Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add SHA256 and Salt support #6

Merged
merged 4 commits into from
Mar 20, 2020

Conversation

jcjones
Copy link
Contributor

@jcjones jcjones commented Mar 13, 2020

I'm particularly interested in your thoughts on the composition order for the sha256 updates, and whether you think I should go ahead and add support via concatenation for salts to murmurhash. I would note as-is, we would construct a salted murmurhash3 as:
mmh3(salt || key, hash_seed)
whereas the construction for sha256 is here:
sha256(salt || hash_seed || key)
and recall hash_seed from the paper is basically the layer number shifted left.

Apologies for the formatting changes in there - Black did that when the arg lists got longer.

@jcjones jcjones added the enhancement New feature or request label Mar 13, 2020
@jcjones jcjones requested review from mozkeeler and tvdmerwe March 13, 2020 15:52
@jcjones jcjones self-assigned this Mar 13, 2020
@jcjones jcjones force-pushed the sha256-and-salt-support branch from d44734c to f3851e0 Compare March 13, 2020 15:53
@jcjones jcjones linked an issue Mar 13, 2020 that may be closed by this pull request
@tvdmerwe
Copy link

I think the concatenation in the order of (salt||hash_seed||key) is good here. For the sha256 case, hash_seed is not the IV. As it's used to provide a per-layer differentiation for 'key', and is predictable/known, we can treat it as an extension of the 'key'. We want the random salt prepended to inputs that can be known/controlled.

Regarding adding salt support for the murmer case, I don't know if we should add it yet. It might prompt usage in cases where a better hash function should be used.

Define a filter format version 2, persisting to each FilterCascade:

  * The hash algorithm in use
  * The salt in use, if any
  * Whether the filter cascade should use inverted logic
Copy link
Collaborator

@mozkeeler mozkeeler left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good in general - I left a few comments.

@tvdmerwe
Copy link

tvdmerwe commented Mar 19, 2020

A note on hash functions at the first layer (L1): To get k hash functions at L1, we can do this: sha_256(salt|| hash_no || hash_seed || key), where || is concatenation, and where hash_no is a byte value containing which hash we're using. So, for L1 we'd have hash_no increment to the value of k, for all the other layers, it would stay at 1, or 0 depending on where we start (because we only use one hash function from L2 onwards).

I think this only sufficient in the case of a good hash function, which sha_256 is.

@jcjones jcjones merged commit b9ba32b into mozilla:master Mar 20, 2020
@jcjones jcjones deleted the sha256-and-salt-support branch March 20, 2020 18:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Support sha256 hash function
3 participants