# UML and Cryptography

12 Pages3025 Words447 Views
|
|
|
UML AND CRYPTOGRAPHY
Name of the Student:
Name of the University:
Author Note:
1UML AND CRYPTOGRAPHY
Introduction..........................................................................................................................................2
Description...........................................................................................................................................2
Use Case Scenario of the My Health Record or MHR System........................................................2
The UML Diagram for the MHR:.....................................................................................................3
The use cases for the MHR:.............................................................................................................3
The misuse cases of the MHR:.........................................................................................................3
Interactions between the actors and the selected use case:.............................................................4
Use case description:.......................................................................................................................4
Brief Survey on Cryptographic Algorithms.....................................................................................5
Symmetric versus Asymmetric Key Cryptography with examples:..................................................5
Comparison between two cipher substitution algorithms: Playfair and Caesar ciphers................7
Reflections on private and public keys and their association with the MHR:.................................8
A recent Cryptographic Algorithm...................................................................................................9
Identifying a new proposed algorithm:............................................................................................9
Working of the proposed algorithm:................................................................................................9
Reflections on applying the proposed algorithm in MHR system:.................................................10
Recommendation................................................................................................................................11
Conclusion..........................................................................................................................................11
References..........................................................................................................................................12
2UML AND CRYPTOGRAPHY
Introduction
Cryptography is a field of science which deals with providing security to machines and data.
The basic idea of cryptography is to secure a piece of data by transforming it into a cryptogram
which cannot be decrypted by unauthorised people without its unique decoding key (Khan and
Tuteja, 2015). The process is known as encryption algorithm and it requires an encryption key as
input. To revert the data to its normal readable form a decryption algorithm is used which also uses
a decryption key.
In this report, the symmetric and the asymmetric cryptographic algorithms will be analysed.
Their interaction with the Australian My Health Record or MHR system will also be highlighted.
The use cases and misuse cases of the MHR systems will also be briefly discussed. In this paper, a
recent cryptographic algorithm will be discussed and how it can be implemented to the MHR
system of Australia.
Description
Use Case Scenario of the My Health Record or MHR System
The scenario given in this report is about the Australian MHR system. The MHR is a system
that keeps track of all the health information data in one secure place. The MHR can be accessed by
different users like doctors, hospitals and even pharmacists. This is the system’s primary use. For
secondary use, the system can be used by researchers and other people for academic purposes.
3UML AND CRYPTOGRAPHY
The UML Diagram for the MHR:
Figure 1 MHR UML Diagram
The use cases for the MHR:
2. Write prescriptions
3. Recommend patients to specialists
4. View data
5. Delete data
6. Account locked
The misuse cases of the MHR:
1. Alter record data
2. Alter prescription data
3. Improper recommendation
4. Steal data
5. Erase data illegally
6. Flood system

## End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents

### Support

#### +1 306 205-2269

Chat with our experts. we are online and ready to help.