> (I'm thinking that the original > attack is trivial once the set of 65000 colliding keys is public knowledge, > which must be only a matter of time.) I have a program able to generate collisions: it takes 1 second to compute 60,000 colliding strings on a desktop computer. So the security of the randomized hash is based on the fact than the attacker cannot compute the secret. Victor
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4