Message238578
To be clear, I have no opinion on your specific proposal and I don't know if the difference between "cryptographically secure" and "not cryptographically secure" matters for it. I just wanted to be clear that with SipHash an attacker should *not* be able to choose keys that will collide on purpose, but given the small output space (64bits IIRC) that collisions are more likely to occur than with MD5, SHA1, SHA2, etc. |
|
Date |
User |
Action |
Args |
2015-03-19 23:01:40 | dstufft | set | recipients:
+ dstufft, rhettinger |
2015-03-19 23:01:40 | dstufft | set | messageid: <1426806100.55.0.69770374717.issue23712@psf.upfronthosting.co.za> |
2015-03-19 23:01:40 | dstufft | link | issue23712 messages |
2015-03-19 23:01:40 | dstufft | create | |
|