Abstract

The technology world is developing fast with the developments made in the hardware and software areas. Considering that privacy and security of telemedicine applications are among the main necessities of this industry, as a result, there is a need to use lightweight and practical algorithms to be used in applications in the field of telemedicine, while security have the least negative impact. The distinct and contradicting components in the design and implementation of the cryptography algorithm, to achieve various objectives in medicine-based applications, have made it a complicated system. It is natural that, without identifying the components, indices, and properties of each system component, the hardware and software resources are lost and a proper algorithm cannot be designed. Accordingly, this paper presents a leveled model of cryptography algorithms using the cybernetic method. First, the main objectives and measures in the design of the cryptography algorithms are extracted using the measure reduction methods, and some of the excess and overlapping measures are eliminated. Then, three general classes of the cryptography algorithm design and implementation measures, applications of cryptography algorithms, and cryptography implementation techniques are extracted. Since the complexity of the cryptography algorithm design is relatively high, the cybernetic methodology is used to present a supermodel to make the cryptography algorithm design objective. Such design prevents examining unnecessary details and establishes a bidirectional relationship between the main design and implementation process and the support process. This relationship provides the support requirements of the main process by the support process at each step. Finally, the Q-analysis tools are used to analyse the proposed method, and the efficiency results are represented.

Highlights

  • Since telemedicine technology relies on data transmission, data security is critical in order to keep information transmission confidential and patients’ privacy, and any potential threat or attack on telemedicine networks such as unauthorized access to data and alteration or destruction of patient data should be considered

  • In the following, the design procedures and performance of various encryption algorithms, including NFSR, eStram, FCSR, and Panama, are presented through describing the main requirements of the cryptography algorithm design. e main purpose of this study is to present a perspective of stream cipher algorithm design and their performance

  • The results of the cybernetic model and Q-analysis for support components’ ranking are compared with the results reported in the global cybersecurity index (GCI) in 2015, 2017, and 2018 presented by ITU [36,37,38,39]. e GCI reports are focused on five indices, including “legal cases, organization necessities, technical issues, capacity building, and cooperation,” and the subindices include legal, technical, organization, capacity building, and cooperation

Read more

Summary

Introduction

Since telemedicine technology relies on data transmission, data security is critical in order to keep information transmission confidential and patients’ privacy, and any potential threat or attack on telemedicine networks such as unauthorized access to data and alteration or destruction of patient data should be considered. Erefore, in order to create security in the field of storage and exchange of information in the medical network, enforcement mechanisms using relevant standards should be considered. This study has focused on the surface design of cryptographic algorithms for use in telemedicine. The cryptography algorithms are designed and implemented to achieve goals such as confidentiality, authentication, and integrity [4], but various components such as speed, resource consumption, application type, flexibility, scalability, and reliability should be considered for their design.

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.