logo

UML and Cryptography

12 Pages3025 Words447 Views
   

Added on  2023-04-21

About This Document

This report explores the use of UML and Cryptography in the Australian My Health Record (MHR) system. It discusses the use cases and misuse cases of the MHR system, compares symmetric and asymmetric key algorithms, and analyzes cipher substitution algorithms. It also proposes the implementation of a new cryptographic algorithm in the MHR system for improved security.

UML and Cryptography

   Added on 2023-04-21

ShareRelated Documents
Running head: UML AND CRYPTOGRAPHY
UML AND CRYPTOGRAPHY
Name of the Student:
Name of the University:
Author Note:
UML and Cryptography_1
1UML AND CRYPTOGRAPHY
Table of Contents
Introduction..........................................................................................................................................2
Description...........................................................................................................................................2
Use Case Scenario of the My Health Record or MHR System........................................................2
The UML Diagram for the MHR:.....................................................................................................3
The use cases for the MHR:.............................................................................................................3
The misuse cases of the MHR:.........................................................................................................3
Interactions between the actors and the selected use case:.............................................................4
Use case description:.......................................................................................................................4
Brief Survey on Cryptographic Algorithms.....................................................................................5
Symmetric versus Asymmetric Key Cryptography with examples:..................................................5
Comparison between two cipher substitution algorithms: Playfair and Caesar ciphers................7
Reflections on private and public keys and their association with the MHR:.................................8
A recent Cryptographic Algorithm...................................................................................................9
Identifying a new proposed algorithm:............................................................................................9
Working of the proposed algorithm:................................................................................................9
Reflections on applying the proposed algorithm in MHR system:.................................................10
Recommendation................................................................................................................................11
Conclusion..........................................................................................................................................11
References..........................................................................................................................................12
UML and Cryptography_2
2UML AND CRYPTOGRAPHY
Introduction
Cryptography is a field of science which deals with providing security to machines and data.
The basic idea of cryptography is to secure a piece of data by transforming it into a cryptogram
which cannot be decrypted by unauthorised people without its unique decoding key (Khan and
Tuteja, 2015). The process is known as encryption algorithm and it requires an encryption key as
input. To revert the data to its normal readable form a decryption algorithm is used which also uses
a decryption key.
In this report, the symmetric and the asymmetric cryptographic algorithms will be analysed.
Their interaction with the Australian My Health Record or MHR system will also be highlighted.
The use cases and misuse cases of the MHR systems will also be briefly discussed. In this paper, a
recent cryptographic algorithm will be discussed and how it can be implemented to the MHR
system of Australia.
Description
Use Case Scenario of the My Health Record or MHR System
The scenario given in this report is about the Australian MHR system. The MHR is a system
that keeps track of all the health information data in one secure place. The MHR can be accessed by
different users like doctors, hospitals and even pharmacists. This is the system’s primary use. For
secondary use, the system can be used by researchers and other people for academic purposes.
UML and Cryptography_3
3UML AND CRYPTOGRAPHY
The UML Diagram for the MHR:
Figure 1 MHR UML Diagram
The use cases for the MHR:
1. User login
2. Write prescriptions
3. Recommend patients to specialists
4. View data
5. Delete data
6. Account locked
The misuse cases of the MHR:
1. Alter record data
2. Alter prescription data
3. Improper recommendation
4. Steal data
5. Erase data illegally
6. Flood system
UML and Cryptography_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
The cryptographic algorithm assignment
|9
|1446
|21

Principle and Method in Cryptographic Security | Discussion
|4
|638
|19

Symmetric Encryption Assignment
|5
|884
|175

Cryptographic Algorithms for Australian My Health Record System
|6
|1809
|47

Security at an Instant Messaging Service
|15
|3178
|96

Cryptographic Techniques
|6
|2878
|62