Research Article

Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications

Table 2

The 13-component interaction matrix of the support and the main design and implementation processes of cryptography algorithms.

Main processLevel 1
Cryptography algorithmsLevel 2
ApplicationTheoretical basisImplementationEvaluationLevel 3

Support processSoftwareCulture5652.
Organization/structure8777.
International and public relations5447.
Financial resources7676.
Human resources and education810109.
Research and development108810.
Rules74510.
Management9787.
FAVA10587.
Standard103810.
HardwareEquipment8678
Infrastructure9557
Material7255