Improved Classical Cipher for Healthcare Applications

Abstract E-health is rapidly picking up the gear and providing lots of services. It facilitates novel solutions for the problems suffered by the aged people as well as the people affected with chronic diseases. Apart from the above services, it devotes much interest in personal fitness. The healthcare system makes use of wearable wireless sensors which are implanted in patients, allow the monitoring of the health status at all time. The data collected from the patients transmitted through the network to the clinic or the doctor for a detailed diagnosis. Since healthcare applications are dealing with highly sensitive data, strong cryptographic algorithms should be incorporated for providing confidentiality. However, due to the computational and energy limitations of wireless devices we are forced to implement light weight ciphers which are computationally feasible in achieving confidentiality. This paper proposes a variant of hill cipher having two key matrices to add extra security to health related data.

[1]  Menezes Bernard Network Security and Cryptography , 2010 .

[2]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[3]  A. Trad,et al.  Performance evaluation of encryption algorithm for wireless sensor networks , 2012, 2012 International Conference on Information Technology and e-Services.

[4]  William Stallings,et al.  Network Security Essentials: Applications and Standards , 1999 .

[5]  William Stallings Zhu,et al.  Network Security Essentials : Applications and Standards , 2007 .

[6]  Y. Rangel-Romero,et al.  Comments on “How to repair the Hill cipher” , 2008 .

[7]  Abolfazl Falahati,et al.  A secure variant of the Hill Cipher , 2009, 2009 IEEE Symposium on Computers and Communications.

[8]  Muhammad Osama,et al.  Assessing acceptability of hypertensive/diabetic patients towards mobile health based behavioral interventions in Pakistan: A pilot study , 2015, Int. J. Medical Informatics.

[9]  Athanasios V. Vasilakos,et al.  A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues , 2015, J. Netw. Comput. Appl..

[10]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[11]  William Stallings,et al.  Network security essentials - applications and standards (2. ed.) , 2003 .

[12]  Lester S. Hill Cryptography in An Algebraic Alphabet , 1929 .

[13]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[14]  Shahrokh Saeednia HOW TO MAKE THE HILL CIPHER SECURE , 2000, Cryptologia.

[15]  Mohammed Amin,et al.  How to repair the Hill cipher , 2006 .

[16]  Chris W. Johnson,et al.  Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template , 2015, Int. J. Medical Informatics.

[17]  Jeffrey Overbey,et al.  ON THE KEYSPACE OF THE HILL CIPHER , 2005, Cryptologia.

[18]  Nikolaos G. Bourbakis,et al.  A Survey on Wearable Sensor-Based Systems for Health Monitoring and Prognosis , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[19]  Kyung-Sup Kwak,et al.  The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.

[20]  David Samyde,et al.  Side channel cryptanalysis , 2002 .