Stealth Computing Abuses TCP Checksums

Paul Krumviede pwk at
Thu Aug 30 20:50:37 EDT 2001

--On Wednesday, 29 August, 2001 23:25 -0700 Bill Stewart 
<bill.stewart at> wrote:

> A group of researchers at Notre Dame figured out how to use the
> TCP Checksum calculations to get other computers to do number-crunching
> for them.
> 	"Below, we present an implementation of a parasitic computer
> 	using the checksum function.  In order for this to occur,
> 	one needs to design a special message that coerces a target server
> 	into performing the desired computation."
> The article has the amount of great mathematical depth you'd expect from
> CNN :-) But it does say that the paper will be published in "Nature" this
> week.

for those who didn't see the nature article, the authors have the article
(and supplementary material) available at


The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at

More information about the cryptography mailing list