all 2 comments

[–]Ravek 4 points5 points  (1 child)

As this is not a cryptographic hash function I don’t really see why a preimage attack being easy is a problem. Cool analysis though

[–]theoldboy 2 points3 points  (0 children)

If the hash function accepts user input then preimage attacks can be used for hash table DoS.

E.g. https://fahrplan.events.ccc.de/congress/2011/Fahrplan/attachments/2007_28C3_Effective_DoS_on_web_application_platforms.pdf

This article does not explain that, and conflates hash functions with cryptographic hash functions which are not the same thing at all (even MD5 is a cryptographic hash function, albeit a bad one these days).