2Cyber Algorithm Introduction: This report is divided into three activities. The first activity provides different use cases and their functionality within the system, the second activity can display a brief survey onthecryptographicalgorithmandthelastactivitiesprovidearecentcryptographic algorithm. Description: Activity 1: 5 use cases that can allow different users to interact with the MHR system. 1.Share patient health information. 2.Log in to the system. 3.Access patients' health information. 4.Write prescription. 5.Recommend patient to the specialists. The possible misuse cases for those use cases 1.Share health information among the wrong patient. 2.Sharing login credentials among another doctor. 3.Access patients for illegal purpose. 4.Write incorrect prescription. 5.Wrong specialists’ recommendation. Selecting Single-use case and providing the situation Log in to the system:
3Cyber Algorithm When adoctor needstoaccesspatientinformationor writea prescriptionor recommend a patient to the specialist, they need to log in order to access the system. Without a successful login a doctor unable to access the system. After a successful login, they can access patient information, write a prescription to the patient and recommend a specialist. Use case description as: NameLogin of a doctor. IDUC1 DescriptionTo perform many tasks with the system every doctor needs to log in first. Username and password are case sensitive. They need to provide their credentials in order to access the system. Their credentials provided during the registration. Username and password need to be matched to use the system. ActorsDoctors. Organizational Benefits MHR will have all activity details of a doctor. MHR can track every activity of a doctor and use it accordingly. With the help of this system a doctor unable to misuse the system. Frequency of UseEvery time when a doctor needs to access patient information or write a prescription or recommend a patient to the specialist TriggersWhen a doctor need patient information PreconditionsEvery activity of a doctor must be stored in the system. Post-conditionsThe organization will have every activity of a doctor. Main Course1.Doctor browse the system. 2.Doctors provide their credentials. 3.Click on login button
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4Cyber Algorithm Activity 2: 1. Symmetric key algorithm: This is a simple and powerful algorithm or encryption that can contain only one key cipher and decipher information (Tuncerand Avaroğlu.2017). This algorithm uses a key that can be a number, word or any string of letters. Asymmetric key algorithm: This algorithm also known as public-key cryptography. This algorithm uses two keys for encryptions. Only legitimate person can use the keys. Symmetric versus Asymmetric Key A single key is used in the symmetric encryption and that need to be shared among every people who required to receive the message (Henriquesand Vernekar.2017). In another hand, asymmetrical encryption uses multiple keys and one private key for the encrypt and decrypt a message. Symmetric encryption is a very old method while using of asymmetrical encryption method is relatively new. Asymmetrical encryption takes a long time to encryption and decryption while Symmetric encryption takes less time compared to Asymmetrical encryption (Al-Shabi.2019). 2. AtBash Substitution Cipher
5Cyber Algorithm This is one type of substitution cipher and it can replace every letter after reversing a letter. But this cipher does not provide any key this is the main reason to unable to provide security in communication (Maqsoodet al.2017). MHR can use this cipher for patient registration or doctor log in, but it fails to provide security so I cannot suggest to use this method. Caesar Cipher Substitution: This is an elementary method of encryption that can encrypt the test message to protect from various threats. During encryption, a person can check every letter of the message in the "plain text" and they can write down the matching letter in "ciphertext". Decoding can be done in the reverse way, with the right shift of 3(Patilet al.2016). MHR can use this method for sensitive communication between a doctor and patient. 3. I can use different encryption and decryption techniques for secure communication in the MHR. Some of these are discussed below: ElGamalEncryption: This is asymmetric key cryptographyand it can be used to represent the text as a series of numbers. We can use to save information in MHR for a secure connection. RSA: This is also a symmetric key encryption method and it can encrypt the whole data over the internet. This technique can be used to save information over the internet in MHR. ECC:
6Cyber Algorithm This encryption can be used for digital signature, pseudo-random generators and key agreement that is needed in MHR. Activity 3: 1.I have used google search and google schooler as well for the research paper where I have found many scholar articles that provides a detailed overview of encryption and decryption technique. 2.Most relevant algorithm is Triple DES. It is the most suitable algorithm to solve many issues in MHR. 3.The triple-DES or triple data encryption is one type of computerized algorithm where cipher algorithms are implemented to catch data block (ALIet al.2017). To ensure the data security this algorithm can increase its key size. In this algorithm every key is independent (Siahaan.2016). The main advantages of this algorithm are its key size. This algorithm can encrypt input three times 4.With the help of triple DES, it can solve many security issues of MHR. With the help of this algorithm, MHR can perfectly encrypt every essential information of doctor and patient and specialists. This encryption can help the organization from being disposed of their information. Recommendation: Triple DES can be used for more security. Organization must monitor every activity of a doctor. Before sharing the patient, information organization must provide legitimate details to every patient.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7Cyber Algorithm Conclusion: This, it can be concluded that with the help of encryption and description techniques every essential data can be saved. Provided use case and its misuse will help the authority to protect their data. a recent cryptographic algorithm triples des is helpful for this organization to save essential information.
8Cyber Algorithm References: Patil, P., Narayankar, P., Narayan, D.G. and Meena, S.M., 2016. A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish.Procedia Computer Science,78(1), pp.617-624. Maqsood, F., Ahmed, M., Ali, M.M. and Shah, M.A., 2017. Cryptography: A comparative analysis for modern techniques.International Journal of Advanced Computer Science and Applications,8(6), pp.442-448. Al-Shabi, M.A., 2019. A Survey on Symmetric and Asymmetric Cryptography Algorithms in informationSecurity.InternationalJournalofScientificandResearchPublications (IJSRP),9(3). ALI, M.I., AHMED, M.Z., MAHMOOD, M.T. and RAHMAN, S., 2017. AES, DES, Triple DES Encryption Efficiency Analysis. Siahaan, A.P.U., 2016, August. Three-Pass Protocol Concept in Hill Cipher Encryption Technique. InSeminar Nasional Aplikasi Teknologi Informasi (SNATI). Henriques,M.S.andVernekar,N.K.,2017,May.Usingsymmetricandasymmetric cryptographytosecurecommunicationbetweendevicesinIoT.In2017 International Conference on IoT and Application (ICIOT)(pp. 1-4). IEEE. Tuncer, T. and Avaroğlu, E., 2017, May. Random number generation with LFSR based streamcipheralgorithms.In201740thInternationalConventiononInformationand CommunicationTechnology,ElectronicsandMicroelectronics(MIPRO)(pp.171-175). IEEE.