Home

/

Features

Features

By accessing our website, you are agreeing to be bound by these terms of service, all applicable laws and regulations.

HipaaChecker Features

UNIQUE USER ID TRACKING

PHI EMERGENCY ACCESS

SESSION MANAGEMENT

ENCRYPTION AND DECRYPTION

PREVENT UNAUTHORIZED PHI ALTERATION AND DESTRUCTION

INTEGRITY CONTROLS OVER TRANSMISSION

PHI ENCRYPTION

ACCESS CONTROL

arrow-down

ENCRYPTION AND DECRYPTION (Addressable) - § 164.312(a)(2)(iv)

Preventing access to EPHI by persons or software programs that have not been granted access rights is essential. Healthcare software/applications must “Implement a mechanism to encrypt and decrypt electronic protected health information”. The goal of encryption is to protect EPHI from being accessed and viewed by unauthorized users.

HIPAAChecker Assistance to Implement encryption and decryption procedures to secure PHI transmissions

HIPAACkecker checks whether an application implements the National Institute of Standards and Technology (NIST) approved encryption and decryption procedures to protect PHI. We identify vulnerabilities in your implemented encryption and decryption algorithms and show you how to improve security to meet NIST standards. Several types of encryption and decryption algorithms are used to secure data. Here are some of the most commonly used algorithms that HIPAAChecker inspects:

Symmetric-key Encryption:

In symmetric-key encryption, the same key is used for both encryption and decryption. Examples include:

  • Data Encryption Standard (DES): An old symmetric-key algorithm that uses a 56-bit key. It’s considered insecure due to its relatively small key size.

  • Triple DES (3DES): A variant of DES that applies the DES algorithm three times with different keys for increased security. This is also vulnerable to cyber-attacks.

  • Advanced Encryption Standard (AES): A widely used symmetric-key algorithm that supports key lengths of 128, 192, and 256 bits. AES is recommended by NIST and is considered highly secure.

Asymmetric-key Encryption (Public-key Encryption):

Public-key encryption and private-key decryption methods. Examples include:

  • RSA (Rivest-Shamir-Adleman): One of the most widely used public-key cryptosystems and secure, based on the mathematical problem of factoring large integers.

  • Elliptic Curve Cryptography (ECC): A type of public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC offers smaller key sizes compared to RSA while providing equivalent security.

Hash Functions:

HIPAAChecker ensures your implemented hash functions are strong and secure. Examples include:

  • MD5 (Message Digest 5): A weak hash function and may cause collision.

  • SHA (Secure Hash Algorithm): A family of hash functions, including SHA-1, SHA-256, SHA-384, and SHA-512, with varying digest sizes. Except for SHA-256 and SHA-512, others are insecure.

Block Ciphers:
  • ECB Mode: ECB mode’s advantages are its simplicity and ability to parallelize encryption and decryption operations. However, ECB mode is known to be weak, as it results in the same ciphertext for identical blocks of plaintext. Alternative secure block cipher methods are Cipher Block Chaining (CBC), Counter Mode (CTR), or galois/Counter Mode (GCM).

  • DES (Data Encryption Standard): An older block cipher with a 64-bit block size and 56-bit key size and its insecure.

  • AES (Advanced Encryption Standard): A widely used block cipher with block sizes of 128, 192, and 256 bits, approved by NIST.

Certify and Protect Your

Apps

with

HIPAAChecker