跳到主要內容

臺灣博碩士論文加值系統

(54.161.24.9) 您好!臺灣時間:2022/01/17 11:31
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:林繼威
論文名稱:多媒體醫療資訊儲存及傳輸的安全性研究
論文名稱(外文):On the study of the secure storage and transmission of multimedia medical information.
指導教授:韓永祥杜迪榕
學位類別:碩士
校院名稱:國立暨南國際大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:中文
論文頁數:105
中文關鍵詞:鑑別完整性密碼學數位簽章加密技術
外文關鍵詞:authenticationintegritycryptographydigital signatureencryption
相關次數:
  • 被引用被引用:3
  • 點閱點閱:987
  • 評分評分:
  • 下載下載:290
  • 收藏至我的研究室書目清單書目收藏:1
數位化的醫療資料比傳統的醫療資料容易儲存及複製,
並且可將醫療資料傳送到網路可以到達的地方。
數位化的醫療資料在各方面皆優於傳統的醫療資料,
但卻有一個嚴重的缺點-資料的鑑別(Authentication)及完整性(Integrity)不易處理;
而且寬頻網路是一個開放性的網路,任何人都可以在上面取得資料,
因此在寬頻網路上進行視訊會議和傳送醫療資料時,
必須確保其資料在傳輸時的安全性及身份確認(Identifications)的問題。
密碼學(Cryptography)是目前許多人在研究的課題,數位簽章(Digital Signature)是其重要的應用之一,
不但能確保資料的來源(鑑別),並且可以確認資料是否被更改過(完整性);
而密碼學中另外一個重要的應用-加密技術(Encryption),可以使資料在傳輸的過程中不容易被他人竊取,
身份確認的問題則可以利用前述的數位簽章(或變形)來完成。
在這篇論文裡,我們實作了一個系統,不但能確保數位醫療資訊在醫院之間傳輸的安全性,
也能確保其資料的完整性。
在這個系統中,我們使用Pentium !!! 450 MHz CPU的電腦做傳輸時,
其資料傳輸率可以達到28 MBPS (Megabits Per Second),這個速度對於現今的網路應用來說,
已經足夠。
而產生用來做數位簽章及金鑰交換的RSA演算法之金鑰對的速度,
也已經超越中華電信的應用程式產生金鑰對的速度了。
簡單的說,我們已經完成一個以軟體為架構且執行速度快速的安全系統,
這個系統並且可以很容易的被結合至數位醫療系統之中。
It has been known that the digital medical records are easier to duplicate and storage than traditional paper records.
Using digital medical records has an advantage that records can be sent to any place where network is accessible.
However, digital medical records have disadvantages that it is not easy to prove the origin of data (authentication) and to verify whether data has been altered (integrity).
When digital medical records are transmitted over open network they are with a danger of being stolen.
Cryptography is a technology which has been studied by many researchers recently.
And digital signature is one of the important applications of cryptography.
Digital signature can be used to solve the problems of authentication and integrity of digital medical records.
Encryption is another important application of cryptography and
it can be used to secure the records transmitted over open network from being stolen.
In this thesis we implemented a system to ensure not only the security of transmission of medical records between hospitals but also the integrity of the medical records.
In this system, the data transmission rate is up to 28 MBPS, which is fast enough for today''s network applications, on a personal computer with Pentium !!! 450 CPU.
The speed to generate a key pairs for RSA,
which is the algorithm chosen to perform the digital signature and key exchange functions,
is faster than that of the application program released by ChungHwa Telecom company.
In words,
we have implemented a fast software-based security system which can be easily incorporated into a digital medical system.
中文摘要
Abstract
致謝
目錄
圖目錄
表目錄
1.緒論
2.研究方法
2.1對稱性加密系統
2.1.1 IDEA 演算法
2.1.2子機密金鑰的生成方式
2.1.3 IDEA 的加密流程
2.1.4 IDEA 的解密流程
2.1.5 IDEA 的優缺點
2.2非對稱性加密系統
2.2.1 RSA 演算法
2.2.2長整數的運算
2.2.3快速的指數運算
2.2.4亂數的產生
2.2.5質數的判斷
2.2.6憑證管理中心
2.2.7PKCS#5
2.3數位簽章
2.3.1SHA-1 演算法
2.4實際傳輸的流程
3.研究結果
3.1憑證產生程式
3.2憑證管理中心伺服器管理程式
3.3 IDEA應用程式
3.4數位簽章程式
3.5系統整合
4 結論與未來展望
4.1結論
4.2未來展望
4.2.1將IDEA演算法改由組合語言完成
4.2.2將IDEA演算法改由硬體完成
參考文獻
[1] G. Au, C. K. Kwok, and H. W. Lee.
"An Intelligent Multimedia Patients Information System: Design Problems and Solutions,"
IEEE Proceedings of the 28th Annual Hawaii International Conference on System Sciences,
pp. 451-460, 1995.
[2] D. B. Baker, R. M. Barnhart, and Teresa T. Buss,
"PCASSO: Applying and Extending State-of-the-Arts Security in the Healthcare Domain", in
Proc. ACM Computer Security Applications Conference, 1997, pp. 8-12.
[3] R. J. Barcelo,
"Towards A European Framework for Digital Signatures And Encryption,"
ComputerLaw & Security Report, vol. 14, no. 2, pp. 79-86, 1998.
[4] J. J. Bos,
"Digital Signatures and the Electronic Health Records: Providing Legal and Security Guarantees,"
it International Journal of Bio-Medical Computing, vol. 42, pp. 157-163, 1996.
[5] M. P. D''Alessandro, J. R. Galvin, D. M. D''Alessandro,
W. E. Erkonen, D. S. Curry, and T. A. Choi.
"The Iowa Health Book: Creating, Organizing and Distributing a Digital Medical Library of Multimedia Consumer Health Information on the Internet to Improve Rural Health Care by Increasing Rural Patient Access to Information," in
Proc. Third Forum on Research and Technology Advances in Digital Libraries, 1996, pp. 28-34.
[6] P. Degoulet, F. C. Jean, C. Safran.
"The Multimedia Workstation, Electronic Assistant to the Health Care Professional,"
Rev Prat, vol. 46, pp. 306-313, 1996.
[7] E. Gerck,
"Overview of Certification Systems:X.509, CA, PGP and SKIP,"
MCG. http://www.mcg.org.br/, 1997.
[8] T. Green and M. E. Parten,
"PC-based Medical Data Acquisition and Analysis," in
Proc. 8th IEEE Symposium on Computer-Based Medical System, 1995, pp. 159-164.
[9] E. B. Heinlein, "Medical Records Security,"
Computers & security, vol. 15, no. 2, pp. 100-102, 1996.
[10] K. Inamura, and T. Takahashi,
"Storage and Presentation of Images,"
International Journal of Bio-Medical Computing, vol. 39, pp. 157--162, 1995.
[11] X. Lai,
"On the Design and Security of Block Ciphers," ETH Series in Information Processing,
vol. 1, Hartung-Gorre Verlag, Konstanz, Switzerland, 1992
[12] W. Lee and Y. Kim,
"Applying Multimedia to Medical Imaging,"
IEEE Engineering in Medicine and Biology, vol. 15, no. 2, pp. 79-85, March 1996.
[13] T. L. Lincoln and D. J. Essin,
"A Document Processing Architecture for Electronic Medical Records," in
Proc. MEDINFO 95 , vol. 8, 1995, pp. 227-230.
[14] A. J. Menezes, P. C. van Oorschot and S. A. Vanstone,
" Handbook of Applied Cryptography," CRC Press, 1996.
[15] W. J. Nowack and M. J. Nicocolai,
"The Electronic Medical Record in Clinical Care," in
Proc. IEEE 1996 Fifteen Southern Biomedical Engineering Conference, 1996,
pp. 81-84.
[16] O. Rienhoff,
"Digital Archives and Communication Highways in Health Care Require a Second Look at the Legal Framework of the Seventies,"
International Journal of Bio-Medical Computing, vol. 35, pp. 13-19, 1994.
[17] D. de Roulet and J. R. Scherrer,
"Technical Means for Securing Health Information,"
International Journal of Bio-Medical Computing, vol. 43, pp. 39-44, 1996.
[18] RSA Laboratories.
"PKCS #5:Password-Based Encryption Standard Version 1.5,"
RSA Laboratories Technical Note, 1993.
[19] R. Santoni and E. Cellai,
"Multimedia Clinical Records: Results of a Pilot Project at the Radiation Therapy Department of Florence,"
British Journal of Radiology, vol. 68, pp. 413-420, 1995.
[20] B. Schheier,
"Applied Cryptography," Second Edition, John Wiley & Sons, 1996.
[21] J. P. Smith,
"Authentication of Digital Medical Images with Digital Signature Technology,"
Radiology, vol. 194, no. 3, pp. 771-774, 1995.
[22] W. Stallings,
"Cryptography and Network Security : Principles and Practice," Second Edition,
Prentice Hall, 1999.
[23] A. Wrzyszcz and D. Milford,
"A New Modulo 2a+1 Multiplier,"
in Proc. IEEE International Conference on Computer Design,
1993, pp. 614-617.
[24] S. T. C. Wong and H. K. Huang,
"A Hospital Integrated Framework for Multimodality,"
IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans,
vol. 26, no. 4, pp. 455-469, 1996.
[25] R. Zimmermann,
"Efficient VLSI Implementation of Modulo (2n±1) Addition and Multiplication",
in Proc. 14th IEEE Symposium on Computer Arithmetic,
1999, pp. 158-167.
[26] 行政院研究發展考核委員會,
"政府憑證管理中心憑證實作原則,"
中華電信股份有限公司, 1998.
[27] 賴溪松, 韓亮及張真誠,
"近代密碼學及其應用," 松崗電腦圖書, 1995.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top