15.12.2012 Views

Digital Imaging and Communications in Medicine (DICOM)

Digital Imaging and Communications in Medicine (DICOM)

Digital Imaging and Communications in Medicine (DICOM)

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

256<br />

11.3.2<br />

Encryption<br />

Chapter 11 <strong>DICOM</strong> Security<br />

Ancient Romans used to shave their slaves’ heads, write secret messages on<br />

them, <strong>and</strong> let the hair grow. An <strong>in</strong>genious way of implement<strong>in</strong>g data security.<br />

The papal scribes <strong>in</strong> the first crusades used secret text-encod<strong>in</strong>g tools <strong>and</strong> had<br />

to be executed after a year of active duty <strong>in</strong> order to ma<strong>in</strong>ta<strong>in</strong> secrecy (share<br />

this with your system adm<strong>in</strong>istrator). The whole history of human civilization<br />

is filled with attempts to encode secrets <strong>and</strong>, consequently, equal attempts to<br />

break the codes.<br />

The ma<strong>in</strong> outcome of this quest was summarized by Mr. Sherlock Holmes:<br />

“What is <strong>in</strong>vented by one man, can be always understood by some other.” Applied<br />

to our subject of data encryption, this can be restated as: any security<br />

code can be broken. It’s just a matter of time.<br />

Encryption is the process of chang<strong>in</strong>g the format of the data to protect its<br />

orig<strong>in</strong>al content. Essentially, encryption can be viewed as translat<strong>in</strong>g your data<br />

<strong>in</strong>to another language (code) that cannot be understood without a special key.<br />

Unlike anonymization, encryption has to be reversible; that is, you can always<br />

translate your data back to the orig<strong>in</strong>al form without any <strong>in</strong>formation loss. The<br />

reversibility of encryption elim<strong>in</strong>ates the entire problem of los<strong>in</strong>g important<br />

data that we faced with anonymization. If you have carefully read the previous<br />

section on <strong>DICOM</strong> anonymization, you should realize that our attempt to encode<br />

confidential <strong>DICOM</strong> tags <strong>in</strong> a unique <strong>and</strong> consistent way was, <strong>in</strong> fact, an<br />

<strong>in</strong>itial approach to encryption.<br />

Part PS3.15 of the <strong>DICOM</strong> st<strong>and</strong>ard, released a few of years ago, adopted<br />

the exist<strong>in</strong>g data encryption techniques to be used with <strong>DICOM</strong> data. These<br />

techniques pursue three important goals: encrypt<strong>in</strong>g the data, verify<strong>in</strong>g the<br />

data orig<strong>in</strong>, <strong>and</strong> verify<strong>in</strong>g the data <strong>in</strong>tegrity. The <strong>DICOM</strong> st<strong>and</strong>ard still needs<br />

to do a good bit of expla<strong>in</strong><strong>in</strong>g how encryption can be worked <strong>in</strong>to the entire<br />

<strong>DICOM</strong> IOD model <strong>and</strong> encod<strong>in</strong>g. Meanwhile, we can review the conceptual<br />

part shared by all encryption techniques.<br />

11.3.2.1<br />

How it All Works<br />

Encryption of digital data can be compared to lossless image compression: you<br />

reversibly transform the orig<strong>in</strong>al data <strong>in</strong>to another format, impossible to read,<br />

unless you decode the data back to its orig<strong>in</strong>al form. Consider someth<strong>in</strong>g as<br />

simple as patient name, “SMITH^JOE”. If left as is, it can easily be spotted <strong>in</strong> a<br />

<strong>DICOM</strong> file or <strong>DICOM</strong> object (see 11.1) without any particular <strong>DICOM</strong> software<br />

or skills.<br />

Even if you merely replaced each letter <strong>in</strong> the patient’s name by the follow<strong>in</strong>g<br />

letter <strong>in</strong> the alphabet, you would get someth<strong>in</strong>g more secure: “TNJUI^KPF”.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!