Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System

Even though security requirements in medical care are traditionally high, most computerized medical care applications lack sophisticated security measures or focus only on single security objectives. This project is a web based application for medical consultation system, it describes a special sec...

Full description

Saved in:
Bibliographic Details
Main Author: Khashan, Osama Ahmed Abdelhadi
Format: Thesis
Language:eng
Published: 2007
Subjects:
Online Access:https://etd.uum.edu.my/86/1/osama_ahmed.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uum-etd.86
record_format uketd_dc
institution Universiti Utara Malaysia
collection UUM ETD
language eng
topic QA76 Computer software
spellingShingle QA76 Computer software
Khashan, Osama Ahmed Abdelhadi
Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
description Even though security requirements in medical care are traditionally high, most computerized medical care applications lack sophisticated security measures or focus only on single security objectives. This project is a web based application for medical consultation system, it describes a special security way to process a medical care data which transporting through a public networks such as the Internet. It proposes a cryptography approach using RC5 as fast and strong block cipher encryption algorithm. In this application, the patient creates an encryption key to encrypt a medical care consultation inquiries and questions before he send it transit through the transport media to the system database. The doctor is a server side who's the administrator and responsible to decrypt and manage the data. This study is to deliver the approach of confidentiality, integrity and trust to the patient's medical data.
format Thesis
qualification_name masters
qualification_level Master's degree
author Khashan, Osama Ahmed Abdelhadi
author_facet Khashan, Osama Ahmed Abdelhadi
author_sort Khashan, Osama Ahmed Abdelhadi
title Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
title_short Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
title_full Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
title_fullStr Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
title_full_unstemmed Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
title_sort implementing rc5 encrtption algorithm on a web based medical cosultation system
granting_institution Universiti Utara Malaysia
granting_department College of Arts and Sciences (CAS)
publishDate 2007
url https://etd.uum.edu.my/86/1/osama_ahmed.pdf
_version_ 1747826840017305600
spelling my-uum-etd.862013-07-24T12:05:32Z Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System 2007-11 Khashan, Osama Ahmed Abdelhadi College of Arts and Sciences (CAS) Faculty of Information Technology QA76 Computer software Even though security requirements in medical care are traditionally high, most computerized medical care applications lack sophisticated security measures or focus only on single security objectives. This project is a web based application for medical consultation system, it describes a special security way to process a medical care data which transporting through a public networks such as the Internet. It proposes a cryptography approach using RC5 as fast and strong block cipher encryption algorithm. In this application, the patient creates an encryption key to encrypt a medical care consultation inquiries and questions before he send it transit through the transport media to the system database. The doctor is a server side who's the administrator and responsible to decrypt and manage the data. This study is to deliver the approach of confidentiality, integrity and trust to the patient's medical data. 2007-11 Thesis https://etd.uum.edu.my/86/ https://etd.uum.edu.my/86/1/osama_ahmed.pdf application/pdf eng validuser masters masters Universiti Utara Malaysia Ashbourn, A.(2006). Data Encryption, Retrieved Jun 24,2007, From http://scmagazine.com/us/grouptest/detai1s/data-encryption-2006. Audio Codes(2004).White Paper,Securing Communications over Packet Networks White Paper. Retrieved Jun 29, 2007, from http://www.audiocodes.com/objects/Securing_Communications _WP.pdf. Bertoni, J. & Breveglieri, L. & Koren, I. (2003). Concurrent fault detection in a hardware implementation of the RC5 encryption algorithm, Application-Specific System, Architectures, and Processors, 2003. Proceedings. IEEE International Conference. pp. 423 - 432. Best, W. & Kahn, V. (2000). Research in education(8th ed). USA: Allyn and Bacon. Chadwick, D. W. & Crook, P. J. & Young, A. J. & McDowell, D. M. & Dornan, T. & New, J (2000). Using the Internet to Access Confidential Patient Records: a Case Study. Information in practice. Retrieved August 28,2007, from http://www.bmj.bmjjournals.com/cgi/reprint/321/7261/612.pdf Chen, Z. & Yu, X. & Feng, D. (2001). A Telemedicine System over the Internet. Pan-Sydney Workshop on Visual Information Processing. Retrieved October 02,2007, from http://www.crpit.com/confpapers/CRPITV2Chen.pdf. Delrobaee, A. & Mirdarnadi, M. & Yasamy, M. & Kheirandish, Y. & Mohabbati, B. & Delrobaie, H. & Jamaati, H. (2006), Design and Development of a Remote Medical Consultation System. Retrieved October 10, 2007, from http://www. diglib.tums.ac.ir/pub/magmng/pdf/72666.pdf. Ellis, J. H. (1999). The history of non-secret encryption. Retrieved Jun 29,2007, from http://www.cesg.gov.uk/site/publications/media/ellis.pdf. Gritzalis, S. & Iliadis, J. & Gritzalis, D. & Spinellis, D. & Katsikas, D. (1999). Developing Secure Web-based Medical Applications. Medical Informatics, 24(1):75-90, 1999. Retrieved September 22,2007, from http://www.spinellis.gr/pubs/jml/l999-MedInf-Euromed/html/ euromed.pdf. Hejda, P. (2000). Architectural Model for User interfaces of Web-based Applications. Retrieved August 15,2007, from http://www.ui4all.ics.forth.gr/UI4ALL 20OO/files/ Short_papers/Hejda.pdf Hevner et al., (2004), Design Research in Information Systems, Retrieved July 13, 2007, from http://www.isworld.org/Researchdesign/drisISworld.htms. lngrian Networks, (2006). Employing Encryption to Secure Consumer Data, A Best Practices Guide for Retailers. , Retrieved August 09,2007, From http://www.ingrian.com/resources/whitepapers/retail-wp.pdf. Isom, J. (2005). An Introduction to Block Cipher Algorithms and Their Applications in Communication Security. , Retrieved July 29, 2007, From http://www.securitydocs.com/pdf/3258.PDF. Kaliski, B. S. & Yin, Y. L. (1998). On the Security of the RC5 Encryption Algorithm, RSA Laboratories Technical Report TR-602. Retrieved July 19, 2007, from http://www. ftp://ftp.rsasecurity.com/pub/rsalabs/rc5/rc5-report.pdf. Karir, M. & Baras, J. S. (2004), LES: Layered Encryption Security. Retrieved August 18, 2007, from http://www.merit.edu/~mkarir/papers/icn04.pdf. Kirakowski, J. (2000). Questionnaires in usability engineering: a list of frequently asked questions (3d Ed). Human Factors Research Croup, Ireland. Retrieved November 12,2007. From http://www.ucc.ie/hfrg/resources/qfaql.htmI Koops, B. J. (1999). Chapter 3. Cryptography, a key technology for information Security. Retrieved July 11, 2007, fromhttp://www.rechten.uvt.nl/koops/ THESIS/ cryptocontroversy-ch03.PDF. Kornievskaia, 0. (2002). Symmetric and Asymmetric Authentication: A Study of Symmetric and Complementary Properties and Their Effect on Interoperability and Scalability in Distributed Systems. Retrieved September 22, 2007, from http://www.citi.umich.edu/u/aglo/papers/thesis_proposal.pdf Leidigh, C. (2005). Fundamental Principles of Network Security. White Paper 101. August 15, 2007, from http:// www.apcmedia.com/salestools/SADE-5TNRPG_RO_EN.pdf Loncaric, S. & Silovic, M. & Pek, E. & Margan, A. (n.d.). A Web-based system for medical teleconsultation: First results, Retrieved October 06,2007, from http://www.ipg.zesoi.fer.hr/papers/itimOO.pdf. Officeware (1998), RAPID APPLICATION DEVELOPMENT, A Structured Approach to Programming Modern Business Applications. Retrieved October 20, 2007, from http://www.oware.com/Subpages/radmethodology.htm. Pathak, V. (2001). Encryption Servers: A Scalable Distributed Method for Internet Security. Retrieved July 2007, from http://www.paul.rutgers.edu/vpathak/thesis.pdf Pek, E. & Loncaric, S. (2001). Internet-based Medical Teleconsultation System. Image and Signal Processing and Analysis, 2001. ISPA 2001. Proceedings of the 2nd International Symposium on, IEEE. pp. 657 - 661. Rivest, R. L. (1997), The RC5 Encryption Algorithm. Retrieved July 15,2007, from http://www.people.csail.mit.edu/rivest/Rivest-rc5rev.pdf. Rohrig, S. & Knorr, K. (2000). Towards a Secure Web-Based Health Care Application. Privacy and Eflciency of Mobile Medical Systems. Retrieved September 22,2007, from http://www.ifi.unizh.ch/ikm/MobiMed/ecisvortrag.pdf. Schneier, B. (1996). Applied Cryptography (2nd ed). (pp.233-369). New York: John Wiley & Sons. Seberry, J. & Pieprzyk, J. (1989). Cryptography -An Introduction to Computer Security. (pp. 268-279). Brent, P. Richard. Shapiro, B. (2006). Best Practices: Keeping Data Secure with Encryption Technology. 2006 Faulkner Information Services. Retrieved October 01,2007, from http://www.shinwon.co.kr/db/paper/encryption0306.pdf. Sklavos, N.& Machas, C.& Koufopavlou, 0. (2003). Area Optimized Architecture and Visi Implementation of RC5 Encryption Algorithm. IEEE Electronics, Circuits and Systems, Vol. 1, pp. 172- 175. Tamimi, A. (2006). Performance Analysis of Data Encryption. Retrieved August 18,2007, from http://www.cse.wustl.edu/jain/cse567-06/ftp/ encryption_perf/index.html. Viega, J. & Messier, M. & Chandra, P. (2002). Cryptography for Secure Communications. Network Security with Open SSL. Retrieved October 13,2007, from http://www. foundstone.com/us/pdf/books/book18-samplechapter.pdf. Whitson, G. (2003). Computer security: theory, process and management. Journal of Computing Sciences in Colleges ACM, 6 (18). Wu, Y. & Offutt, J. (2002). Modeling and Testing Web-based Applications, Retrieved September 15,2007, from http://www.ise.gmu.edu/techrep/2002/02_08.pdf. Wu, Y. & Wong, S. (2004). Design Challenges in Security Processing. Retrieved August 09,2007, From http:// www.ce.et.tudelft.nl/publicationfiles/l049_14_wu2.pdf.