Research Article

Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications

Table 4

A part of the interaction matrix between the cryptography algorithm implementation techniques and the seven objectives.

Level 3SecuritySimplicityUsing resourcesFlexibilityScalabilitySpeedReliability

Support processAvalanche effect32000000
Digital signature1000000
Block size1100200
Image sharing0001000
Parallel processing00011200
Threshold technique3100000
Data mining1000000
Binary tree1000300
Cycle52001200
Multistage crypto1000000
Hybrid method30302902
Hardware0070000