DESIGN AND IMPLEMENTATION OF MICROPROCESSOR-BASED DIGITAL SIGNATURE FOR MOBILE-CARE DEVICE

It is important to ensure the data security of biosignals transmitted by a wireless network. This paper proposes a mobile-care device using Tame Transformation Signatures (TTS), which is a digital signature scheme from the family of asymmetric public key systems to encrypt the electrocardiogram (ECG) data. TTS has the advantages of high security, fast key generation, complex algorithm, less calculations and low signature delay. The proposed system consists of a mobile-care device to measure ECG signal, a key center to generate key pair, and a monitor center. The proposed ECG mobile-care device adopts the TI MSP430F449 microprocessor as the kernel and generates 8-byte hash codes and 10-byte signatures to sign the data. And the mobile-care device transmits the signed data through a wireless network to the server to decrypt. This paper describes the design and implementation of the proposed system in detail and also completely verifies the validity of the proposed system.

[1]  Whitfield Diffie,et al.  Analysis of a Public Key Approach Based on Polynomial Substitution , 1985, CRYPTO.

[2]  Vincent Rijmen,et al.  The NIST Cryptographic Workshop on Hash Functions , 2006, IEEE Secur. Priv..

[3]  Aloka Sinha,et al.  A technique for image encryption using digital signature , 2003 .

[4]  Louis Goubin,et al.  A Fast and Secure Implementation of Sflash , 2003, Public Key Cryptography.

[5]  Tzer-Shyong Chen,et al.  An efficient threshold RSA digital signature scheme , 2005, Appl. Math. Comput..

[6]  Benoit M. Macq,et al.  A robust soft hash algorithm for digital image signature , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[7]  Dragos Trinca,et al.  Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).

[8]  Daniel Lazard,et al.  Gröbner-Bases, Gaussian elimination and resolution of systems of algebraic equations , 1983, EUROCAL.

[9]  T. T. Moh,et al.  A public key system with signature and master key functions , 1999 .

[10]  John Ayoade,et al.  Security implications in RFID and authentication processing framework , 2006, Comput. Secur..

[11]  Alok Gupta,et al.  Digital signature: use and modification to achieve success in next generational e-business processes , 2004, Inf. Manag..

[12]  Çetin Kaya Koç,et al.  High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor , 2001 .

[13]  Alex Biryukov,et al.  An introduction to Block Cipher Cryptanalysis , 2006, Proceedings of the IEEE.