The document discusses how cryptographic techniques can be used maliciously in computer virology to evade antivirus detection. It covers how encryption can be used to randomly generate IP addresses for worm propagation, polymorphically mutate viral code, and armor code to prevent analysis. As an example, it analyzes how a programming error in the random number generator of the Sapphire/Slammer worm led to poor randomness and biased propagation.