{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:16:40Z","timestamp":1753885000999,"version":"3.41.2"},"reference-count":39,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,9,11]],"date-time":"2021-09-11T00:00:00Z","timestamp":1631318400000},"content-version":"vor","delay-in-days":253,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003968","name":"Iran National Science Foundation","doi-asserted-by":"publisher","award":["96\/53979"],"award-info":[{"award-number":["96\/53979"]}],"id":[{"id":"10.13039\/501100003968","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Computational Intelligence and Neuroscience"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>The technology world is developing fast with the developments made in the hardware and software areas. Considering that privacy and security of telemedicine applications are among the main necessities of this industry, as a result, there is a need to use lightweight and practical algorithms to be used in applications in the field of telemedicine, while security have the least negative impact. The distinct and contradicting components in the design and implementation of the cryptography algorithm, to achieve various objectives in medicine\u2010based applications, have made it a complicated system. It is natural that, without identifying the components, indices, and properties of each system component, the hardware and software resources are lost and a proper algorithm cannot be designed. Accordingly, this paper presents a leveled model of cryptography algorithms using the cybernetic method. First, the main objectives and measures in the design of the cryptography algorithms are extracted using the measure reduction methods, and some of the excess and overlapping measures are eliminated. Then, three general classes of the cryptography algorithm design and implementation measures, applications of cryptography algorithms, and cryptography implementation techniques are extracted. Since the complexity of the cryptography algorithm design is relatively high, the cybernetic methodology is used to present a supermodel to make the cryptography algorithm design objective. Such design prevents examining unnecessary details and establishes a bidirectional relationship between the main design and implementation process and the support process. This relationship provides the support requirements of the main process by the support process at each step. Finally, the <jats:italic>Q<\/jats:italic>\u2010analysis tools are used to analyse the proposed method, and the efficiency results are represented.<\/jats:p>","DOI":"10.1155\/2021\/3583275","type":"journal-article","created":{"date-parts":[[2021,9,11]],"date-time":"2021-09-11T22:35:09Z","timestamp":1631399709000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications"],"prefix":"10.1155","volume":"2021","author":[{"given":"Ali Mohammad","family":"Norouzzadeh Gil Molk","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4321-0345","authenticated-orcid":false,"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]},{"given":"Reza","family":"Ramazani Khorshiddoust","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,9,11]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"crossref","unstructured":"NileshD.andNagleM. The new cryptography algorithm with high throughput Proceedings of the 2014 International Conference on Computer Communication and Informatics January 2014 Coimbatore India 3\u20137 https:\/\/doi.org\/10.1109\/ICCCI.2014.6921739 2-s2.0-84911445340.","DOI":"10.1109\/ICCCI.2014.6921739"},{"key":"e_1_2_9_2_2","doi-asserted-by":"crossref","unstructured":"RaviS. KocherP. LeeR. McGrawG. andRaghunathanA. Security as a new dimension in embedded system design Proceedings of the 41st annual conference on Design automation-DAC \u201804 March 2004 San Diego CA USA 753\u2013760 https:\/\/doi.org\/10.1145\/996566.996771.","DOI":"10.1145\/3246102"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2014.068103"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2673-8_30"},{"key":"e_1_2_9_5_2","unstructured":"OttD.andPeikertC. And other workshop participants \u201cidentifying research challenges in post quantum cryptography migration and cryptographic agility 2019 http:\/\/arxiv.org\/abs\/1909.07353."},{"key":"e_1_2_9_6_2","first-page":"193","volume-title":"Advanced Sciences and Technologies for Security Applications","author":"Manickam P.","year":"2019"},{"key":"e_1_2_9_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7386-1_50"},{"key":"e_1_2_9_8_2","first-page":"141","article-title":"An enhanced vigenere cipher for data security","volume":"4","author":"Soofi A. A.","year":"2015","journal-title":"International Journal of Scientific & Technology Research"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1551\/1\/012008"},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-018-9929-x"},{"key":"e_1_2_9_11_2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7977"},{"key":"e_1_2_9_12_2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8240"},{"key":"e_1_2_9_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.06.008"},{"key":"e_1_2_9_14_2","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v11i1.pp589-595"},{"key":"e_1_2_9_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2019.08.006"},{"key":"e_1_2_9_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2989456"},{"key":"e_1_2_9_17_2","doi-asserted-by":"publisher","DOI":"10.21203\/rs.3.rs-363039\/v1"},{"volume-title":"User Integrity Protection Security Model for Enhanced Telemedicine for Healthcare Networks","author":"Gupta N.","key":"e_1_2_9_18_2","doi-asserted-by":"crossref","DOI":"10.31219\/osf.io\/69jdq"},{"volume-title":"Cryptographic Engineering on COVID-19 Telemedicine: An Intelligent Transmission through Recurrent Relation Based Session Key","year":"2021","author":"Dey J.","key":"e_1_2_9_19_2"},{"key":"e_1_2_9_20_2","first-page":"31","article-title":"Requirements of information security in a telemedicine network: review of IT managers\u2019 opinion","volume":"4","author":"Hosseinian V.","year":"2015","journal-title":"Journal of Paramedical Sciences & Rehabilitation"},{"key":"e_1_2_9_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2016.08.004"},{"key":"e_1_2_9_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2018.03.062"},{"key":"e_1_2_9_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.10.066"},{"key":"e_1_2_9_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2017.08.020"},{"key":"e_1_2_9_25_2","doi-asserted-by":"crossref","unstructured":"AchuthshankarA.andAchuthshankarA. A novel symmetric cryptography algorithm for fast and secure encryption Proceedings of the 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO) January 2015 Coimbatore India 4\u20139 https:\/\/doi.org\/10.1109\/ISCO.2015.7282273 2-s2.0-84959120415.","DOI":"10.1109\/ISCO.2015.7282273"},{"key":"e_1_2_9_26_2","unstructured":"OttD.andPeikertC. Identifying research challenges in post quantum cryptography migration and cryptographic agility 2019 http:\/\/arxiv.org\/abs\/1909.07353."},{"key":"e_1_2_9_27_2","unstructured":"LiuW. YingB. YangH. andWangH. Accurate modeling for predicting cryptography overheads on wireless sensor nodes 2 Proceedings of the 2019 11th International Conference on Advanced Communication Technology February 2019 Bangalore India IEEE 997\u20131001."},{"key":"e_1_2_9_28_2","doi-asserted-by":"crossref","unstructured":"FeiziS. AhmadiA. andNematiA. A hardware implementation of simon cryptography algorithm Proceedings of the 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) 2014 Mashhad Iran IEEE 245\u2013250 https:\/\/doi.org\/10.1051\/ro\/196802v100571.","DOI":"10.1109\/ICCKE.2014.6993386"},{"key":"e_1_2_9_29_2","unstructured":"ThambirajaE. RameshG. andUmaraniR. A survey on various most common encryption techniques 2012 http:\/\/www.ijarcsse.com."},{"key":"e_1_2_9_30_2","first-page":"1667","article-title":"Cryptography Algorithms\u202f: a review","volume":"2","author":"Gupta A.","year":"2014","journal-title":"International Journal of Engineering Research and Development"},{"key":"e_1_2_9_31_2","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.4.27"},{"key":"e_1_2_9_32_2","doi-asserted-by":"crossref","unstructured":"ChandraS. PairaS. AlamS. S. andSanyalG. A comparative survey of symmetric and asymmetric key cryptography Proceedings of the 2014 International Conference on Electronics Communication and Computational Engineering (ICECCE) November 2014 Hosur India 83\u201393 https:\/\/doi.org\/10.1109\/ICECCE.2014.7086640 2-s2.0-84949925087.","DOI":"10.1109\/ICECCE.2014.7086640"},{"key":"e_1_2_9_33_2","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2017.080659"},{"key":"e_1_2_9_34_2","doi-asserted-by":"crossref","unstructured":"SadkhanS. B.andSalmanA. O. A survey on lightweight-cryptography status and future challenges Proceedings of the International Conference on Advances in Sustainable Engineering and Applications June 2018 Wasit Iraq 105\u2013108 https:\/\/doi.org\/10.1109\/ICASEA.2018.8370965 2-s2.0-85048862495.","DOI":"10.1109\/ICASEA.2018.8370965"},{"key":"e_1_2_9_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-011-9764-4"},{"key":"e_1_2_9_36_2","first-page":"57","article-title":"Communication theory of secrecy systems. 1945","volume":"15","author":"Shannon C. E.","year":"1998","journal-title":"MD Computing"},{"key":"e_1_2_9_37_2","unstructured":"FennellyL. J. BeaudryM. andPerryM. A. Security in 2025."},{"key":"e_1_2_9_38_2","unstructured":"ITU 2019 Global Cybersecurity Index 2018."},{"key":"e_1_2_9_39_2","unstructured":"ITU 2017 Global Cybersecurity Index (GCI) 2017."}],"container-title":["Computational Intelligence and Neuroscience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2021\/3583275.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2021\/3583275.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/3583275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T11:33:47Z","timestamp":1722944027000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/3583275"}},"subtitle":[],"editor":[{"given":"Navid","family":"Razmjooy","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/3583275"],"URL":"https:\/\/doi.org\/10.1155\/2021\/3583275","archive":["Portico"],"relation":{},"ISSN":["1687-5265","1687-5273"],"issn-type":[{"type":"print","value":"1687-5265"},{"type":"electronic","value":"1687-5273"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-05-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-12","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"3583275"}}