Author iElectric
Recipients Arfrever, Bob.Ziuchkovski, Giovanni.Bajo, PaulMcMillan, ReneSac, Vlado.Boza, alex, arigo, benjamin.peterson, camara, christian.heimes, cvrebert, dmalcolm, gregory.p.smith, haypo, iElectric, koniiiik, lemburg, mark.dickinson, sbermeister, serhiy.storchaka, Łukasz.Rekucki
Date 2013-01-01.23:20:26
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1357082426.45.0.877992378426.issue14621@psf.upfronthosting.co.za>
In-reply-to
Content
According to talk at 29c3: http://events.ccc.de/congress/2012/Fahrplan/events/5152.en.html

Quote: We also describe a vulnerability of Python's new randomized hash, allowing an attacker to easily recover the 128-bit secret seed. As a reliable fix to hash-flooding, we introduce SipHash, a family of cryptographically strong keyed hash function competitive in performance with the weak hashes, and already adopted in OpenDNS, Perl 5, Ruby, and in the Rust language.
History
Date User Action Args
2013-01-01 23:20:26iElectricsetrecipients: + iElectric, lemburg, arigo, gregory.p.smith, mark.dickinson, haypo, christian.heimes, benjamin.peterson, Arfrever, alex, cvrebert, dmalcolm, Giovanni.Bajo, PaulMcMillan, serhiy.storchaka, Vlado.Boza, koniiiik, sbermeister, camara, Łukasz.Rekucki, ReneSac, Bob.Ziuchkovski
2013-01-01 23:20:26iElectricsetmessageid: <1357082426.45.0.877992378426.issue14621@psf.upfronthosting.co.za>
2013-01-01 23:20:26iElectriclinkissue14621 messages
2013-01-01 23:20:26iElectriccreate