He approach of G. Simmons to estimating an authentication code (A-code) security is used for solving matrix games. The approach simulates the behavior of the information sender and receiver and an attacker (opponent) as players in matrix games. The imitation attack is represented by a game, the matrix of which coincides with the incidence matrix of A-code. The step of player 1 is the choice of a matrix line (an encoding rule), the step of player 2 is the choice of a matrix column (the simulated message). The substitution attack is represented by a game in which the step of player 1 is the choice of encoding rule (e), the step of player 2 is the choice of a mapping (^>) without immovable points which maps the set of A-code messages to itself. The element a(e,
2, the solutions are obtained with the help of these theorems. In theorems 3 and 5, the values v1 and v2 of games with the matrices in sizes N х N and N х (N - 1) respectively, representing the imitation and substitution attacks, as well as the optimum mixed strategies of players, are obtained. The value v2 is expressed through the probability of choosing one of two source states and v1 = 2/N. Theorem 4 generalizes the result of theorem 3 for A-code with k states of source, 2 ^ k ^ N.
Download file
Counter downloads: 240
- Title The solution of some classes of matrix games
- Headline The solution of some classes of matrix games
- Publesher
Tomsk State University
- Issue Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics 4(34)
- Date:
- DOI 10.17223/20710410/34/2
Keywords
матричная игра, оптимальные смешанные стратегии, код аутентификации, вероятности успеха имитации и подмены, matrix game, optimal mixed strategy, authentication code, probabilities of success of impersonate and substituteAuthors
References
Зубов А. Ю. Может ли комбинация активных атак привести к большему ущербу для системы защиты информации, чем каждая из атак в отдельности? // Лесной вестник. 2008. №4(61). С. 144-148.
Зубов А. Ю. Решение одной матричной игры // Лесной вестник. 2008. №6(63). С. 173-179.
Зубов А. Ю. К теоретико-игровому подходу исследования кодов аутентификации // Дискретная математика. 2009. Т. 21. Вып.3. С. 45-72.
Зубов А. Ю. О выборе оптимальной стратегии защиты для кода аутентификации с двумя состояниями источника // Дискретная математика. 2009. Т. 21. Вып. 4. С. 135-147.
Simmons G. J. A game theoretical model of digital message authentication // Congressus Numerantium. 1982. V. 34. P. 413-424.
Simmons G. J. Authentication theory / Coding theory // LNCS. 1984. V. 196. P. 411-431.
Зубов А. Ю. Математика кодов аутентификации. М.: Гелиос АРВ, 2007.
Воробьёв Н. Н. Теория игр. М.: Наука, 1985.

The solution of some classes of matrix games | Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics. 2016. № 4(34). DOI: 10.17223/20710410/34/2