首页 | 本学科首页   官方微博 | 高级检索  
     


Unavoidable regularities in long words with bounded number of symbol occurrences
Authors:Juha Kortelainen  Tuomas Kortelainen  Ari Vesanen
Affiliation:1. Department of Information Processing Science, University of Oulu, Oulu, Finland
2. Mathematics Division, Department of Electrical and Information Engineering, University of Oulu, Oulu, Finland
Abstract:Traditionally in combinatorics on words one studies unavoidable regularities that appear in sufficiently long strings over a fixed size alphabet. Inspired by permutation problems originating from information security, another viewpoint is taken in this paper. We focus on combinatorial properties of long words in which the number of occurrences of any symbol is restricted by a fixed given constant. More precisely, we show that for all positive integers m and q there exists the least positive integer N(m,q) which is smaller than $m^{2^{q-1}}$ and satisfies the following: If α is a word such that
  1. |alph(α)|≥N(m,q) (i.e., the cardinality of the alphabet of α is at least N(m,q)); and
  2. |α| a q for each a∈alph(α) (i.e., the number of occurrences of any symbol of alph(α) in α is at most q),
then there exist a set A?alph(α) of cardinality |A|=m, an integer p∈{1,2,…,q}, and permutations σ 1,σ 2,…,σ p :{1,2,…,m}→{1,2,…,m} for which $$pi_A(alpha)in a_{sigma_1(1)}^+cdots a_{sigma_1(m)}^+a_{sigma _2(1)}^+cdots a_{sigma_2(m)}^+cdots a_{sigma_p(1)}^+cdots a_{sigma_p(m)}^+ .$$ Here A={a 1,a 2,…,a m } and π A is the projection morphism from alph(α)? into A ?. The second part of the paper considers information security. We give an introduction to (generalized iterated) hash functions and their security properties; finally we demonstrate how our combinatorial results are connected to constructing multicollision attacks on these functions.
Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号