in reply to Hash Collisions with PERL_HASH_SEED=0
Anyway, rather than brute-forcing, a real attack would use the known hash seed and the known hash algorithm, and with those known factors it's fairly trivial to offline generate a set of short strings which all map to the same hash bucket slot (but not necessarily to the same hash value, which has more bits than the number of buckets).
But no, I'm not going to explain how.
Dave.
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^2: Hash Collisions with PERL_HASH_SEED=0
by ikegami (Patriarch) on Apr 06, 2018 at 16:17 UTC | |
|
Re^2: Hash Collisions with PERL_HASH_SEED=0
by jimpudar (Pilgrim) on Apr 06, 2018 at 16:12 UTC |