Ranking of Cryptographic Algorithm Implementation Techniques Using ELECTRE III and Q-Analysis methods

سال انتشار: 1401
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 102

فایل این مقاله در 17 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ECICONFE07_061

تاریخ نمایه سازی: 31 فروردین 1402

چکیده مقاله:

The techniques for implementing cryptographic algorithms (symmetric-asymmetric and Hash function) are very diverse and interdisciplinary. Due to the different and sometimes conflicting goals for implementing cryptographic algorithms, the used techniques are different and a combination of several techniques is employed to achieve the defined goal(s). Identifying high-priority techniques for allocating software and hardware resources to upgrade those techniques is very important in terms of training, human resource, infrastructure, laws and regulations, legal issues, and so on. These priorities can contribute to the development of each country‟s cryptography strategy. In this paper, ۱۵ techniques for implementing cryptographic algorithms are determined to approach seven main goals. Moreover, a specific goal may be realized through using relevant sources and proper techniques. We have applied two ELECTRE III and Q-analysis alternative methods to rank and determine high priority techniques. The outcomes of these methods selected for crosschecking of convergence are with more than ۸۰% compliance. The required data are extracted from the published articles, technical reports, and documents for the implementation of cryptographic algorithms over ۲۲ years.

نویسندگان

Ali Mohammad Norouzzadeh Gil Molk

ISSL Lab, Department of Electrical engineering, Sharif University of Technology, Tehran, Iran,

Mohammad Reza Aref

ISSL Lab, Department of Electrical engineering, Sharif University of Technology, Tehran, Iran,