15.12.2012 Views

Digital Imaging and Communications in Medicine (DICOM)

Digital Imaging and Communications in Medicine (DICOM)

Digital Imaging and Communications in Medicine (DICOM)

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

11.3 Secur<strong>in</strong>g the Data 257<br />

This is already huge progress; the real name of the patient is now completely<br />

hidden. You can show this to anyone <strong>and</strong> they won’t be able to read it, but you<br />

(or your bus<strong>in</strong>ess partner, know<strong>in</strong>g the next letter encryption rule) can always<br />

decode the orig<strong>in</strong>al name. This is the essence of data encryption, <strong>and</strong> the only<br />

major problem with the “next letter” code is that it is too easy to break. There is<br />

another problem: the <strong>in</strong>formation about your method may eventually leak <strong>in</strong>to<br />

the public doma<strong>in</strong>, which will immediately expose all of your encrypted data.<br />

You will have to start over.<br />

This is why a set of much more complex <strong>and</strong> <strong>in</strong>genious algorithms has been<br />

developed to encrypt your <strong>in</strong>formation <strong>in</strong> a most unbreakable manner. These<br />

techniques are based on math <strong>and</strong> number theory, <strong>and</strong> rema<strong>in</strong> well beyond the<br />

scope of this book. Nevertheless, the essence of modern encryption is simple to<br />

grasp; it is based on someth<strong>in</strong>g we can call the piggy bank approach (Fig. 80).<br />

It’s easy to put a co<strong>in</strong> <strong>in</strong> a piggy bank, <strong>and</strong> it is impossible to get it out unless<br />

you have a key to a secret open<strong>in</strong>g at the bottom (let’s just assume for a<br />

moment that brute-force hammer<strong>in</strong>g will not work). Instead of piggy banks,<br />

most current encryption algorithms rely on number factor<strong>in</strong>g. If I give you two<br />

numbers (A = 4091 <strong>and</strong> B = 9859) <strong>and</strong> ask you to multiply them, you will solve<br />

the problem very quickly, if not on paper, then at least with any calculator or<br />

computer. If, on the contrary, I give you a number (40,333,169) <strong>and</strong> ask you to<br />

f<strong>in</strong>d its factors (numbers A <strong>and</strong> B such that A×B = 40,333,169) the problem becomes<br />

much tougher; there is really no way to f<strong>in</strong>d its factors other than try<strong>in</strong>g<br />

all possible comb<strong>in</strong>ations of A <strong>and</strong> B. But if I give you the value of A (a key),<br />

then you’ll be able to f<strong>in</strong>d (decrypt) B rather quickly: B = 40,333,169/A.<br />

For large numbers, number multiplication (encryption) <strong>and</strong> number division<br />

(decryption) can still be done very fast. But number factor<strong>in</strong>g (brute-force<br />

break<strong>in</strong>g the code without know<strong>in</strong>g the keys) might take years even on a fast<br />

computer; <strong>and</strong> this is the whole idea beh<strong>in</strong>d contemporary data encryption.<br />

These encryption techniques can very easily encode any data (with the use<br />

of public keys), but gett<strong>in</strong>g the data back (decrypt<strong>in</strong>g) requires very special<br />

knowledge (a secret private key). Your entire PACS or teleradiology network<br />

can become a security fortress <strong>in</strong> which data submitted to it is easily hidden<br />

Fig. 80 Piggy-bank security

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!