Message178784
| Author |
iElectric |
| Recipients |
Arfrever, Bob.Ziuchkovski, Giovanni.Bajo, PaulMcMillan, ReneSac, Vlado.Boza, alex, arigo, benjamin.peterson, camara, christian.heimes, cvrebert, dmalcolm, gregory.p.smith, iElectric, koniiiik, lemburg, mark.dickinson, sbermeister, serhiy.storchaka, vstinner, Łukasz.Rekucki |
| Date |
2013年01月01日.23:20:26 |
| SpamBayes Score |
-1.0 |
| Marked as misclassified |
Yes |
| Message-id |
<1357082426.45.0.877992378426.issue14621@psf.upfronthosting.co.za> |
| In-reply-to |
| Content |
According to talk at 29c3: http://events.ccc.de/congress/2012/Fahrplan/events/5152.en.html
Quote: We also describe a vulnerability of Python's new randomized hash, allowing an attacker to easily recover the 128-bit secret seed. As a reliable fix to hash-flooding, we introduce SipHash, a family of cryptographically strong keyed hash function competitive in performance with the weak hashes, and already adopted in OpenDNS, Perl 5, Ruby, and in the Rust language. |
|
History
|
|---|
| Date |
User |
Action |
Args |
| 2013年01月01日 23:20:26 | iElectric | set | recipients:
+ iElectric, lemburg, arigo, gregory.p.smith, mark.dickinson, vstinner, christian.heimes, benjamin.peterson, Arfrever, alex, cvrebert, dmalcolm, Giovanni.Bajo, PaulMcMillan, serhiy.storchaka, Vlado.Boza, koniiiik, sbermeister, camara, Łukasz.Rekucki, ReneSac, Bob.Ziuchkovski |
| 2013年01月01日 23:20:26 | iElectric | set | messageid: <1357082426.45.0.877992378426.issue14621@psf.upfronthosting.co.za> |
| 2013年01月01日 23:20:26 | iElectric | link | issue14621 messages |
| 2013年01月01日 23:20:26 | iElectric | create |
|