Four Random Permutations Conjugated by an Adversary Generate $S_n$ with High Probability
نویسندگان
چکیده
We prove a conjecture dating back to a 1978 paper of D.R. Musser [Mus78], namely that four random permutations in the symmetric group Sn generate a transitive subgroup with probability pn > ε for some ε > 0 independent of n, even when an adversary is allowed to conjugate each of the four by a possibly different element of Sn (in other words, the cycle types already guarantee generation of Sn). This is closely related to the following random set model. A random set M ⊆ Z is generated by including each n ≥ 1 independently with probability 1/n. The sumset sumset(M) is formed. Then at most four independent copies of sumset(M) are needed before their mutual intersection is no longer infinite.
منابع مشابه
Generalized Birthday Arracks on Unbalanced Feistel Networks
Unbalanced Feistel networks Fk which are used to construct invertible pseudo-random permutations from kn bits to kn bits using d pseudo-random functions from n bits to (k − 1)n bits, k ≥ 2 are studied. We show a new generalized birthday attack on Fk with d ≤ 3k − 3. With 2(k−1)n chosen plaintexts an adversary can distinguish Fk (with d = 3k − 3) from a random permutation with high probability. ...
متن کاملSharply $(n-2)$-transitive Sets of Permutations
Let $S_n$ be the symmetric group on the set $[n]={1, 2, ldots, n}$. For $gin S_n$ let $fix(g)$ denote the number of fixed points of $g$. A subset $S$ of $S_n$ is called $t$-emph{transitive} if for any two $t$-tuples $(x_1,x_2,ldots,x_t)$ and $(y_1,y_2,ldots ,y_t)$ of distinct elements of $[n]$, there exists $gin S$ such that $x_{i}^g=y_{i}$ for any $1leq ileq t$ and additionally $S$ is called e...
متن کاملOn the Construction of Pseudo-Random Permutations: Luby-Racko Revisited
Luby and Racko [27] showed a method for constructing a pseudo-random permutation from a pseudo-random function. The method is based on composing four (or three for weakened security) so called Feistel permutations, each of which requires the evaluation of a pseudo-random function. We reduce somewhat the complexity of the construction and simplify its proof of security by showing that two Feiste...
متن کاملHeuristics for Semirandom Graph Problems
We consider semirandom graph models for nding large independent sets, colorings and bisections in graphs. These models generate problem instances by blending random and adversarial decisions. To generate semirandom independent set problems, an independent set S of n ver-tices is randomly chosen. Each edge connecting S with S is chosen with probability p, and an adversary is then allowed to add ...
متن کاملInvariable Generation of the Symmetric Group
Abstract. We say that permutations π1, . . . , πr ∈ Sn invariably generate Sn if, no matter how one chooses conjugates π 1 , . . . , π r of these permutations, π 1 , . . . , π r generate Sn. We show that if π1, π2, π3 are chosen randomly from Sn then, with probability tending to 1 as n → ∞, they do not invariably generate Sn. By contrast it was shown recently by Pemantle, Peres and Rivin that f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Random Struct. Algorithms
دوره 49 شماره
صفحات -
تاریخ انتشار 2016