Research Article

Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications

Table 13

Set of dis and cis; the techniques employed for implementing cryptography algorithms.

FlexibilityFuzzy logicStorage spaceCycleAvalanche effect
ScalabilitySoftwareClusteringMultiple stepDigital signature
SpeedSteganographyKeyHybrid methodBlock size
ReliabilityMusic harmonyGraphHardwareImage sharing
Artificial intelligenceCharacteristic orientedHardwareParallel processing
SecurityEnergy consumptionOccupation areaThreshold technique
SimplicityBandwidth consumptionBasic scienceData mining
ResourcesMemory consumptionCompressionBinary tree