Ranking of Cryptographic Algorithm Implementation Techniques Using ELECTRE III and Q-Analysis methods
عنوان مقاله: Ranking of Cryptographic Algorithm Implementation Techniques Using ELECTRE III and Q-Analysis methods
شناسه ملی مقاله: ECICONFE07_061
منتشر شده در هفتمین همایش بین المللی مهندسی برق، علوم کامپیوتر و فناوری اطلاعات در سال 1401
شناسه ملی مقاله: ECICONFE07_061
منتشر شده در هفتمین همایش بین المللی مهندسی برق، علوم کامپیوتر و فناوری اطلاعات در سال 1401
مشخصات نویسندگان مقاله:
Ali Mohammad Norouzzadeh Gil Molk - ISSL Lab, Department of Electrical engineering, Sharif University of Technology, Tehran, Iran,
Mohammad Reza Aref - ISSL Lab, Department of Electrical engineering, Sharif University of Technology, Tehran, Iran,
خلاصه مقاله:
Ali Mohammad Norouzzadeh Gil Molk - ISSL Lab, Department of Electrical engineering, Sharif University of Technology, Tehran, Iran,
Mohammad Reza Aref - ISSL Lab, Department of Electrical engineering, Sharif University of Technology, Tehran, Iran,
The techniques for implementing cryptographic algorithms (symmetric-asymmetric and
Hash function) are very diverse and interdisciplinary. Due to the different and sometimes
conflicting goals for implementing cryptographic algorithms, the used techniques are
different and a combination of several techniques is employed to achieve the defined
goal(s). Identifying high-priority techniques for allocating software and hardware
resources to upgrade those techniques is very important in terms of training, human
resource, infrastructure, laws and regulations, legal issues, and so on. These priorities can
contribute to the development of each country‟s cryptography strategy.
In this paper, ۱۵ techniques for implementing cryptographic algorithms are determined to
approach seven main goals. Moreover, a specific goal may be realized through using
relevant sources and proper techniques.
We have applied two ELECTRE III and Q-analysis alternative methods to rank and
determine high priority techniques. The outcomes of these methods selected for
crosschecking of convergence are with more than ۸۰% compliance. The required data are
extracted from the published articles, technical reports, and documents for the
implementation of cryptographic algorithms over ۲۲ years.
کلمات کلیدی: Cryptographic Algorithms, Techniques, Goals, ELECTRE III, Q-analysis
صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/1637982/