Skip to main content

The Markov Model of the Needham-Schroeder Protocol

  • Conference paper
  • First Online:
Distributed Computer and Communication Networks (DCCN 2022)

Abstract

A user-friendly Markov model of procedures for the Needham-Schroeder information security algorithm is developed. To implement the development, auxiliary system models of three asynchronous execution algorithms are used, one of which considers systems of processing-synchronous input and processing-asynchro-nous output, while the other considers input-asynchronous processing and synchronous information output. A model of processing-asynchronous input and output is taken as the final model. Finally, the closed model of a three-phase queuing system is given.

Kazakh National Technical University.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Solution for the management, protection and control of pipeline leaks. https://spb-xxi.ru/index.php?option=com_content &view=article &id= 39 &Itemid=41.7.5april 2022

  2. Vishnevsky V.M., Mukhtarov A.A., Pershin O.Yu. The problem of optimal placement of base stations of a broadband network to control a linear territory with a limitation on the amount of end-to-end delay. In: Vishnevsky, V.M., Samuilov, K.E. (eds.) Distributed Computer and Communication Networks: Control, Computation, Communications (DCCN-2020): Materials of XXIII International Scientific Conference, Moscow, 14–18 September 2020, pp. 148–155. IPU RAN (2020). https://2020.dccn.ru/downloads/DCCN-2020_ Proceedings.pdf

  3. Yermakov A.S.: Models for evaluating performance in synchronous/asynchronous execution of input/output processes and information processing. KazNU Bull. 1(60), 16–23 (2009). https://bm.kaznu.kz/index.php/kaznu/article/view/27

  4. Modern Cryptography: Theory and Practice, p. 768. Williams (2005). https://www.ic.unicamp.br/~rdahab/cursos/mo421-mc889/Welcome_ files/Stinson-Paterson_CryptographyTheoryAndPractice-CRC%20Press%20%282019%29.pdf

  5. Rob, H.B.: Parallel Scientific Computation: A Structured Approach using BSP and MPI, p. 342. Oxford (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. K. Mamyrova .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shukmanova, A.A., Yermakov, A.S., Paltashev, T.T., Mamyrova, A.K., Ziro, A.A. (2023). The Markov Model of the Needham-Schroeder Protocol. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds) Distributed Computer and Communication Networks. DCCN 2022. Communications in Computer and Information Science, vol 1748. Springer, Cham. https://doi.org/10.1007/978-3-031-30648-8_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-30648-8_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-30647-1

  • Online ISBN: 978-3-031-30648-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics