Message178784
According to talk at 29c3: http://events.ccc.de/congress/2012/Fahrplan/events/5152.en.html
Quote: We also describe a vulnerability of Python's new randomized hash, allowing an attacker to easily recover the 128-bit secret seed. As a reliable fix to hash-flooding, we introduce SipHash, a family of cryptographically strong keyed hash function competitive in performance with the weak hashes, and already adopted in OpenDNS, Perl 5, Ruby, and in the Rust language. |
|
Date |
User |
Action |
Args |
2013-01-01 23:20:26 | iElectric | set | recipients:
+ iElectric, lemburg, arigo, gregory.p.smith, mark.dickinson, vstinner, christian.heimes, benjamin.peterson, Arfrever, alex, cvrebert, dmalcolm, Giovanni.Bajo, PaulMcMillan, serhiy.storchaka, Vlado.Boza, koniiiik, sbermeister, camara, Łukasz.Rekucki, ReneSac, Bob.Ziuchkovski |
2013-01-01 23:20:26 | iElectric | set | messageid: <1357082426.45.0.877992378426.issue14621@psf.upfronthosting.co.za> |
2013-01-01 23:20:26 | iElectric | link | issue14621 messages |
2013-01-01 23:20:26 | iElectric | create | |
|