Abstract:
We introduce the concepts of an information protocol on a finite set,
its extension and expansion.
A series of examples of manipulations of an adversary with information protocols are given.
We propose a system of protection of information protocols
which admits an expansion into a large number of extensions
and calculate some probabilistic characteristics of its quality.