Uploaded by Palash Shah

Pigeonhole Principle: Definition, Examples & Applications

advertisement
PIGEON HOLE PRINCIPAL
By: Palash Shah
Roll No: 16014123035
INTRODUCTION TO THE
PIGEONHOLE PRINCIPLE
Definition:
The Pigeon hole Principle states that
if n items are put into m containers,
and if n > m, then at least one container
must hold more than one item.
Basic Example:
If you have 10 pairs of socks and only 9
drawers, at least one drawer will contain
more than one pair of socks.
MATHEMATICAL FORMULATION
AND EXAMPLES
Mathematical Representation:
If n items are distributed among m containers, then at least one container has at
least ⌈ n / m⌉ items.
Additional Examples:
• Example 1: In a group of 13 people, at least two people must share a birth month
(12 months).
• Example 2: In a classroom of 30 students, at least two students must have the same
shoe size if there are only 10 different sizes available.
APPLICATIONS OF THE PIGEON
HOLE PRINCIPLE IN ENGINEERING
Computer Networks:
Data Structures:
Cryptography:
IP Addressing Schemes:
Hash Collisions:
1. If the number of devices (n) exceeds
the number of available IP
addresses (m), some devices must
share an IP, causing address
conflicts.
2. Example: In IPv4, with 4.3 billion
possible addresses, the increasing
number of devices leads to overlaps,
pushing the development of IPv6.
3. Impact: Efficient network design
ensures optimal use of IP space, and
the Pigeonhole Principle highlights
why new protocols like IPv6 were
necessary.
1. When more inputs (n) are mapped
to fewer outputs (m), collisions are
inevitable in hash tables.
2. Example: If 1000 inputs are hashed
into 100 buckets, at least one bucket
must contain multiple inputs.
3. Impact: Understanding hash
collisions helps in designing efficient
data structures like hash tables used
in databases and memory
optimization in software
development.
Vulnerabilities in Cryptographic
Systems:
1. The Pigeonhole Principle explains
potential weaknesses when
encrypting large datasets into
smaller encrypted outputs.
2. Example: Birthday Attack exploits
hash collisions to find two distinct
inputs that produce the same hash
output.
3. Impact: Enhances cryptographic
security by forcing developers to
design encryption algorithms that
minimize collision vulnerabilities.
REFERENCES
1. K. H. Rosen, Discrete Mathematics and Its Applications, 7th ed. New York:
McGraw-Hill, 2012.
2. "Discrete Mathematics - The Pigeonhole Principle," GeeksforGeeks. Available:
https://www.geeksforgeeks.org/discrete-mathematics-the-pigeonhole-principle/.
[Accessed: 11-Oct-2024].
3. u/digital_deviant, "Where is the Pigeon Hole Principle applied in computer
science?", Reddit. Available:
https://www.reddit.com/r/compsci/comments/2wlynw/where_is_the_pigeon_hole
_principle_applied_in/. [Accessed: 11-Oct-2024].
4. Ted-Ed, "How the Pigeonhole Principle proves you’re more creative than you
think," YouTube. Available: https://www.youtube.com/watch?v=B2A2pGrDG8I.
[Accessed: 11-Oct-2024]
Download