Ranking of Cryptographic Algorithm Implementation Techniques Using ELECTRE III and Q-Analysis methods
Publish place: The 7th International Conference on Electrical Engineering, Computer Science and Information Technology
Publish Year: 1401
نوع سند: مقاله کنفرانسی
زبان: English
View: 158
This Paper With 17 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
ECICONFE07_061
تاریخ نمایه سازی: 31 فروردین 1402
Abstract:
The techniques for implementing cryptographic algorithms (symmetric-asymmetric and
Hash function) are very diverse and interdisciplinary. Due to the different and sometimes
conflicting goals for implementing cryptographic algorithms, the used techniques are
different and a combination of several techniques is employed to achieve the defined
goal(s). Identifying high-priority techniques for allocating software and hardware
resources to upgrade those techniques is very important in terms of training, human
resource, infrastructure, laws and regulations, legal issues, and so on. These priorities can
contribute to the development of each country‟s cryptography strategy.
In this paper, ۱۵ techniques for implementing cryptographic algorithms are determined to
approach seven main goals. Moreover, a specific goal may be realized through using
relevant sources and proper techniques.
We have applied two ELECTRE III and Q-analysis alternative methods to rank and
determine high priority techniques. The outcomes of these methods selected for
crosschecking of convergence are with more than ۸۰% compliance. The required data are
extracted from the published articles, technical reports, and documents for the
implementation of cryptographic algorithms over ۲۲ years.
Keywords:
Authors
Ali Mohammad Norouzzadeh Gil Molk
ISSL Lab, Department of Electrical engineering, Sharif University of Technology, Tehran, Iran,
Mohammad Reza Aref
ISSL Lab, Department of Electrical engineering, Sharif University of Technology, Tehran, Iran,