Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Use case diagram

login

auth request

receive request

extract ip

generate otc

transfer otc to qkd

receive otc
User
Proxy server
generate s ymmetric key
with ip

encrypt otc with semmetric


key

QKD send encrypted otc with


auth respond

send ecrypted otc Cloud server

decrypt otc in client device

Attacker
mantain authentication
records

injection in server

server check ip

reject authentication
Class diagram

proxy server Quantum key distribution


User receive request receive otc
login extract ip generate symmetric
request generate otc encrypt otc with symmetric key
decrypt otc transfer otc to qkd send encrypted otc

login() receive request() receive otc()


auth request() extract ip() generate symmetric key with ip()
decrypt otc() generate otc() encrypt otc with symmetric key()
transfer otc to qkd() send encrypted otc with auth respond()

cloud server
send encrypted otc
maintain authendication
Attacker check unauthorised access
injection reject authentication

injection in server() send encrypted otc()


maintain authendication()
check unauthorised access()
reject authentication()
Activity diagram

login

auth request

ps receive
request

extract ip

generate otc

sevd otc to qkd

qkd receve otc

generate symetric
key with ip

encrypt otc with


symmetric key

send encrypted otc


with auth respond

send
encrypted otc

decrypt otc in
client device

maintain
authentication

attak injection
in server

cloud server
verify ip

reject
authentication
Sequence diagram

User proxy server quantum key cloud server attacker


distribution

1: login and auth request

2: extract ip and generate otc

3: send otc to qkd

4: encrypt otc with symmetric key

5: send encrypted otc with auth respond

6: send encrypted otc and maintain authentication

7: decrypt otc in client device

8: cookie injection in server

9: check ip

10: reject authentication


Collaboration diagram

1.login
2.auth request 4. receive request
1: 5.extract ip
12.decrypt otc in
clint device User proxy server
2:

6.generate otc
11.send encrypted 7.send otc to qkd.
otc

15.injection in server
4:
attacker cloud server quantum key 8.receive otc
distributon
16.check ip
5: 17.reject authentication 14.maintain 9.encrypt otc with symmetric key. 3:
authentication 10.send encrypted otc with auth
respond.
Dfd diagrams

Level 0
Level 1
Level 2

You might also like