Same page merging reportedly uses a hash to evaluate if a page is the same.

While I’m unclear on what hash is used and there is some mention of SHA-1
on various things written about it, it is possible that a timing attack
could be used if a colliding hash exists, but the data it self varies in
the last portion of the page. A keyed hash, with a randomly chosen key at
the time of evaluation, could be used. There would be no need for HMAC
because the length of the data is fixed (although length extension attacks
appear to be a protocol issue).

It is also possible that the hash evaluation is vulnerable to a timing
attack, which can be a separate issue.

Reply via email to