Ranking of Cryptographic Algorithm Implementation Techniques Using ELECTRE III and Q-Analysis methods

Publish Year: 1401
نوع سند: مقاله کنفرانسی
زبان: English
View: 158

This Paper With 17 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ECICONFE07_061

تاریخ نمایه سازی: 31 فروردین 1402

Abstract:

The techniques for implementing cryptographic algorithms (symmetric-asymmetric and Hash function) are very diverse and interdisciplinary. Due to the different and sometimes conflicting goals for implementing cryptographic algorithms, the used techniques are different and a combination of several techniques is employed to achieve the defined goal(s). Identifying high-priority techniques for allocating software and hardware resources to upgrade those techniques is very important in terms of training, human resource, infrastructure, laws and regulations, legal issues, and so on. These priorities can contribute to the development of each country‟s cryptography strategy. In this paper, ۱۵ techniques for implementing cryptographic algorithms are determined to approach seven main goals. Moreover, a specific goal may be realized through using relevant sources and proper techniques. We have applied two ELECTRE III and Q-analysis alternative methods to rank and determine high priority techniques. The outcomes of these methods selected for crosschecking of convergence are with more than ۸۰% compliance. The required data are extracted from the published articles, technical reports, and documents for the implementation of cryptographic algorithms over ۲۲ years.

Authors

Ali Mohammad Norouzzadeh Gil Molk

ISSL Lab, Department of Electrical engineering, Sharif University of Technology, Tehran, Iran,

Mohammad Reza Aref

ISSL Lab, Department of Electrical engineering, Sharif University of Technology, Tehran, Iran,