Abstract
Traditionally in combinatorics on words one studies unavoidable regularities that appear in sufficiently long strings over a fixed size alphabet. Inspired by permutation problems originating from information security, another viewpoint is taken in this paper. We focus on combinatorial properties of long words in which the number of occurrences of any symbol is restricted by a fixed given constant. More precisely, we show that for all positive integers m and q there exists the least positive integer N(m,q) which is smaller than \(m^{2^{q-1}}\) and satisfies the following: If α is a word such that
-
(i)
|alph(α)|≥N(m,q) (i.e., the cardinality of the alphabet of α is at least N(m,q)); and
-
(ii)
|α| a ≤q for each a∈alph(α) (i.e., the number of occurrences of any symbol of alph(α) in α is at most q),
then there exist a set A⊆alph(α) of cardinality |A|=m, an integer p∈{1,2,…,q}, and permutations σ 1,σ 2,…,σ p :{1,2,…,m}→{1,2,…,m} for which
Here A={a 1,a 2,…,a m } and π A is the projection morphism from alph(α)∗ into A ∗. The second part of the paper considers information security. We give an introduction to (generalized iterated) hash functions and their security properties; finally we demonstrate how our combinatorial results are connected to constructing multicollision attacks on these functions.
Similar content being viewed by others
References
Aho A, Sloane N (1970) Some doubly exponential sequences. Fibonacci Q 11:429–437
Andreeva E, Dunkelman O, Bouillaguet C, Kelsey J (2009) Herding, second preimage and Trojan message attacks beyond Merkle-Damgard. In: Lecture notes in computer science, vol 5867, pp 393–414
Czeizler E, Holub Š, Karhumäki J, Laine M (2007) Intricacies of simple word equations: an example. Int J Found Comput Sci 18(6):1167–1175
DeLuca A, Varrichio S (1999) Finiteness and regularity in semigroups and formal languages. Springer, Berlin
Halunen K, Kortelainen J, Kortelainen T (2010) Multicollision attacks on generalized iterated hash functions. In: Proceedings of the eight Australasian information security conference, AISC2010, Brisbane, Australia, January 2010, pp 85–93. Archived in Aust Comput Sci Commun 32(4) (2009)
Harrison M (1978) Introduction to formal language theory. Addison-Wesley, Reading
Hoch J, Shamir A (2006) Breaking the ICE—finding multicollisions in iterated concatenated and expanded (ICE) hash functions. In: Lecture notes in computer science, vol 4047, pp 179–194
Holub Š (2001) Local and global cyclicity in free semigroups. Theor Comput Sci 262(1):25–36
Holub Š (2003) Binary equality sets are generated by two words. J Algebra 259(1):1–42
Holub Š, Nowotka D (2009) The Ehrenfeucht–Silberger problem. In: Albers S, Marchetti-Spaccamela A, Matias Y, Thomas W (eds) Automata, languages and programming, 36th international colloquium, ICALP 2009, Proceedings, Part I, Rhodes, Greece, July 5–12, 2009. Lecture notes in computer science, vol 5555, pp 537–548
Holub Š, Nowotka D (2010) On the relation between periodicity and unbordered factors of finite words. Int J Found Comput Sci 21(4):633–645
Holub Š, Saari K (2009) On highly palindromic words. Discrete Appl Math 157(5):953–959
Joux A (2004) Multicollisions in iterated hash functions. Application to cascaded constructions. In: Lecture notes in computer science, vol 3152, pp 306–316
Kortelainen J, Halunen K, Kortelainen T (2010) Multicollision attacks and generalized iterated hash functions. J Math Cryptol 4:239–270
Liskov M (2007) Constructing an ideal hash function from weak ideal compression functions. In: Lecture notes of computer science, vol 4356, pp 358–375
Nandi M, Stinson D (2007) Multicollision attacks on some generalized sequential hash functions. IEEE Trans Inf Theory 53:759–767
Restivo A (1977) Mots sans repetitions et languages rationnels bornes. RAIRO Inform Théor 11:197–202
Restivo A, Reutenauer C (1983) Some applications of a theorem of Shirshov to language theory. Inf Control 57:205–213
Restivo A, Reutenauer C (1985) Rational languages and the Burnside problem. Theor Comput Sci 40:13–30
Suzuki K, Tonien D, Kurosawa K, Toyota K (2008) Birthday paradox for multi-collisions. IEICE Trans 91-A(1):39–45
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kortelainen, J., Kortelainen, T. & Vesanen, A. Unavoidable regularities in long words with bounded number of symbol occurrences. J Comb Optim 26, 670–686 (2013). https://doi.org/10.1007/s10878-012-9450-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10878-012-9450-6