Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/ICITA.2005.149guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

FPGA and ASIC Implementation of ECC Processor for Security on Medical Embedded System

Published: 04 July 2005 Publication History

Abstract

The system as a PACS (Picture Archiving and Communication System) which handles medical image saves patientýs medical image information and transports them. This needs security processor for userýs authentication and encrypted information based on PKI (Public Key Infrastructure). The DICOM (Digital Imaging Communications in Medicine) which is a standard of PACSýs transmission has adopted RSA(Rivest Shamir Adleman) in the authentication and transmission which is public key algorithm [2]. However, in Embedded medical image system using low power and restricted hardware resource, itýs long key size is an important problem on the hardware implementation and processing time. Moreover, the public key algorithm, ECC (Elliptic Curve Cryptography) supported higher security than those of RSA in the same key size [1]. In this paper, the DICOM security standard RSA is substituted for ECC and we implemented it. ECC is implemented on GF(2 ) using polynomial base. Finite field operating used Montgomery algorithm and Brunner Extended Euclidian algorithm. ECC point multiplication operating used Radix-4 scalar multiplication. And we verified it on ISE 6.2 software using the Xilinx Vertex 1000E FPGA. Finally, we designed and verified it by semi-custom ASIC design.

Cited By

View all
  • (2015)Cryptographic Theory Meets PracticeACM Transactions on Information and System Security10.1145/269990417:3(1-31)Online publication date: 27-Mar-2015
  • (2007)High speed modular divider based on GCD algorithmProceedings of the 9th international conference on Information and communications security10.5555/1785001.1785021(189-200)Online publication date: 12-Dec-2007

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ICITA '05: Proceedings of the Third International Conference on Information Technology and Applications (ICITA'05) Volume 2 - Volume 02
July 2005
1538 pages
ISBN:0769523161

Publisher

IEEE Computer Society

United States

Publication History

Published: 04 July 2005

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2015)Cryptographic Theory Meets PracticeACM Transactions on Information and System Security10.1145/269990417:3(1-31)Online publication date: 27-Mar-2015
  • (2007)High speed modular divider based on GCD algorithmProceedings of the 9th international conference on Information and communications security10.5555/1785001.1785021(189-200)Online publication date: 12-Dec-2007

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media