Ranking of Cryptographic Algorithm Implementation Techniques Using ELECTRE III and Q-Analysis methods
Publish place: The 7th International Conference on Electrical Engineering, Computer Science and Information Technology
Publish Year: 1401
Type: Conference paper
Language: English
View: 186
This Paper With 17 Page And PDF Format Ready To Download
- Certificate
- I'm the author of the paper
Export:
Document National Code:
ECICONFE07_061
Index date: 20 April 2023
Ranking of Cryptographic Algorithm Implementation Techniques Using ELECTRE III and Q-Analysis methods abstract
The techniques for implementing cryptographic algorithms (symmetric-asymmetric and
Hash function) are very diverse and interdisciplinary. Due to the different and sometimes
conflicting goals for implementing cryptographic algorithms, the used techniques are
different and a combination of several techniques is employed to achieve the defined
goal(s). Identifying high-priority techniques for allocating software and hardware
resources to upgrade those techniques is very important in terms of training, human
resource, infrastructure, laws and regulations, legal issues, and so on. These priorities can
contribute to the development of each country‟s cryptography strategy.
In this paper, 15 techniques for implementing cryptographic algorithms are determined to
approach seven main goals. Moreover, a specific goal may be realized through using
relevant sources and proper techniques.
We have applied two ELECTRE III and Q-analysis alternative methods to rank and
determine high priority techniques. The outcomes of these methods selected for
crosschecking of convergence are with more than 80% compliance. The required data are
extracted from the published articles, technical reports, and documents for the
implementation of cryptographic algorithms over 22 years.
Ranking of Cryptographic Algorithm Implementation Techniques Using ELECTRE III and Q-Analysis methods Keywords:
Ranking of Cryptographic Algorithm Implementation Techniques Using ELECTRE III and Q-Analysis methods authors
Ali Mohammad Norouzzadeh Gil Molk
ISSL Lab, Department of Electrical engineering, Sharif University of Technology, Tehran, Iran,
Mohammad Reza Aref
ISSL Lab, Department of Electrical engineering, Sharif University of Technology, Tehran, Iran,