Locks and keys: How fast can you open several locks with too many keys?

نویسنده

  • Olivier Marchal
چکیده

This short note is the result of a French " Hippocampe internship " 2 that aims at introducing the world of research to young undergraduate French students. The problem studied is the following: imagine yourself locked in a cage barred with n different locks. You are given a keyring with N ≥ n keys containing the n keys that open the locks. In average, how many trials are required to open all locks and get out? The article studies 3 different strategies and compare them. Implementation of the strategies are also proposed as illustrations of the theoretical results. The precise statement of the problem and the various assumptions are the following: Statement of the problem: We need to open n locks with a keyring containing N ≥ n keys. We are interested in determining the average and the standard deviation of the number of trials to open all locks. The special case when the number of keys equals the number of locks (n = N) is included. Assumptions: The following assumptions about locks and keys are made: • All locks and keys are assumed to be indistinguishable. • All locks are different and require a specific key to be opened. • A lock can always be opened, i.e. the key required to open it belongs to the keyring. • A key cannot open more than one lock. Consequently, the keyring contains the n different keys corresponding to the locks as well as additional keys that do not open anything when N > n. The keys are randomly placed in the keyring. We denote by T n,N the number of trials to open all locks. We are interested in gathering as much information as possible on T n,N especially E(T n,N) and Var(T n,N). 2 Strategy 1: The totally random strategy The first strategy one can think of is to select randomly one of the remaining keys and try it randomly into one the remaining locks to open. In particular we do not keep track about the previous tries except for the fact that we discard locks that are already opened and their corresponding 2 " Hippocampe " (sea-horse or hippocampus in French) internships are three days sessions during which small groups of students specialized in mathematics and physics are presented with a problem that they have to solve under the supervision of an academic professor.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Secret and Beauty of Ancient Chinese Padlocks

Most ancient Chinese padlocks are key-operated locks with splitting springs, and partially keyless letter-combination locks. They can be characterized based on the types of locks, the shapes of locks, the engravings of locks, the materials of locks, and the mechanisms of locks. Some locks and keys are not only very beautiful and artistic colorful, but also with various designs. As a result, a s...

متن کامل

Physical and cryptoanalytical attacks on digital locking systems

In many installations, traditional locks have been replaced with new type of locks, which do not rely on mechanical security for guarding the doors. Mechanical locks hold several weaknesses, which are due to bad mechanical engineering, tolerances within cylinders, small number of different combinations etc. As the entry cost is small and learning curve for obtaining basic skills is steep, then ...

متن کامل

Fingerprint based locking system

Fingerprint recognition technology allows access to only those whose fingerprints that are pre stored in the memory. Stored fingerprints are retained even in the event of complete power failure or battery drain. These eliminates the need for keeping track of keys or remembering a combination password, or PIN. It can only be opened when an authorized user is present, since there are no keys or c...

متن کامل

Private Entity Authentication for Pervasive Computing Environments

Entity authentication becomes ubiquitously necessary in pervasive computing environments. We provide taxonomy of entity authentication between keys and locks. Based on the discussion, we propose a novel authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital keys for entity authentication. The Master Key initi...

متن کامل

A Secure Relay Protocol for Door Access Control

Physical keys are easy to use but difficult to manage securely for large institutions. Digital replacements have been created, but dedicated hardware such as smartcards or RFID tags can have the same problems as physical keys. Several commercial products try to solve this by using the users’ Bluetoothenabled mobile devices as keys, but the built-in security of the Bluetooth standard is insuffic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1509.00844  شماره 

صفحات  -

تاریخ انتشار 2015