Professional Documents
Culture Documents
Use Case Diagram
Use Case Diagram
login
auth request
receive request
extract ip
generate otc
receive otc
User
Proxy server
generate s ymmetric key
with ip
Attacker
mantain authentication
records
injection in server
server check ip
reject authentication
Class diagram
cloud server
send encrypted otc
maintain authendication
Attacker check unauthorised access
injection reject authentication
login
auth request
ps receive
request
extract ip
generate otc
generate symetric
key with ip
send
encrypted otc
decrypt otc in
client device
maintain
authentication
attak injection
in server
cloud server
verify ip
reject
authentication
Sequence diagram
9: check ip
1.login
2.auth request 4. receive request
1: 5.extract ip
12.decrypt otc in
clint device User proxy server
2:
6.generate otc
11.send encrypted 7.send otc to qkd.
otc
15.injection in server
4:
attacker cloud server quantum key 8.receive otc
distributon
16.check ip
5: 17.reject authentication 14.maintain 9.encrypt otc with symmetric key. 3:
authentication 10.send encrypted otc with auth
respond.
Dfd diagrams
Level 0
Level 1
Level 2