• Nie Znaleziono Wyników

ДРКН 14.257.13.001 ПЗ

N/A
N/A
Protected

Academic year: 2021

Share "ДРКН 14.257.13.001 ПЗ"

Copied!
3
0
0

Pełen tekst

(1)

Змн. Арк. № докум. Підпис Дата

ДРКН 14.257.13.001 ПЗ

Арк.

ANNOTATION

Research encryption methods of biomedical information for the issues of Telemedicine // Diploma work degree “Master” // Dombrovska Olesya Myroslavivna // Ternopil Ivan Pul’uj National Technical University. Department of Computer Information Systems and Software Engineering. Department of Computer Science // Ternopil, 2014 // P. , Fig. - , Table. - .

Telemedicine is the use of medical information exchanged from one site to another via electronic communications to improve a patient’s clinical health status.

Telemedicine includes a growing variety of applications and services using two- way video, email, smart phones, wireless tools and other forms of

telecommunications technology.

Starting out over forty years ago with demonstrations of hospitals extending care to patients in remote areas, the use of telemedicine has spread rapidly and is now becoming integrated into the ongoing operations of hospitals, specialty departments, home health agencies, private physician offices as well as consumer’s homes and workplaces.

Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, authentication, and non- repudiation.

Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense.

(2)

Змн. Арк. № докум. Підпис Дата

ДРКН 14.257.13.001 ПЗ

Арк.

The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons to do the same. Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary. It is theoretically possible to break such a system, but it is infeasible to do so by any known practical means.

There exist information-theoretically secure schemes that provably cannot be broken even with unlimited computing power—an example is the one-time pad

—but these schemes are more difficult to implement than the best theoretically breakable but computationally secure mechanisms.

Cryptography has long been of interest to intelligence gathering and law enforcement agencies. Secret communications may be criminal or even treasonous.

Because of its facilitation of privacy, and the diminution of privacy attendant on its prohibition, cryptography is also of considerable interest to civil rights supporters.

Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (called plaintext) into unintelligible text (called ciphertext). Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. A cipher (or cypher) is a pair of algorithms that create the encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and in each instance by a "key". This is a secret (ideally known only to the communicants), usually a short string of characters, which is needed to decrypt the ciphertext.

A "cryptosystem" is the ordered list of elements of finite possible plaintexts, finite possible cyphertexts, finite possible keys, and the encryption and decryption algorithms which correspond to each key. Keys are important, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore useless (or even counter-productive) for most purposes.

(3)

Змн. Арк. № докум. Підпис Дата

ДРКН 14.257.13.001 ПЗ

Арк.

In the first chapter of the thesis deals with electronic systems and examined their practical implementation. The basic concept of telemedicine and main tasks. We consider the application of telemedicine and its perevaty for patients, health professionals and health facilities and institutions. The comparison of ADC and DAC and their use. We consider signals and their types.

In the second chapter of the thesis was determined and proved the thesis problem. A preparation for the next stage.

In the third chapter of the thesis compared and defined encryption algorithms to be implemented. Familiar with their features encryption.

The fourth section is implemented software which raised problems in the thesis.

Object of study: the communication of data which examines telemedicine.

Purpose of the study: encryption and decryption of biomedical information.

Objective: To develop an electronic system and writing software environment that implements encryption and decryption.

Main results: The algorithms encryption analyzes, out requirements, it was determined the problem thesis and implemented software. The tehnology, developed a data model, open architecture software, user interface.

The novelty of work includes a new method of biomedical information processing tasks for telemedicine. The developed system consists of digitizing data using quantization through ADC connected to the computer, and the encryption method selected from the list of implemented algorithms and decryption using the created software. Before the transfer of information held without encryption. The electronic system aimed at preserving the input signal during it send and limited access to view theft case. If someone substitute the information transmitted, then the deciphering this information is displayed and not be a true.

Keywords: TELEMEDICINE, ENCRYPTION, CRYPTOGRAPHY, SIGNALS, QUANTIZATION.

Cytaty

Powiązane dokumenty

Do radzieckiego Ludowego K om isariatu Spraw Zagranicznych docho­ dziły i inne jeszcze inform acje, które utw ierdzały go w przekonaniu o kon­ tak tach Piłsudskiego z

Innym dyżur- nym tematem prasowym są coroczne wyniki badań czytelnictwa pokazujące bardzo mizerne miejsce Polski w rankingu europejskim i kurczenie się grupy osób mających

Weszpiński (tekst); Ryszard Mączewski (oprac. broszury), Małgorza- ta Mycielska (współpr.), Plan Warszawy 1939 : Plan miasta stołecznego .. Warszawy,

Po dochodach z dóbr ziemskich w protokołach kamlarskich księ- gowano wpływy do kasy miejskiej z urzędów oraz źródeł, które były pod specjalną kontrolą

The knowledgebase is centered on the Target Track, a registration database that is monitoring experimental progress and status of protein targets selected for

Виконане дослідження дає можливість виділити основні аспекти оптимізаці та технічні засобі які необхідні для її реалізації; – проаналізовано теоретичні основи

У ході виконання магістерської роботи було досліджено структуру і функції інтелектуальної системи у цілому і її окремих

This situation leads to a growing interest in solutions which enable the production of high quality coke based on coal blends which contain a lower share of hard-type coking