[Cryptography] Bloom filter question

Peter Gutmann pgut001 at cs.auckland.ac.nz
Mon Aug 4 20:31:16 EDT 2025


Jon Callas <jon at callas.org> writes:

>On the other end of the scale, there's hash tables, where collisions are
>normal and expected.

It depends on how you're using the hash table, if it's to process attacker-
controlled data like in a packet filter than you can't afford collisions
where an attacker can turn your fast lookup into a slow linear search.

Peter.


More information about the cryptography mailing list