Research Article
Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications
Table 4
A part of the interaction matrix between the cryptography algorithm implementation techniques and the seven objectives.
| Level 3 | Security | Simplicity | Using resources | Flexibility | Scalability | Speed | Reliability |
| Support process | Avalanche effect | 32 | 0 | 0 | 0 | 0 | 0 | 0 | Digital signature | 1 | 0 | 0 | 0 | 0 | 0 | 0 | Block size | 1 | 1 | 0 | 0 | 2 | 0 | 0 | Image sharing | 0 | 0 | 0 | 1 | 0 | 0 | 0 | Parallel processing | 0 | 0 | 0 | 1 | 12 | 0 | 0 | Threshold technique | 3 | 1 | 0 | 0 | 0 | 0 | 0 | Data mining | 1 | 0 | 0 | 0 | 0 | 0 | 0 | Binary tree | 1 | 0 | 0 | 0 | 3 | 0 | 0 | Cycle | 5 | 2 | 0 | 0 | 12 | 0 | 0 | Multistage crypto | 1 | 0 | 0 | 0 | 0 | 0 | 0 | Hybrid method | 30 | 3 | 0 | 2 | 9 | 0 | 2 | Hardware | 0 | 0 | 7 | 0 | 0 | 0 | 0 |
|
|