Research Article
Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications
Table 2
The 13-component interaction matrix of the support and the main design and implementation processes of cryptography algorithms.
| | Main process | Level 1 | Cryptography algorithms | Level 2 | Application | Theoretical basis | Implementation | Evaluation | Level 3 |
| Support process | Software | Culture | 5 | 6 | 5 | 2 | . | Organization/structure | 8 | 7 | 7 | 7 | . | International and public relations | 5 | 4 | 4 | 7 | . | Financial resources | 7 | 6 | 7 | 6 | . | Human resources and education | 8 | 10 | 10 | 9 | . | Research and development | 10 | 8 | 8 | 10 | . | Rules | 7 | 4 | 5 | 10 | . | Management | 9 | 7 | 8 | 7 | . | FAVA | 10 | 5 | 8 | 7 | . | Standard | 10 | 3 | 8 | 10 | . | Hardware | Equipment | 8 | 6 | 7 | 8 | | Infrastructure | 9 | 5 | 5 | 7 | | Material | 7 | 2 | 5 | 5 | |
|
|