Skip to main content

Unavoidable Regularities in Long Words with Bounded Number of Symbol Occurrences

  • Conference paper
Book cover Computing and Combinatorics (COCOON 2011)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6842))

Included in the following conference series:

Abstract

Traditionally in combinatorics on words one studies unavoidable regularities that appear in sufficiently long strings over a fixed size alphabet. Inspired by permutation problems originating from information security, another viewpoint is taken in this paper. We focus on combinatorial properties of long words in which the number of occurrences of any symbol is restritced by a fixed given constant. More precisely, we show that for all positive integers m and q there exists the least positive integer N(m,q) which is smaller than \(m^{2^{q-1}}\) and satifies the following: If α is a word such that

(i) |alph(α)| ≥ N(m,q) (i.e., the cardinality of the alphabet of α is at least N(m,q)); and

(ii) |α| a  ≤ q for each a ∈ alph(α) (i.e., the number of occurrences of any symbol of alph(α) in α is at most q),

then there exist a set A ⊆ alph(α) of cardinality |A| = m, an integer p ∈ {1,2,…,q}, and permutations σ 1,σ 2,…,σ p : {1,2,…,m} → {1,2,…,m} for which

$$ \pi_A(\alpha)\in a_{\sigma_1(1)}^+\cdots a_{\sigma_1(m)}^+a_{\sigma_2(1)}^+\cdots a_{\sigma_2(m)}^+\cdots a_{\sigma_p(1)}^+\cdots a_{\sigma_p(m)}^+\ \ . $$

Here A = {a 1,a 2,…,a m } and π A is the projection morphism from alph(α) ∗  into A  ∗ . Finally, we demonstrate how problems such as the one above are connected to constructing multicollision attacks on so called generalized iterated hash functions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aho, A., Sloane, N.: Some doubly exponential sequences. Fibonacci Quart. 11, 429–437 (1970)

    MathSciNet  MATH  Google Scholar 

  2. Anderson, S.: Graph Theory and Finite Combinatorics, Markham, Chicago (1970)

    Google Scholar 

  3. Andreeva, E., Bouillaguet, C., Dunkelman, O., Kelsey, J.: Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 393–414. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  4. Czeizler, E., Holub, Š., Karhumäki, J., Laine, M.: Intricacies of simple word equations: an example. Int. J. Found. Comput. Sci. 18(6), 1167–1175 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  5. DeLuca, A., Varrichio, S.: Finiteness and Regularity in Semigroups and Formal Languages. Springer, Heidelberg (1999)

    Book  Google Scholar 

  6. Dilworth, R.: A decomposition theorem for partially ordered sets. Ann. of Math. 51, 161–166 (1950)

    Article  MathSciNet  MATH  Google Scholar 

  7. Halunen, K., Kortelainen, J., Kortelainen, T.: Multicollision Attacks on Generalized Iterated Hash Functions. In: Autexier, S., Calmet, J., Delahaye, D., Ion, P.D.F., Rideau, L., Rioboo, R., Sexton, A.P. (eds.) AISC 2010. LNCS, vol. 6167, pp. 85–93. Springer, Heidelberg (2010)

    Google Scholar 

  8. Harrison, M.: Introduction to Formal Language Theory. Addison-Wesley, Reading (1978)

    MATH  Google Scholar 

  9. Hoch, J., Shamir, A.: Breaking the ICE - finding multicollisions in iterated concatenated and expanded (ICE) hash functions. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 179–194. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Holub, Š.: Local and global cyclicity in free semigroups. Theor. Comput. Sci. 262(1), 25–36 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  11. Holub, Š.: Binary equality sets are generated by two words. J. Algebra 259(1), 1–42 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  12. Holub, Š., Nowotka, D.: The Ehrenfeucht-Silberger Problem. In: Albers, S., Marchetti-Spaccamela, A., Matias, Y., Nikoletseas, S., Thomas, W. (eds.) ICALP 2009. LNCS, vol. 5555, pp. 537–548. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  13. Holub, Š., Nowotka, D.: On the relation between periodicity and unbordered factors of finite words. Int. J. Found. Comput. Sci. 21(4), 633–645 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  14. Holub, Š., Saari, K.: On highly palindromic words. Discrete Appl. Math. 157(5), 953–959 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  15. Joux, A.: Multicollisions in iterated hash functions. Application to cascaded constructions. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 306–316. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  16. Kortelainen, J., Halunen, K., Kortelainen, T.: Multicollision Attacks and Generalized Iterated Hash Functions. J. Math. Cryptol. 4, 239–270 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  17. Liskov, M.: Constructing an Ideal Hash Function from Weak Ideal Compression Functions. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 358–375. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  18. Lothaire, M.: Combinatorics on Words. Addison-Wesley, Reading (1983)

    MATH  Google Scholar 

  19. Nandi, M., Stinson, D.: Multicollision attacks on some generalized sequential hash functions. IEEE Trans. Inform. Theory 53, 759–767 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  20. Restivo, A.: Mots sans repetitions et languages rationnels bornes. RAIRO Inform. Theor. 11, 197–202 (1977)

    Article  MATH  Google Scholar 

  21. Restivo, A., Reutenauer, C.: Some applications of a theorem of Shirshov to language theory. Inform. and Control 57, 205–213 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  22. Restivo, A., Reutenauer, C.: Rational languages and the Burnside problem. Theoret. Comput. Sci. 40, 13–30 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  23. Suzuki, K., Tonien, D., Kurosawa, K., Toyota, K.: Birthday paradox for multi-collisions. IEICE Transactions 91-A(1), 39–45 (2008)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kortelainen, J., Kortelainen, T., Vesanen, A. (2011). Unavoidable Regularities in Long Words with Bounded Number of Symbol Occurrences. In: Fu, B., Du, DZ. (eds) Computing and Combinatorics. COCOON 2011. Lecture Notes in Computer Science, vol 6842. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22685-4_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22685-4_45

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22684-7

  • Online ISBN: 978-3-642-22685-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics