| Readers of this list may be interested in an analysis of the Witty | worm's spread by Kumark, Paxson, and Weaver. An article summarizing | the paper is at http://www.zdnet.co.uk/print/?TYPE=story&AT=39200183-39020375t-10000025c | A tentative conclusion is that the worm was probably written by an | insider at ISS.... | | The paper itself (there's a link in the article) has several more items | of interest to this list. Especially interesting is the effective | cryptanalysis of the PRNG used by the worm. Implicit in many of the | analyses, though not a focus of the paper, is the amount of information | that the authors could gather about network configurations at different | sites: as we all know, traffic analysis is a powerful technique. The links in the paper no longer work - they go to restricted pages. The (or an) HTML version is in the Google cache at:
http://64.233.161.104/search?q=cache:oS94i-ojvIgJ:www.cc.gatech.edu/~akumar/witty.html+witty+worm+analysis+paxson&hl=en&start=1 -- Jerry --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
