Академический Документы
Профессиональный Документы
Культура Документы
medical records more readily and easily among medical providers and health insurance
companies without compromising the privacy and confidentiality of the patient by assuring the
sender and the receiver of the information are authenticated and valid transmitters and recipients.
While protecting electronic medical records from the exploits of ill-intended persons is a
reputable use for cryptography, there are other uses of cryptography that do not seem so virtuous.
The use of cryptography in the planning of international terrorist attacks is not the most orthodox
use of secret code writing. The planning of the terrorist attacks of September 11, 2001 against the
United States reportedly involved the use of cryptography as well as steganography, which is the
hiding of messages within an image. Stephen Budiansky (2002), journalist for Atlantic Monthly,
contends that, Some reports suggest al Qaeda not only used encrypted e-mail but also hid
encrypted message texts within picture files or other data that could be downloaded from a Web
site (p. 35).
The standard encryption used in email is the Pretty Good Privacy (PGP) system. The
PGP system is an asymmetrical encryption method which utilizes public-key cryptography. A
cryptographic algorithm, one of which is Secure Hash Algorithm -1 (SHA-1), is used to link a
users public and private key pair. The public key is for encrypting the files and the private key
for decrypting the files. The sender and recipient exchange keys in order to encrypt messages
with the others public key and the messages are decrypted using the others private key
(Peschel, 1997). The use of PGP cryptography permits users to transmit data more securely via
email, and in the case of al Qaeda, transmit the secret plan for the launching of attacks on the
United States on September 11, 2001 which resulted in the deaths of an estimated 2,977 innocent
victims.
References
Budiansky, S. (2002). Losing the code war. Atlantic Monthly (10727825), 289(2), 33. Retrieved
from
http://web.a.ebscohost.com.muncie.libproxy.ivytech.edu.allstate.libproxy.ivytech.edu/eho
st/pdfviewer/pdfviewer?sid=c13bc31a-38d4-4a40-82daf1bde3ec7d64%40sessionmgr4005&vid=202&hid=4207
Health Insurance Portability and Accountability Act (HIPAA). (2010). News Media & the Law,
34(2), 3. Retrieved from
http://web.a.ebscohost.com.muncie.libproxy.ivytech.edu.allstate.libproxy.ivytech.edu/eho
st/pdfviewer/pdfviewer?sid=c13bc31a-38d4-4a40-82daf1bde3ec7d64%40sessionmgr4005&vid=110&hid=4207
Hui-Mei, C., Shih-Hsiung, T., & Chin-Ming, H. (2005). A patient-identity security mechanism
for electronic medical records during transit and at rest. Medical Informatics & the
Internet in Medicine, 30(3), 227-240. doi:10.1080/14639230500209443. Retrieved from
http://web.a.ebscohost.com.muncie.libproxy.ivytech.edu.allstate.libproxy.ivytech.edu/eho
st/pdfviewer/pdfviewer?sid=c13bc31a-38d4-4a40-82daf1bde3ec7d64%40sessionmgr4005&vid=208&hid=4207
Peschel, J. (1997). PGP Mail brings strong encryption to 32-bit platforms. Infoworld, 19(13), 94.
Retrieved from
http://web.a.ebscohost.com.muncie.libproxy.ivytech.edu.allstate.libproxy.ivytech.edu/eho
st/detail?sid=c13bc31a-38d4-4a40-82da-
f1bde3ec7d64%40sessionmgr4005&vid=212&hid=4207&bdata=JnNpdGU9ZWhvc3Qtb
Gl2ZQ%3d%3d#db=aph&AN=9705023975
Sanders, J. (2013, September 13). The facts of life. [Video]. Retrieved from
http://www.youtube.com/watch?v=Sd6wEeKjbqg