Program/Track B/B.1.2/The Markov Model of the Information Security Protocol Based on the Needham-Schroeder Protocol for One-time Keys
The Markov Model of the Information Security Protocol Based on the Needham-Schroeder Protocol for One-time Keys
Anatoly Yermakov, Anar Shukmanova, Timour Paltashev, Aasso Ziro, Aisha Mamyrova
15m
A user-friendly Markov model of procedures for the Needham-Schroeder information security algorithm is developed. To implement the development, auxiliary system models of three asynchronous execution algorithms are used, one of which considers systems of processing-synchronous input and processing- asynchro-nous output, while the other considers input-asynchronous processing and synchronous information output. A model of processing-asynchronous input and output is taken as the final model. Finally, the closed model of a three-phase queuing system is given.