Skip to main content

Random permutations from logarithmic signatures

  • Track 4: Algorithms
  • Conference paper
  • First Online:
Computing in the 90's (Great Lakes CS 1989)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 507))

Included in the following conference series:

Abstract

A cryptographic system, called pgm, was invented in the late 1970's by S. Magliveras. pgm is based on the prolific existence of certain kinds of factorization sets, called logarithmic signatures, for finite permutation groups. Logarithmic signatures were initially motivated by C. Sims' bases and strong generators. A logarithmic signature α, for a given group G, induces a mapping \(\hat \alpha\) from Z |G| to G. Hence it would be natural to use logarithmic signatures for generating random elements in a group. In this paper we focus on generating random permutations in the symmetric group S n. Random permutations find applications in design of experiments, simulation, cryptology, voice-encryption etc. Given a logarithmic signature α for S n and a seed s 0, we could efficiently compute the following sequence : \(\hat \alpha\)(s 0), \(\hat \alpha\)(s 0 + 1), ..., \(\hat \alpha\)(s 0 + r - 1) of r permutations. We claim that this sequence behaves like a sequence of random permutations. We undertake statistical tests to substantiate our claim.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Furst, J. E. Hopcroft, and E. Luks. Polynomial-time algorithms for permutation groups. In Proceedings of the 21'st IEEE Symposium on Foundations of Computation of Computer Science, pages 36–41, 1980.

    Google Scholar 

  2. D. E. Knuth. The Art of Computer Programming. Addison-Wesley, 2'nd edition, 1981.

    Google Scholar 

  3. S. S. Magliveras. A cryptosystem from logarithmic signatures of finite groups. In Proceedings of the 29'th Midwest Symposium on Circuits and Systems. Elsevier Publishing Company, August 1986.

    Google Scholar 

  4. S. S. Magliveras and N. D. Memon. Algebraic properties of cryptosystem PGM. In Advances in Crptology, Crypto 89. Springer-Verlag, 1989.

    Google Scholar 

  5. N. D. Memon. On logarithmic signatures and applications. Master's thesis, University of Nebraska at Lincoln, May 1989.

    Google Scholar 

  6. E. S. Page. A note on generating random permutations. Applied Statistics, 16:273–274, 1967.

    Article  Google Scholar 

  7. C. R. Rao. Generation of random permutations of given number of elements using random sampling numbers. Sankhya, 23:305–307, 1961.

    MATH  Google Scholar 

  8. C. C. Sims. Some group-theoretic algorithms. In M. F. Newman, editor, Topics in Algebra, pages 108–124. Springer-Verlag, 1978. Springer Lecture notes in Math. Vol 697.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Naveed A. Sherwani Elise de Doncker John A. Kapenga

Rights and permissions

Reprints and permissions

Copyright information

© 1991 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Magliveras, S.S., Memon, N.D. (1991). Random permutations from logarithmic signatures. In: Sherwani, N.A., de Doncker, E., Kapenga, J.A. (eds) Computing in the 90's. Great Lakes CS 1989. Lecture Notes in Computer Science, vol 507. Springer, New York, NY. https://doi.org/10.1007/BFb0038493

Download citation

  • DOI: https://doi.org/10.1007/BFb0038493

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-0-387-97628-0

  • Online ISBN: 978-0-387-34815-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics