12 research outputs found

    Using the Game of Mastermind to Teach, Practice, and Discuss Scientific Reasoning Skills

    Get PDF
    The code-breaking game Mastermind, which can be played in minutes at no cost, creates opportunities for students to discuss scientific reasoning, hypothesis-testing, effective experimental design, and sound interpretation of results

    Learning Character Strings via Mastermind Queries, with a Case Study Involving mtDNA

    Full text link
    We study the degree to which a character string, QQ, leaks details about itself any time it engages in comparison protocols with a strings provided by a querier, Bob, even if those protocols are cryptographically guaranteed to produce no additional information other than the scores that assess the degree to which QQ matches strings offered by Bob. We show that such scenarios allow Bob to play variants of the game of Mastermind with QQ so as to learn the complete identity of QQ. We show that there are a number of efficient implementations for Bob to employ in these Mastermind attacks, depending on knowledge he has about the structure of QQ, which show how quickly he can determine QQ. Indeed, we show that Bob can discover QQ using a number of rounds of test comparisons that is much smaller than the length of QQ, under reasonable assumptions regarding the types of scores that are returned by the cryptographic protocols and whether he can use knowledge about the distribution that QQ comes from. We also provide the results of a case study we performed on a database of mitochondrial DNA, showing the vulnerability of existing real-world DNA data to the Mastermind attack.Comment: Full version of related paper appearing in IEEE Symposium on Security and Privacy 2009, "The Mastermind Attack on Genomic Data." This version corrects the proofs of what are now Theorems 2 and 4

    Optimal Algorithms for 2 x nAB Games--A Graph-Partition Approach

    Get PDF
    [[abstract]]This paper presents new and systematic methodologies to analyze deductive games and obtain optimal algorithms for 2 ? n AB games, where n ? 2. We have invented a graphic model to represent the game-guessing process. With this novel approach, we find some symmetric and recursive structures in the process. This not only reduces the size of the search space, but also helps us to derive the optimum strategies more efficiently. By using this technique, we develop optimal strategies for 2 ? n AB games in the expected and worst cases, and are able to derive the following new results: (1) ?n/2? + 1 guesses are necessary and sufficient for 2 ? n AB games in the worst case, (2) the minimum number of guesses required for 2 ? n AB games in the expected case is (4n3 + 21n2 - 76n + 72)/12n(n - 1) if n is even, and (4n3 + 21n2 - 82n + 105)/12n(n - 1) if n is odd. The optimization of this problem bears resemblance with other computational problems, such as circuit testing, differential cryptanalysis, on-line models with equivalent queries, and additive search problems. Any conclusion of this kind of deductive game may be applied, although probably not directly, to any of these problems, as well as to any other combinatorial optimization problem.

    Improved Approximation Algorithm for the Number of Queries Necessary to Identify a Permutation

    Full text link
    In the past three decades, deductive games have become interesting from the algorithmic point of view. Deductive games are two players zero sum games of imperfect information. The first player, called "codemaker", chooses a secret code and the second player, called "codebreaker", tries to break the secret code by making as few guesses as possible, exploiting information that is given by the codemaker after each guess. A well known deductive game is the famous Mastermind game. In this paper, we consider the so called Black-Peg variant of Mastermind, where the only information concerning a guess is the number of positions in which the guess coincides with the secret code. More precisely, we deal with a special version of the Black-Peg game with n holes and k >= n colors where no repetition of colors is allowed. We present a strategy that identifies the secret code in O(n log n) queries. Our algorithm improves the previous result of Ker-I Ko and Shia-Chung Teng (1985) by almost a factor of 2 for the case k = n. To our knowledge there is no previous work dealing with the case k > n. Keywords: Mastermind; combinatorial problems; permutations; algorithm

    Novel Algorithms for Deductive Games

    Get PDF
    [[abstract]]This paper presents two novel algorithms for deductive games. First, a k-way-branching algorithm, taking advantage of a clustering technique, is able to efficiently obtain an optimal strategy in the worst case and a near-optimal strategy in the expected case for a typical deductive game “Bulls and Cows.” Second, a pigeonholeprinciple- based backtracking algorithm has been successfully applied to efficiently reduce the search space for the game. By using the algorithms, we not only obtain the lower bound on number of guesses required for the game in the worst case, but also derive the main theorem: 7 guesses are necessary and sufficient for the “Bulls and Cows” in the worst case. This is the first paper to prove the exact bound of this problem.

    On the Query Complexity of Black-Peg AB-Mastermind

    Get PDF
    Mastermind is a two players zero sum game of imperfect information. Starting with Erd˝os and Rényi (1963), its combinatorics have been studied to date by several authors, e.g., Knuth (1977), Chvátal (1983), Goodrich (2009). The first player, called “codemaker”, chooses a secret code and the second player, called “codebreaker”, tries to break the secret code by making as few guesses as possible, exploiting information that is given by the codemaker after each guess. For variants that allow color repetition, Doerr et al. (2016) showed optimal results. In this paper, we consider the so called Black-Peg variant of Mastermind, where the only information concerning a guess is the number of positions in which the guess coincides with the secret code. More precisely, we deal with a special version of the Black-Peg game with n holes and k ≥ n colors where no repetition of colors is allowed. We present upper and lower bounds on the number of guesses necessary to break the secret code. For the case k = n, the secret code can be algorithmically identified within less than (n − 3)dlog 2 ne + 5 2 n − 1 queries. This result improves the result of Ker-I Ko and Shia-Chung Teng (1985) by almost a factor of 2. For the case k > n, we prove an upper bound of (n − 2)dlog 2 ne + k + 1. Furthermore, we prove a new lower bound of n for the case k = n, which improves the recent n − log log(n) bound of Berger et al. (2016). We then generalize this lower bound to k queries for the case k ≥ n

    Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies

    Full text link
    In this paper, we study sparsity-exploiting Mastermind algorithms for attacking the privacy of an entire database of character strings or vectors, such as DNA strings, movie ratings, or social network friendship data. Based on reductions to nonadaptive group testing, our methods are able to take advantage of minimal amounts of privacy leakage, such as contained in a single bit that indicates if two people in a medical database have any common genetic mutations, or if two people have any common friends in an online social network. We analyze our Mastermind attack algorithms using theoretical characterizations that provide sublinear bounds on the number of queries needed to clone the database, as well as experimental tests on genomic information, collaborative filtering data, and online social networks. By taking advantage of the generally sparse nature of these real-world databases and modulating a parameter that controls query sparsity, we demonstrate that relatively few nonadaptive queries are needed to recover a large majority of each database
    corecore