Abstract
Traditionally in combinatorics on words one studies unavoidable regularities that appear in sufficiently long strings over a fixed size alphabet. Inspired by permutation problems originating from information security, another viewpoint is taken in this paper. We focus on combinatorial properties of long words in which the number of occurrences of any symbol is restritced by a fixed given constant. More precisely, we show that for all positive integers m and q there exists the least positive integer N(m,q) which is smaller than \(m^{2^{q-1}}\) and satifies the following: If α is a word such that
(i) |alph(α)| ≥ N(m,q) (i.e., the cardinality of the alphabet of α is at least N(m,q)); and
(ii) |α| a ≤ q for each a ∈ alph(α) (i.e., the number of occurrences of any symbol of alph(α) in α is at most q),
then there exist a set A ⊆ alph(α) of cardinality |A| = m, an integer p ∈ {1,2,…,q}, and permutations σ 1,σ 2,…,σ p : {1,2,…,m} → {1,2,…,m} for which
Here A = {a 1,a 2,…,a m } and π A is the projection morphism from alph(α) ∗ into A ∗ . Finally, we demonstrate how problems such as the one above are connected to constructing multicollision attacks on so called generalized iterated hash functions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aho, A., Sloane, N.: Some doubly exponential sequences. Fibonacci Quart. 11, 429–437 (1970)
Anderson, S.: Graph Theory and Finite Combinatorics, Markham, Chicago (1970)
Andreeva, E., Bouillaguet, C., Dunkelman, O., Kelsey, J.: Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 393–414. Springer, Heidelberg (2009)
Czeizler, E., Holub, Š., Karhumäki, J., Laine, M.: Intricacies of simple word equations: an example. Int. J. Found. Comput. Sci. 18(6), 1167–1175 (2007)
DeLuca, A., Varrichio, S.: Finiteness and Regularity in Semigroups and Formal Languages. Springer, Heidelberg (1999)
Dilworth, R.: A decomposition theorem for partially ordered sets. Ann. of Math. 51, 161–166 (1950)
Halunen, K., Kortelainen, J., Kortelainen, T.: Multicollision Attacks on Generalized Iterated Hash Functions. In: Autexier, S., Calmet, J., Delahaye, D., Ion, P.D.F., Rideau, L., Rioboo, R., Sexton, A.P. (eds.) AISC 2010. LNCS, vol. 6167, pp. 85–93. Springer, Heidelberg (2010)
Harrison, M.: Introduction to Formal Language Theory. Addison-Wesley, Reading (1978)
Hoch, J., Shamir, A.: Breaking the ICE - finding multicollisions in iterated concatenated and expanded (ICE) hash functions. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 179–194. Springer, Heidelberg (2006)
Holub, Š.: Local and global cyclicity in free semigroups. Theor. Comput. Sci. 262(1), 25–36 (2001)
Holub, Š.: Binary equality sets are generated by two words. J. Algebra 259(1), 1–42 (2003)
Holub, Š., Nowotka, D.: The Ehrenfeucht-Silberger Problem. In: Albers, S., Marchetti-Spaccamela, A., Matias, Y., Nikoletseas, S., Thomas, W. (eds.) ICALP 2009. LNCS, vol. 5555, pp. 537–548. Springer, Heidelberg (2009)
Holub, Š., Nowotka, D.: On the relation between periodicity and unbordered factors of finite words. Int. J. Found. Comput. Sci. 21(4), 633–645 (2010)
Holub, Š., Saari, K.: On highly palindromic words. Discrete Appl. Math. 157(5), 953–959 (2009)
Joux, A.: Multicollisions in iterated hash functions. Application to cascaded constructions. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 306–316. Springer, Heidelberg (2004)
Kortelainen, J., Halunen, K., Kortelainen, T.: Multicollision Attacks and Generalized Iterated Hash Functions. J. Math. Cryptol. 4, 239–270 (2010)
Liskov, M.: Constructing an Ideal Hash Function from Weak Ideal Compression Functions. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 358–375. Springer, Heidelberg (2007)
Lothaire, M.: Combinatorics on Words. Addison-Wesley, Reading (1983)
Nandi, M., Stinson, D.: Multicollision attacks on some generalized sequential hash functions. IEEE Trans. Inform. Theory 53, 759–767 (2007)
Restivo, A.: Mots sans repetitions et languages rationnels bornes. RAIRO Inform. Theor. 11, 197–202 (1977)
Restivo, A., Reutenauer, C.: Some applications of a theorem of Shirshov to language theory. Inform. and Control 57, 205–213 (1983)
Restivo, A., Reutenauer, C.: Rational languages and the Burnside problem. Theoret. Comput. Sci. 40, 13–30 (1985)
Suzuki, K., Tonien, D., Kurosawa, K., Toyota, K.: Birthday paradox for multi-collisions. IEICE Transactions 91-A(1), 39–45 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kortelainen, J., Kortelainen, T., Vesanen, A. (2011). Unavoidable Regularities in Long Words with Bounded Number of Symbol Occurrences. In: Fu, B., Du, DZ. (eds) Computing and Combinatorics. COCOON 2011. Lecture Notes in Computer Science, vol 6842. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22685-4_45
Download citation
DOI: https://doi.org/10.1007/978-3-642-22685-4_45
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22684-7
Online ISBN: 978-3-642-22685-4
eBook Packages: Computer ScienceComputer Science (R0)