{"id":587,"date":"2019-10-13T21:06:22","date_gmt":"2019-10-14T00:06:22","guid":{"rendered":"https:\/\/www.blogs.unicamp.br\/zero\/?p=587"},"modified":"2022-05-23T17:22:15","modified_gmt":"2022-05-23T20:22:15","slug":"math-vs-pack-combination","status":"publish","type":"post","link":"https:\/\/www.blogs.unicamp.br\/zero\/587\/","title":{"rendered":"Math vs Pack Combination"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"587\" class=\"elementor elementor-587\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0f1d582 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"0f1d582\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cc655d8 jltma-glass-effect-no\" data-id=\"cc655d8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-82fe94a jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"82fe94a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.blogs.unicamp.br\/zero\/2019\/10\/13\/matematica-vs-cadeados-de-segredo\/\">(Traduzir)<\/a><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05934b9 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"05934b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"justify\">You who use secret locks, be careful! Because with the basics of Combinatorial Analysis it is possible to discover the password in several models! First, let&#8217;s define the modus operandi of the users of the secret locks whose model involves several digits visible at the same time, so that they can then be positioned in the correct digits of the password.<\/p><p align=\"justify\">Users of these padlocks select a password with the N digits X<sub>1<\/sub>, X<sub>2<\/sub>, X<sub>3<\/sub>, \u2026, X<sub>N<\/sub>. As they consider the exhaustive search for this password impossible, that is to test the 9<sup>N<\/sup> combinations, they believe it is safe, soon they start to use the lock constantly. Each time they finish using the lock, make sure to shuffle the password, that is, choose Y<sub>1<\/sub>, &#8230;, Y<sub>N<\/sub> so for all digits, Y<sub>i<\/sub> \u2260 X<sub>i<\/sub>.<\/p><p align=\"justify\">If the shuffling process is carried out in a deterministic way, that is, always choosing the same Y<sub>1<\/sub>, Y<sub>2<\/sub>, Y<sub>3<\/sub>, &#8230;, Y<sub>N<\/sub>. The analysis of the padlock on different occasions will always give the same information &#8230; however, if the shuffling occurs in a non-deterministic way (that is, it shuffles at random, without following any pattern), we will have:<\/p><p align=\"center\">Y<sub>11<\/sub>, Y<sub>12<\/sub>, Y<sub>13<\/sub>, \u2026, Y<sub>1K<\/sub><\/p><p align=\"center\">Y<sub>21<\/sub>, Y<sub>22<\/sub>, Y<sub>23<\/sub>, \u2026, Y<sub>2K<\/sub><\/p><p align=\"center\">Y<sub>31<\/sub>, Y<sub>32<\/sub>, Y<sub>33<\/sub>, \u2026, Y<sub>3K<\/sub><\/p><p align=\"center\">\u2026<\/p><p align=\"center\">Y<sub>N1<\/sub>, Y<sub>N2<\/sub>, Y<sub>N3<\/sub>, \u2026, Y<sub>NK<\/sub><\/p><p align=\"justify\"><span lang=\"en-US\">Thus, if for all digits Y<\/span><sub><span lang=\"en-US\">i<\/span><\/sub><span lang=\"en-US\"> \u2260 X<\/span><sub><span lang=\"en-US\">i<\/span><\/sub><span lang=\"en-US\"> (that is, whoever scrambled it made sure that no number of the password would remain in the final configuration). We can determine the frequencies with which each number appears in each digit. Digits with frequencies 0 will be candidates for the solution. This greatly reduces the space for combinations to be analyzed.<br \/>However, the risk is heightened for those who use several secret locks (such as computer lab technicians). Since an analysis of the laboratory&#8217;s M padlocks reduces its scope of possibilities.<\/span><\/p><p align=\"justify\"><b> Real example: <\/b>in a computer lab, they use secret locks to secure ten of the computers&#8217; cabinets. The password for each lock consists of 4 digits from 0 to 9.<\/p><p align=\"justify\">When looking at the digit spaces, we can see up to 2 numbers (since they are not actually aligned as a password). Below I present the 10 configurations recorded on my last visit to the site. On the label of each column we have C-(padlock number), and in the lines below the two numbers visible in each space of the password.<\/p><table width=\"376\" cellspacing=\"0\" cellpadding=\"2\"><colgroup><col width=\"34\" \/> <col width=\"34\" \/> <col width=\"34\" \/> <col width=\"34\" \/> <col width=\"34\" \/> <col width=\"34\" \/> <col width=\"34\" \/> <col width=\"34\" \/> <col width=\"34\" \/> <col width=\"34\" \/> <\/colgroup><tbody><tr><td width=\"34\"><p align=\"center\"><b>C-1<\/b><\/p><\/td><td width=\"34\"><p align=\"center\"><b>C-2<\/b><\/p><\/td><td width=\"34\"><p align=\"center\"><b>C-3<\/b><\/p><\/td><td width=\"34\"><p align=\"center\"><b>C-4<\/b><\/p><\/td><td width=\"34\"><p align=\"center\"><b>C-5<\/b><\/p><\/td><td width=\"34\"><p align=\"center\"><b>C-6<\/b><\/p><\/td><td width=\"34\"><p align=\"center\"><b>C-7<\/b><\/p><\/td><td width=\"34\"><p align=\"center\"><b>C-8<\/b><\/p><\/td><td width=\"34\"><p align=\"center\"><b>C-9<\/b><\/p><\/td><td width=\"34\"><p align=\"center\"><b>C-10<\/b><\/p><\/td><\/tr><tr><td width=\"34\"><p align=\"center\">7-6<\/p><\/td><td width=\"34\"><p align=\"center\">4-3<\/p><\/td><td width=\"34\"><p align=\"center\">6-5<\/p><\/td><td width=\"34\"><p align=\"center\">4-3<\/p><\/td><td width=\"34\"><p align=\"center\">5-4<\/p><\/td><td width=\"34\"><p align=\"center\">9-8<\/p><\/td><td width=\"34\"><p align=\"center\">7-6<\/p><\/td><td width=\"34\"><p align=\"center\">5-4<\/p><\/td><td width=\"34\"><p align=\"center\">3-2<\/p><\/td><td width=\"34\"><p align=\"center\">8-7<\/p><\/td><\/tr><tr><td width=\"34\"><p align=\"center\">2-1<\/p><\/td><td width=\"34\"><p align=\"center\">4-3<\/p><\/td><td width=\"34\"><p align=\"center\">7-6<\/p><\/td><td width=\"34\"><p align=\"center\">1-0<\/p><\/td><td width=\"34\"><p align=\"center\">9-8<\/p><\/td><td width=\"34\"><p align=\"center\">3-2<\/p><\/td><td width=\"34\"><p align=\"center\">1-0<\/p><\/td><td width=\"34\"><p align=\"center\">1-0<\/p><\/td><td width=\"34\"><p align=\"center\">9-8<\/p><\/td><td width=\"34\"><p align=\"center\">5-4<\/p><\/td><\/tr><tr><td width=\"34\"><p align=\"center\">2-1<\/p><\/td><td width=\"34\"><p align=\"center\">4-3<\/p><\/td><td width=\"34\"><p align=\"center\">2-1<\/p><\/td><td width=\"34\"><p align=\"center\">4-3<\/p><\/td><td width=\"34\"><p align=\"center\">6-5<\/p><\/td><td width=\"34\"><p align=\"center\">4-3<\/p><\/td><td width=\"34\"><p align=\"center\">0-9<\/p><\/td><td width=\"34\"><p align=\"center\">3-2<\/p><\/td><td width=\"34\"><p align=\"center\">4-3<\/p><\/td><td width=\"34\"><p align=\"center\">6-5<\/p><\/td><\/tr><tr><td width=\"34\"><p align=\"center\">4-3<\/p><\/td><td width=\"34\"><p align=\"center\">4-3<\/p><\/td><td width=\"34\"><p align=\"center\">8-7<\/p><\/td><td width=\"34\"><p align=\"center\">8-7<\/p><\/td><td width=\"34\"><p align=\"center\">8-7<\/p><\/td><td width=\"34\"><p align=\"center\">3-2<\/p><\/td><td width=\"34\"><p align=\"center\">2-1<\/p><\/td><td width=\"34\"><p align=\"center\">2-1<\/p><\/td><td width=\"34\"><p align=\"center\">5-4<\/p><\/td><td width=\"34\"><p align=\"center\">2-1<\/p><\/td><\/tr><\/tbody><\/table><p align=\"justify\">Analyzing the digits that do not appear in the Y<sub>1<\/sub>, Y<sub>2<\/sub>, Y<sub>3<\/sub>, Y<sub>4<\/sub> positions of the lock, we have to:<\/p><p align=\"justify\"><b>Position Y1:<\/b> 0 and 1 do not appear;<\/p><p align=\"justify\"><b>Position Y2:<\/b> 7 does not appear;<\/p><p align=\"justify\"><b>Position Y3:<\/b> 8 does not appear;<\/p><p align=\"justify\"><b>Position Y4:<\/b> 0, 6 and 9 do not appear.<\/p><p align=\"justify\">With this, we can reduce from the original combinations (9\u2074) to the following 6:<\/p><p align=\"center\"><b>1st possibility:<\/b> 0-7-8-0;<\/p><p align=\"center\"><b>2nd possibility:<\/b> 0-7-8-6;<\/p><p align=\"center\"><b>3rd possibility:<\/b> 0-7-8-9;<\/p><p align=\"center\"><b>4th possibility:<\/b> 1-7-8-0;<\/p><p align=\"center\"><b>5th possibility:<\/b> 1-7-8-6;<\/p><p align=\"center\"><b>6th possibility:<\/b> 1-7-8-9.<\/p><p align=\"justify\">However, it is worth noting that when we define the user&#8217;s modus operandi, we put the user to shuffle the password such that all digits Y<sub>i<\/sub> \u2260 X<sub>i<\/sub>. But if instead of everyone they were \u201calmost everyone\u201d or \u201cthe majority\u201d, the problem would become a little more complex. Because we would need a much larger amount of samples to infer among those with lower frequencies (not necessarily the lowest frequency), which candidates are the solution.<\/p><p align=\"justify\">Out of curiosity, I tested these 6 combinations in the same laboratory and none of them opened the lock. Which allows us to conclude that the technician&#8217;s modus operandi does not guarantee that Y<sub>i<\/sub> \u2260 X<sub>i<\/sub>. To decode these padlocks, we would then need to gather more results and choose as candidates those with lower frequencies, even if they are greater than 0.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ec3e8c5 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"ec3e8c5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-315678b jltma-glass-effect-no\" data-id=\"315678b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bd323b8 jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"bd323b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.blogs.unicamp.br\/zero\/\">Back to main page<\/a><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b837023 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"b837023\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c90da99 jltma-glass-effect-no\" data-id=\"c90da99\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-874710c jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"874710c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.blogs.unicamp.br\/zero\/who-writes-the-posts\/\">Who writes the posts?<\/a><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>You who use secret locks, be careful! Because with the basics of Combinatorial Analysis it is possible to discover the password in several models!<\/p>\n","protected":false},"author":434,"featured_media":622,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"editor_plus_copied_stylings":"{}","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"pgc_sgb_lightbox_settings":"","_vp_format_video_url":"","_vp_image_focal_point":[],"footnotes":""},"categories":[1209],"tags":[],"class_list":["post-587","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-v-2-ed-2"],"_links":{"self":[{"href":"https:\/\/www.blogs.unicamp.br\/zero\/wp-json\/wp\/v2\/posts\/587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.blogs.unicamp.br\/zero\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.blogs.unicamp.br\/zero\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.blogs.unicamp.br\/zero\/wp-json\/wp\/v2\/users\/434"}],"replies":[{"embeddable":true,"href":"https:\/\/www.blogs.unicamp.br\/zero\/wp-json\/wp\/v2\/comments?post=587"}],"version-history":[{"count":8,"href":"https:\/\/www.blogs.unicamp.br\/zero\/wp-json\/wp\/v2\/posts\/587\/revisions"}],"predecessor-version":[{"id":1705,"href":"https:\/\/www.blogs.unicamp.br\/zero\/wp-json\/wp\/v2\/posts\/587\/revisions\/1705"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.blogs.unicamp.br\/zero\/wp-json\/wp\/v2\/media\/622"}],"wp:attachment":[{"href":"https:\/\/www.blogs.unicamp.br\/zero\/wp-json\/wp\/v2\/media?parent=587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.blogs.unicamp.br\/zero\/wp-json\/wp\/v2\/categories?post=587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.blogs.unicamp.br\/zero\/wp-json\/wp\/v2\/tags?post=587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}