Randomized algorithms in systems without coordination and centralization

Authors

  • Oksana Kubaychuk Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Kyiv, Ukraine https://orcid.org/0000-0002-5135-3688
  • Denis Sai Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Kyiv, Ukraine https://orcid.org/0009-0009-0185-0991

DOI:

https://doi.org/10.20535/2411-1031.2024.12.1.306274

Keywords:

randomized algorithm, parallel computing, probabilistic analysis, average complexity, Chernov-Heffding inequalities, Markov inequality, hypercube routing

Abstract

Evaluating the complexity of algorithms based only on the possibility of the worst possible variant of the input data is often not justified. The development of algorithms that would predictably work quickly on all possible inputs is of practical importance. If for the problem there is a reasonable opportunity to model the distributions of input values, then you can use probabilistic analysis as a method of developing effective algorithms. When the information about the distribution of input values is not enough for their numerical modeling, algorithms are developed by giving a part of the algorithm itself a random character - randomized algorithms. The use of randomization ensures the operation of the algorithm with minimal needs to store internal states and events in the past, and the algorithms themselves look compact. The paper studies problems for which there are relatively effective deterministic algorithms for solving. But, as will be shown, the construction of appropriate randomized algorithms leads to effective and efficient parallel computing schemes with linear complexity on average. The advantages of randomization are especially evident in the case of large computer systems and communication networks that function without coordination and centralization. Examples of such distributed systems are, in particular, networks of currently popular cryptocurrencies. The use of randomized heuristics allows the system to adapt to changing operating conditions and minimizes the likelihood of conflicts between processes. The paper shows the advantages of using a randomized algorithm over deterministic algorithms for the problem of routing in a network with a hypercube topology. A theorem on estimating the expected number of steps required by Valiant's randomized algorithm to deliver all messages to an address is proved. The expected linear complexity of Valiant's algorithm is a direct consequence of the proven theorem.

Author Biographies

Oksana Kubaychuk, Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Kyiv

candidate of sciences in mathematics, associate professor
at the cybersecurity and information security academic department

Denis Sai, Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Kyiv

cadet

References

D.R. Karger, and C. Stein, “A new approach to the minimum cut problem”, Journal of the ACM (JACM), vol. 43, iss. 4, 601-640, 1966.

Gupta, E. Lee, and J. Li, “The number of minimum k-cuts: Improving the Karger-Stein bound”. in Proc. 51st Annual ACM SIGACT Symposium on Theory of Computing, 2019, pp. 229-240, doi: https://doi.org/10.48550/arXiv.1906.00417.

M.N. Wegman, and J.L. Carter, “New hash functions and their use in authentication and set equality”, J. Comput. System Sci, vol. 22, pp. 265-279, 1981.

M.O. Rabin, and R.M. Karp, “Efficient randomized pattern-matching algorithms”, IBM Journal of Research and Development, vol. 31, no. 2, pp. 249-260, 1987, doi: https://doi.org/10.1147/rd.312.0249.

Borodin, and J.E. Hopcroft, “Routing, merging, and sorting on parallel models of computation”, Journal of Computer and System Sciences, vol. 30 (1), pp. 130-145, 1985, doi: https://doi.org/10.1016/0022-0000(85)90008-X.

C. Kaklamanis, D. Krizanc, and T. Tsantilas, “Tight bounds for oblivious routing in the hypercube”, Mathematical Systems Theory, vol. 24 (4), pp. 223-232, 1991, doi: https://doi.org/10.1007/BF02090400.

F.T. Leighton, B.M. Maggs, and S.B. Rao, “Packet routing and job-shop scheduling inO(congestion+dilation) steps”, Combinatorica, vol. 14, pp. 167-186, 1994, doi: https://doi.org/10.1007/BF01215349.

L.G. Valiant, and G.J. Brebner, “Universal schemes for parallel communication”, in Proc. 13th Ann. ACM Symp. on Theory of Comp. (STOC’81), 1981, pp. 263-277, 1981, doi: https://doi.org/10.1145/800076.802479.

L.G. Valiant, “A scheme for fast parallel communication”, SIAM Journal on Computing, iss. 11 (2), pp. 350-361, 1982, doi: https://doi.org/10.1137/0211027.

H. Räcke, and S. Schmid, “Compact oblivious routing”, in Proc. 27th Europ. Symp. on Algor. (ESA 2019), Leibniz Int. Proc. in Inform. (LIPIcs), Schloss Dagstuhl, 2019, vol. 144, pp. 75:1-75:14, doi: https://doi.org/10.4230/LIPIcs.ESA.2019.75.

P. Czerner, and H. Räcke, “Compact Oblivious Routing in Weighted Graphs”, in Proc. 28th Ann. Europ. Symp. on Algor. (ESA 2020), Leibniz Int. Proc. in Inform. (LIPIcs), Schloss Dagstuhl, 2020, vol. 173, pp. 36:1-36:23, doi: https://doi.org/10.4230/LIPIcs.ESA.2020.36.

D. Rachmawati, H. Tamara, S. Sembiring, and M. Budiman, “RSA public key solving technique by using genetic algorithm”, Journal of Theoretical and Applied Information Technology, vol. 98, iss. 15, pp. 2990 2999, 2020.

A.K.S. Sabonchi, and B. Akay, “Cryptanalysis of polyalphabetic cipher using differential evolution algorithm”, Tehnički vjesnik, iss. 27 (4), pp. 1101 1107, 2020, doi: https://doi.org/10.17559/TV-20190314095054.

B. Akay, “A binomial crossover based artificial bee colony algorithm for cryptanalysis of polyalphabetic cipher”, Tehnički vjesnik, iss. 27 (6). pp. 1825-1835, 2020, doi: https://doi.org/10.17559/TV-20190422225110.

A.K.S. Sabonchi, B. Akay, “A survey on the Metaheuristics for Cryptanalysis of Substitution and Transposition Ciphers”, Computer Systems Science And Engineering, vol. 39, no. 1, pp. 87-106, 2021, doi: http://doi.org/10.32604/csse.2021.05365.

H. Grari, S. Lamzabi, A. Azouaoui, and K. Zine-Dine, “Cryptanalysis of Merkle-Hellman cipher using ant colony optimization”, Int. Jour. Artif. Intell. (IJ-AI), vol. 10, no. 2, pp. 490-500, 2021, doi: https://doi.org/10.11591/ijai.v10.i2.

K. Dworak, and U. Boryczka, “Breaking Data Encryption Standard with a Reduced Number of Rounds Using Metaheuristics Differential Cryptanalysis”, Entropy. vol. 23, iss. 12, pp. 1697-1718, 2021, doi: https://doi.org/10.3390/e23121697.

О.О. Kubaychuk, “Osoblyvosti zastosuvannia alhorytmu ASO do deiakykh zadach kryptoanalizu”, Naukoiemni tekhnolohii, no. 2 (58), pp. 141-148, 2023, doi: https://doi.org/10.18372/2310-5461.58.17650

О.О. Kubaychuk, “Ohliad zastosuvannia metaevrystychnoho pidkhodu v kryptoanalizi”, Visnyk KhNTU: informatsiini tekhnolohii, no. 2 (85), pp. 147-153, 2023, doi: https://doi.org/10.35546/kntu2078-4481.2023.2.20

R. Мotwani, and P. Raghavan, Randomized Algorithms. Cambridge, GB: Cambridge Univ. Press, 1995.

M. Mitzenmacher, and E.Upfal, Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge, GB: Cambridge Univ. Press, 2005.

Published

2024-06-27

How to Cite

Kubaychuk, O., & Sai, D. (2024). Randomized algorithms in systems without coordination and centralization. Collection "Information Technology and Security", 12(1), 80–90. https://doi.org/10.20535/2411-1031.2024.12.1.306274

Issue

Section

MATHEMATICAL AND COMPUTER MODELING