Donald Stufft added the comment:

To be clear, I have no opinion on your specific proposal and I don't know if 
the difference between "cryptographically secure" and "not cryptographically 
secure" matters for it. I just wanted to be clear that with SipHash an attacker 
should *not* be able to choose keys that will collide on purpose, but given the 
small output space (64bits IIRC) that collisions are more likely to occur than 
with MD5, SHA1, SHA2, etc.

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue23712>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to