure 3. According to this model, there is a bidirectional relationship between the main design and implementation process and the support process; at each step, as a result of this relationship, the support requirements are demanded by the main process and provided by the support process.

3.1. Data Matrix of the Design Model Components

Since there are a large number of extracted objectives or measures in the design of cipher algorithms and some of them overlap, or eliminating some of them causes no problem for achieving the main goals, the criterion reduction method can be used to eliminate some measures. Accordingly, in this study, the approach presented in [19] is used to reduce the number of measures. In the feature reduction process, if eliminating one measure does not change the effective set of the problem, it is unnecessary. Therefore, after feature reduction, the component extraction process is carried out. In this step, three general classes of measures are extracted, including design and implementation objectives of cipher algorithms, applications of cipher algorithms, and implementation methods of the cipher algorithms. In the following, the reduced measures are classified into the above classes and modeling is carried out based on available measures of these three classes. Accordingly, based on the level-3 cybernetic model (Figure 3), the following three matrices are constituted to design and implement the cipher algorithms:(i)The relationship matrix of support indices with main design and implementation processes of the cipher algorithms: since there are 13 support indices in the level-3 model (Figure 3) and 4 steps in the level-1 model (Figure 2), a 13∗4 matrix is constituted to determine the relationship between the members of these two processes, where its rows are the elements of the support process and its columns are the quadruple elements of the design and implementation of cryptography algorithms. The elements of this matrix are between 0 and 10, as shown in Table 2 [35]. The value of each element represents the effectiveness of each support index on each design and implementation step. Analysis of this matrix and its modeling computation provides the possibility for the policy-makers and developers to manage the resources required for each step of design and implementation of the cryptography algorithms and use the available hardware and software resources optimally.(ii)The relationship matrix of the objectives with the main design process of the cryptography algorithms: considering the seven objectives extracted in Section 2 and four steps in the main process, to determine the role of each step in achieving the seven objectives, a 7∗4 matrix is constituted. Since the number of final resources used to extract data is 814 papers, technical reports, and documents, the elements of this matrix are between 0 and 814, as given in Table 2. In this matrix, the value of each element represents the number of studies, documents, and reports indicating the relationship between two components. An interesting point in this matrix is that all algorithms implemented in the studied documents are evaluated.(iii)The relationship matrix of the implementation techniques and the design objectives of the cryptography algorithms: considering the 29 extracted techniques for cryptography algorithm implementation and seven main objectives of the cryptography algorithms, a 29 ∗ 7 matrix is constituted to determine how much each technique is used for cryptography implementation to achieve each objective (Table 3). The elements of this matrix are between 0 and 814. A part of this matrix is shown in Table 4.

3.1.1. Design of Cryptography Algorithms Using the Cybernetic Supermodel

Considering the above discussion and presence of numerous indices and components in the design and implementation of the cryptography algorithm, which make it a complex system, identifying the relationship between these indices and ranking them is a necessity. Accordingly, in this section, the Q-analysis method is used and the output of the three matrices is analyzed. According to the level three of the proposed cybernetic model, the design and implementation support process of the cryptography algorithms includes 13 components. On the contrary, the design and implementation steps of the cryptography algorithms also include four steps, constituting a 13 ∗ 4 matrix.

3.2. Calculating the Incidence Matrix

First, the incidence matric is obtained based on the data matrix 4–1. This matrix represents the “impact of support indices on the main design process of the cryptography algorithms.” The data matrix is comprised of two sets D, support indices, set C, and quadruple design and implementation steps (Table 5). The incidence matrix calculated using the data matrix for is represented in Table 6. By assigning different values to the parameter α, difference incidence matrices are obtained. The results of the Q-analysis using C++ coding for are given in Figure 4:

3.2.1. Geometric Representation

Multidimensional properties of the system are defined by a simple or complex set , such that the entities of the set D represent the support indices and entities of the set C represent the quadruple design and implementation steps of the cryptography algorithms.

In the sample with , dis is as follows:

The simplexes of are also

Therefore, the complex dimension is 3. In other words, the diagnosis classes (structure/organization), (human resources/education), (research and development), and (management) have the largest dimension.

3.3. Calculating Dimensions and Q-Link

Q-link is defined as the link between a subset with smallest interface between two subsequent dis in the chain of to . Q-link between two subsequent dis with is

The maximum link dimension is 3, indicating the relationship between the diagnosis classes.

3.3.1. Calculating the Structure Vectors

As mentioned in the definitions, the vector is a simplification basis, created to eliminate the additional impacts in the equivalent simplex sets. The maximum complex dimension with is 3. Therefore, the first structure vector based on the output is

The second structure vector P iswhere is the number simplexes greater than or equal to q in the set K in which P is the number of simplex link repetitions (support indices) in the quadruple design and implementation steps of the cryptography algorithms. Based on the values of these two vectors, it is seen that the relationship between the support indices and the quadruple design and implementation steps of the cryptography algorithms is high. This issue indicates the role of support components in the design and implementation of the cryptography algorithms, which should be considered seriously.

3.3.2. Calculating the Obstruction or Flexibility Vector

QK represents the number of structural obstructions for simplex interactions in dimension k:

As can be seen, there is no obstruction in any of the communication levels, indicating that there is a significant relationship between the support components at each equivalence class.

3.3.3. Calculating Irregularity

The value of is calculated using the Chinese method. The results for are shown in Table 7. The calculated irregularity value shows that the indices d2 (structure/organization), d5 (human resources/education), d6 (research and development), and d8 (management) affect other indices.

3.3.4. Calculating Complexity

Also, the results of Q-analysis can be used to describe structure complexity. According to equations (4)–(9) and for α=7, the complexity measure is

Since, in the above model, there is no obstruction among the component of the equivalent class, it was expected that the complexity of the support components is not high, and the obtained complexity index of 1 verifies this expectation. The system complexity for different alpha-cuts is shown in Figure 5.

3.3.5. Ranking the Support Components of the Design and Implementation of the Cryptography Algorithms

The results of using A-analysis are shown in Table 7. The connection strength of the factors in one group is specified with alpha-cut. Therefore, the support components are grouped in 5 levels. Each level describes the priority and importance of the group in developing the cryptography algorithms. In Figure 6 the ranking pyramid of the support components using Q-analysis is shown. To allocate proper resources, the components existing in higher levels of the pyramid (Figure 6) are of higher priority.

3.3.6. Validation of the Results

In this section, the results of the cybernetic model and Q-analysis for support components’ ranking are compared with the results reported in the global cybersecurity index (GCI) in 2015, 2017, and 2018 presented by ITU [3639]. The GCI reports are focused on five indices, including “legal cases, organization necessities, technical issues, capacity building, and cooperation,” and the subindices include legal, technical, organization, capacity building, and cooperation. According to the presented indices and subindices, it is clear that the “rules,” “standard,” “research and development,” “education,” and “management” are of higher priority in security establishment. Although our research is more skilled and detailed compared to the GCI reports, but the results verify our findings. Also, Table 8 shows the ranking of the support components obtained using Q-analysis.

3.3.7. Executing the Model and Analyzing the Results of the Objectives’ Impact on Design Steps of the Cryptography Algorithms’ Matrix

In this section, the role of the seven components on the quadruple design and implementation steps of the cryptography algorithm is analyzed with Q-analysis. Using the Q-analysis method and the 7∗4 matrix obtained from the relationship of the cryptography algorithms’ design objectives on their quadruple steps, their indices are ranked.

3.3.8. Calculating the Incidence Matrix and Executing the Model

First, the incidence matrix is obtained for the data matrix shown in Figure 2. It can be seen in Table 9 that each element of the two sets represents which indice. The incidence matrix calculated from the data matrix for is given in Table 10. The results of implementing the model for are given in Figure 7.

4. Geometric Representation

In the sample with , dis are

The simplexes of are also

Therefore, the complex dimension is 3. In other words, the discriminant classes (security) and (speed) have the largest dimension.

4.1. Calculating the Structure Vectors

As mentioned, the vector is a simplification basis to eliminate the additional effects in the set of equivalent simplexes. The maximum complex dimension for is 3. Therefore, the first structure vector based on the output is

The second structure vector P is

4.2. Calculating the Obstruction Vector or Inflexibility

QK represents the number of structural obstructions for simplex interactions in dimension k, which is as follows for :

According to the obtained values, it can be concluded that there are no structural obstructions among the main design indices of the cryptography algorithms. That is, multiple objectives are considered simultaneously by the cryptography algorithm designers.

4.3. Calculating Irregularity

The results of applying the Chinese method (ecc‘(σ)) for calculating irregularity for are shown in Table 11. The calculated irregularity value shows that indices (security) and (speed) have received more attention compared to other indices.

4.4. Calculating Complexity

Structural complexity for a sample with is

Since, in the above model, there was no obstruction among the components of the equivalent classes in any of the communication levels, it was expected that there is not a high complexity among objectives of the cryptography algorithm design; and, the complexity index of 1 verified this expectation. The system complexity for different alpha-cuts is shown in Figure 8. As can be seen, the system complexity is 1 for all significant values of alpha.

4.5. Prioritizing the Parameters of the Main Objectives of the Cryptography Algorithm Design Using Q-Analysis

According to the analysis results, the parameters can be classified into 5 levels. These levels are shown in Table 12 and Figure 9. Each level indicates a priority and importance of the group in the development of cryptography algorithms. To allocate proper resources, the components at the higher levels of the pyramid are of higher priority. As can be seen, three objectives of security, speed, and optimal usage of resources have the highest priority for the design of cryptography algorithms.

4.6. Executing the Model and Analyzing the Results for the Cryptography Algorithm Implementation Techniques

The interaction matrix between the 29 extracted techniques and the seven main objectives is shown in Figure 10. The purpose of this section is to rank the cryptography algorithm implementation techniques to achieve the goals of interest.

4.7. Calculating the Incidence Matrix and Executing the Model

The data matrix A is comprised of two sets. The set D represents the employed techniques, and the set C represents the seven main design objectives (Table 13):

Some parts of the incidence matrix calculated from the data matrix A for are shown in Table 14, and the results of the Q-analysis model for are shown in Figure 11.

4.8. Geometric Representation

In the sample with , the dis are

The simplexes of are

Therefore, the complex dimension is 2. In other words, the discriminant class d15 (basic sciences) has the largest dimension.

4.9. Calculating the Dimensions and the Q-Link

In the alpha defined for cryptography algorithm implementation techniques to achieve the defined goals, the obtained q-link shows that these techniques are relatively independent although there is a weak relationship between some techniques. Q-link in the samples with between each two subsequent di is as follows:

4.10. Calculating the Structure Vectors

Therefore, the first structure vector based on the software output is

The second structure vector P is

Since the large values of P of higher dimensions demonstrate more links, the second structure vector calculated for the alpha of interest shows that the relationship between the cryptography algorithm implementation techniques is minimum.

4.11. Calculating the Obstruction or Inflexibility Vector

The obstruction vector () for a sample with is

The value of QK represents the number of structural limitations or obstructions for the cryptography techniques’ interaction at dimension k. As can be seen from the calculated obstruction vector, there is a significant relationship at some levels.

4.12. Calculating Irregularity

Irregularity is the integration degree of a cryptography method in the total complex. Measuring irregularity (ecc’) for is shown in Table 15. As can be seen, irregularity for the discriminant class d15 indicates that this technique is isolated from other techniques.

4.13. Calculating Complexity

Structure complexity for a sample with is

The system complexity for different values of alpha is shown in Figure 12. As can be seen, the total complexity of the system for large values alpha tends to stability.

4.14. Ranking the Cryptography Algorithm Implementation Techniques

These techniques can be classified into 5 levels using the analysis of the obtained results. These levels can be seen in Table 16 and Figure 13. The link power of the factors in one group is specified with alpha. Each level describes priority and importance of the group in the development of cryptography algorithms. Accordingly, six methods of basic science, key management, using hardware methods, using steganography, Avalanche effect, and using hybrid method are the most important cryptography algorithm implementation techniques to achieve the main objectives.

5. Conclusion

In this study, the design and implementation model of the cryptography algorithms is designed in three levels and its effective components are extracted. To organize the components, in addition to elimination of the additional components through the measure reduction algorithm, a proper classification is applied to examine the mutual effects. After classification, three 13 ∗ 4, 7 ∗ 4, and 29 ∗ 7 matrices are constituted, and the model is implemented on these three matrices. To implement the designed model, Q-analysis is used. Accordingly, for support indices, five indices of high priority include human resources, research and development, management, organization/structure, and equipment. For the algorithm design objectives index, five high priority indices include security, speed, optimal usage of resources, and simplicity. For the indices related to implementation techniques of the cryptography algorithms, the most applied techniques for achieving the determined objectives include using basic science, hardware and software methods, using key management, hybrid method, steganography, Avalanche effect, and using artificial intelligence. In the future work, we will consider the following cases.

A plan should be formulated according to the priorities. According to the outputs of this study and the presented priorities, the following topics can be investigated in future studies:(1)Presenting a comprehensive model for generating various cryptography algorithms based on the priorities of interest(2)Examining and formulating a model about the role of basic science for design and implementation of cryptography algorithms considering the significant role of “basic science” in implementation of the cryptography algorithms and about the role of schools and universities(3)Presenting a model for design and implementation of cryptography algorithms in the IoT infrastructure with optimal resource usage

Data Availability

The data used to support the findings of the study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this article.

Acknowledgments

This work was partially supported by Iran National Science Foundation (INSF) under contract No. 96/53979.