Skip to main content
Log in

Unavoidable regularities in long words with bounded number of symbol occurrences

  • Published:
Journal of Combinatorial Optimization Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

Traditionally in combinatorics on words one studies unavoidable regularities that appear in sufficiently long strings over a fixed size alphabet. Inspired by permutation problems originating from information security, another viewpoint is taken in this paper. We focus on combinatorial properties of long words in which the number of occurrences of any symbol is restricted by a fixed given constant. More precisely, we show that for all positive integers m and q there exists the least positive integer N(m,q) which is smaller than \(m^{2^{q-1}}\) and satisfies the following: If α is a word such that

  1. (i)

    |alph(α)|≥N(m,q) (i.e., the cardinality of the alphabet of α is at least N(m,q)); and

  2. (ii)

    |α| a q for each a∈alph(α) (i.e., the number of occurrences of any symbol of alph(α) in α is at most q),

then there exist a set A⊆alph(α) of cardinality |A|=m, an integer p∈{1,2,…,q}, and permutations σ 1,σ 2,…,σ p :{1,2,…,m}→{1,2,…,m} for which

$$\pi_A(\alpha)\in a_{\sigma_1(1)}^+\cdots a_{\sigma_1(m)}^+a_{\sigma _2(1)}^+\cdots a_{\sigma_2(m)}^+\cdots a_{\sigma_p(1)}^+\cdots a_{\sigma_p(m)}^+ .$$

Here A={a 1,a 2,…,a m } and π A is the projection morphism from alph(α) into A . The second part of the paper considers information security. We give an introduction to (generalized iterated) hash functions and their security properties; finally we demonstrate how our combinatorial results are connected to constructing multicollision attacks on these functions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Aho A, Sloane N (1970) Some doubly exponential sequences. Fibonacci Q 11:429–437

    MathSciNet  Google Scholar 

  • Andreeva E, Dunkelman O, Bouillaguet C, Kelsey J (2009) Herding, second preimage and Trojan message attacks beyond Merkle-Damgard. In: Lecture notes in computer science, vol 5867, pp 393–414

    Google Scholar 

  • Czeizler E, Holub Š, Karhumäki J, Laine M (2007) Intricacies of simple word equations: an example. Int J Found Comput Sci 18(6):1167–1175

    Article  MATH  Google Scholar 

  • DeLuca A, Varrichio S (1999) Finiteness and regularity in semigroups and formal languages. Springer, Berlin

    Google Scholar 

  • Halunen K, Kortelainen J, Kortelainen T (2010) Multicollision attacks on generalized iterated hash functions. In: Proceedings of the eight Australasian information security conference, AISC2010, Brisbane, Australia, January 2010, pp 85–93. Archived in Aust Comput Sci Commun 32(4) (2009)

    Google Scholar 

  • Harrison M (1978) Introduction to formal language theory. Addison-Wesley, Reading

    MATH  Google Scholar 

  • Hoch J, Shamir A (2006) Breaking the ICE—finding multicollisions in iterated concatenated and expanded (ICE) hash functions. In: Lecture notes in computer science, vol 4047, pp 179–194

    Google Scholar 

  • Holub Š (2001) Local and global cyclicity in free semigroups. Theor Comput Sci 262(1):25–36

    Article  MathSciNet  MATH  Google Scholar 

  • Holub Š (2003) Binary equality sets are generated by two words. J Algebra 259(1):1–42

    Article  MathSciNet  MATH  Google Scholar 

  • Holub Š, Nowotka D (2009) The Ehrenfeucht–Silberger problem. In: Albers S, Marchetti-Spaccamela A, Matias Y, Thomas W (eds) Automata, languages and programming, 36th international colloquium, ICALP 2009, Proceedings, Part I, Rhodes, Greece, July 5–12, 2009. Lecture notes in computer science, vol 5555, pp 537–548

    Google Scholar 

  • Holub Š, Nowotka D (2010) On the relation between periodicity and unbordered factors of finite words. Int J Found Comput Sci 21(4):633–645

    Article  MathSciNet  MATH  Google Scholar 

  • Holub Š, Saari K (2009) On highly palindromic words. Discrete Appl Math 157(5):953–959

    Article  MathSciNet  MATH  Google Scholar 

  • Joux A (2004) Multicollisions in iterated hash functions. Application to cascaded constructions. In: Lecture notes in computer science, vol 3152, pp 306–316

    Google Scholar 

  • Kortelainen J, Halunen K, Kortelainen T (2010) Multicollision attacks and generalized iterated hash functions. J Math Cryptol 4:239–270

    MathSciNet  MATH  Google Scholar 

  • Liskov M (2007) Constructing an ideal hash function from weak ideal compression functions. In: Lecture notes of computer science, vol 4356, pp 358–375

    Google Scholar 

  • Nandi M, Stinson D (2007) Multicollision attacks on some generalized sequential hash functions. IEEE Trans Inf Theory 53:759–767

    Article  MathSciNet  Google Scholar 

  • Restivo A (1977) Mots sans repetitions et languages rationnels bornes. RAIRO Inform Théor 11:197–202

    MathSciNet  MATH  Google Scholar 

  • Restivo A, Reutenauer C (1983) Some applications of a theorem of Shirshov to language theory. Inf Control 57:205–213

    Article  MathSciNet  MATH  Google Scholar 

  • Restivo A, Reutenauer C (1985) Rational languages and the Burnside problem. Theor Comput Sci 40:13–30

    Article  MathSciNet  MATH  Google Scholar 

  • Suzuki K, Tonien D, Kurosawa K, Toyota K (2008) Birthday paradox for multi-collisions. IEICE Trans 91-A(1):39–45

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juha Kortelainen.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kortelainen, J., Kortelainen, T. & Vesanen, A. Unavoidable regularities in long words with bounded number of symbol occurrences. J Comb Optim 26, 670–686 (2013). https://doi.org/10.1007/s10878-012-9450-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10878-012-9450-6

Keywords