Software Requirements Specification: Version 1.0 Approved
Software Requirements Specification: Version 1.0 Approved
Software Requirements Specification: Version 1.0 Approved
Specification
for
Prepared by
Riju Bhattacharyya,
Brettlee Correia and
Rosanne Fernando
27.02.2021
Software Requirements Specification for Cryptography with maze using Deep Learning Page 0
Table of Contents
Table of Contents ...................................................................................................................... 0
Revision History ........................................................................................................................ 0
1. Introduction ......................................................................................................................... 1
1.1 Purpose ....................................................................................................................................... 1
1.2 Document Conventions ............................................................................................................... 1
1.3 Intended Audience and Reading Suggestions............................................................................... 1
1.4 Product Scope ............................................................................................................................. 1
1.5 References .................................................................................................................................. 1
2. Overall Description ............................................................................................................. 2
2.1 Product Perspective..................................................................................................................... 2
2.2 Product Functions ....................................................................................................................... 2
2.3 User Classes and Characteristics ................................................................................................. 2
2.4 Operating Environment ............................................................................................................... 2
2.5 Design and Implementation Constraints ...................................................................................... 2
2.6 User Documentation ................................................................................................................... 2
2.7 Assumptions and Dependencies .................................................................................................. 2
3. External Interface Requirements ....................................................................................... 3
3.1 User Interfaces ............................................................................................................................ 3
3.2 Hardware Interfaces .................................................................................................................... 3
3.3 Software Interfaces ..................................................................................................................... 3
3.4 Communications Interfaces ......................................................................................................... 3
4. System Features ................................................................................................................... 3
4.1 System Feature 1......................................................................................................................... 3
4.2 System Feature 2 (and so on) ...................................................................................................... 3
5. Other Nonfunctional Requirements ................................................................................... 4
5.1 Performance Requirements ......................................................................................................... 4
5.2 Safety Requirements ................................................................................................................... 4
5.3 Security Requirements ................................................................................................................ 4
5.4 Software Quality Attributes ......................................................................................................... 4
5.5 Business Rules ............................................................................................................................ 4
6. Other Requirements ............................................................................................................ 5
Appendix A: Glossary ............................................................................................................... 5
Appendix B: Analysis Models ................................................................................................... 5
Appendix C: Issue List .............................................................................................................. 6
Revision History
Name Date Reason For Changes Version
Software Requirements Specification for Cryptography with maze using Deep Learning Page 1
1. Introduction
1.1 Purpose
We are planning to introduce a new way of securing the data by creating a data encryption
program which is integrated with deep learning algorithm for better implementation and security.
The following items are included: CMDL’s purpose, scope, functionality, requirements, diagrams
related to the system and a detailed explanation of the corresponding system model.
1.5 References
1. A Deep Learning Approach To Implement slab based image steganography algorithm of
RGB images
2. An improved method for hiding data in a maze
3. Efficient and Privacy-Preserving Cryptographic Key Derivation From Continuous
Sources
4. Securing Data in Internet of Things (IoT) Using Cryptography and Steganography
Techniques
Software Requirements Specification for Cryptography with maze using Deep Learning Page 2
2. Overall Description
2.1 Product Perspective
CMDL is a system that improves the way of data cryptography providing additional security to
the data. As this system is fairly simple, we expect it to get integrated seamlessly into software’s
pre-existing security system.
4. System Features
4.1 Encrypted messages
Messages are encrypted with maze cryptography technique for security purposes. Any detection
of breaching the message will be discarded, and the user will be asked to resend the same.
Efficiency: This is a platform independent software, (i.e. it is efficient to run the software of any
operating system)
Reliability: It is easily reliable for every end user for better security.
Maintainability: The source code should be properly documented, so that new developers will be
able to understand the code as easily as possible.
6. Other Requirements
There are different categories of users namely sender, receiver. Depending upon the category of
user the access rights are decided. It means if the user is sender then he/she can be able to send
the crypto formatted data to the receiver along with the generated key. This key can be used by
the sender or receiver for decryption.
Appendix A: Glossary
Users: It refers to sender and receiver
User Interface Layer: The section of the assignment referring to what user interacts
directly
Data Storage Layer: The section of the assignment referring to where data is stored