Langsung ke konten utama

Researcher cracks 'secret' code in U.S. Cyber Command logo

Panda Security researchers solved the mystery of the 32-character code in the inner gold ring of U.S. Cyber Command's logo.
A security researcher said on Thursday he was the first to crack the code embedded in the seal of the U.S. Cyber Command (Cybercom), the group responsible for protecting the country's military networks from attack.

Sean-Paul Correll, a threat researcher with antivirus vendor Panda Security, said that the characters visible in a gold ring on Cybercom's official seal represent the MD5 hash of the group's mission statement. MD5 is a 128-bit cryptographic hash most often used to verify file integrity.

A representative of Cybercom confirmed that Correll had it right. " Mr. Correll is correct...it's a MD5 hash," said Lt. Commander Steve Curry of the U.S. Navy, in an e-mail.

"It wasn't very difficult," said Correll, adding that thanks to the clue on Wired.com's Danger Room blog, it took him just a few minutes to figure out that the characters -- 9ec4c12949a4f31474f299058ce2b22a -- were the hash value for Cybercom's mission statement.


"I knew right away it was an MD5 hash, and I was fairly confident that it wasn't a specific file," said Correll, adding that security professionals will often use an MD5 hash as reminders, or to verify that a file's contents after downloading match the original edition.

Correll said he figured out the mystery shortly after 10 a.m. PT Wednesday, within an hour of Wired.com publishing its story.

At least one other code-breaker came up with the same solution. Buried in the nearly 500 comments added to the Wired.com story was the solution, posted Wednesday at 12:46 p.m. PT by someone identified only as "jemelehill".
In a follow-up story, Wired.com credited jemelehill with first decoding the message.

"Information security professionals are very challenge driven," said Correll, so tackling the problem was fun...while it lasted. "Absolutely, this was definitely fun," he said.

Correll is familiar with code-breaking problems, since Panda regularly sponsors secret code challenges. The next challenge is scheduled to go live at 3:00 a.m. ET Saturday, 12:00 a.m. PT.

The MD5 value is a hash of Cybercom's 58-word mission statement, Correll noted on his blog: "USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries."

Cybercom was created in June 2009, when Defense Secretary Robert Gates approved the group. Two months ago, the Senate appointed Lt. Gen. Keith Alexander as the head Cybercom. Alexander is also the director of the National Security Agency (NSA).

U.S. Cyber Command is part of the U.S. Strategic Command, and is based in Fort Meade, MD. Several units of the U.S. military, including ones from the Army, Navy, Air Force and Marines comprise Cybercom.

source : http://www.computerworld.com/s/article/9179004/Researcher_cracks_secret_code_in_U.S._Cyber_Command_logo?taxonomyId=13

Postingan populer dari blog ini

57% Use Social Network Sites

The power of online social networking was demonstrated by the tens of thousands who gathered in Shanghai at the weekend to pay their respects to the people who died in last Monday's blaze. The event at Jiaozhou Road was launched on microblogs and information spread rapidly on the Internet , especially on social networking sites such as Kaixin001.com. According to a survey by Shanghai Daily and Touchmedia, of 110,000 people traveling in taxis in Shanghai, Beijing, Guangzhou and Shenzhen , 57 percent of interviewees use social networking sites or microblogs for more than half an hour a day, and 18 percent for more than three hours. Microblogging is the most popular form. Almost 60 percent of the interviewees said they publish information on microblogs, communicating with friends, following celebrities, expressing their opinions, sharing jokes and conducting online marketing, said the survey.

Upcoming Facebook Redesign Surface

Kerajaan Jeumpa, Kerajaan Islam Pertama Nusantara

Teori tentang kerajaan Islam pertama di Nusantara sampai saat ini masih banyak diperdebatkan oleh para peneliti, baik cendekiawan Muslim maupun non Muslim. Umumnya perbedaan pendapat tentang teori ini didasarkan pada teori awal mula masuknya Islam ke Nusantara. Mengenai teori Islamisasi di Nusantara, para ahli sejarah terbagi menjadi 3 kelompok besar, yaitu pendukung (i) Teori Gujarat (ii) Teori Parsia dan (iii) Teori Mekah (Arab). Bukan maksud tulisan ini untuk membahas teori-teori tersebut secara mendetil, namun dari penelitian yang penulis lakukan, maka dapat disimpulkan bahwa Teori Mekkah (Arab) lebih mendekati kebenaran dengan fakta-fakta yang dikemukakan. Teori Mekkah (Arab) hakikatnya adalah koreksi terhadap teori Gujarat dan bantahan terhadap teori Persia. Di antara para ahli yang menganut teori ini adalah T.W. Arnold, Crawfurd, Keijzer, Niemann, De Holander, SMN. Al-Attas, A. Hasymi, dan Hamka. i Arnold menyatakan para pedagang Arab menyebarkan Islam ketika mereka mendo...