Cryptographic techniques

Cryptographic techniques

Cryptographic techniques guarantee the confidentiality, integrity and availability of medical data. However, proper application of security mechanisms is highly non-trivial. For example, a typical misconception is that hashing identities anonymizes a set of medical data. In order to ensure that cryptography is properly applied, one has to be familiar with the limitations and strengths of various cryptographic designs. In our group, we have established cryptographic research related to hash functions, encryption and cryptographic key exchange. On hash functions, our work is concentrated on indifferentiability and multi-collision resistance. Work on encryption and key exchange focuses on novel light-weight cryptographic primitives and protocols applicable to remote health monitoring. Our work concentrates on finding alternatives to computationally heavy public key based algorithms such as Diffie-Hellman key exchange. This work is carried out using algebraic generalization and rigorous security proofs in the standard model of computational indistinguishability. Security in the quantum computation model is also of great importance. We have also turned our focus to a novel application of biometrics for the implementation of security mechanisms as a part of the Platform technology for Affordable, Continuous Health Monitoring – VitalSens (TEKES) project. Together with biometrics, research on the security mechanisms for the Internet of Things for medical devices is also gaining traction. To ensure the confidentiality of medical data, as well as the privacy of patients, novel cryptographic techniques need to be constructed. Some of these solutions can be based, for example, on the popular blockchain technology.

 

Last updated: 21.11.2016