Abstract:
We develop the game-theoretical approach to estimation of strength of authentication codes suggested by G. J. Simmons. It is proved that a combination of imitation and substitution attacks allows the opponent to get a greater gain than that from separate imitation or substitution attacks.