Langsung ke konten utama

Researcher cracks 'secret' code in U.S. Cyber Command logo

Panda Security researchers solved the mystery of the 32-character code in the inner gold ring of U.S. Cyber Command's logo.
A security researcher said on Thursday he was the first to crack the code embedded in the seal of the U.S. Cyber Command (Cybercom), the group responsible for protecting the country's military networks from attack.

Sean-Paul Correll, a threat researcher with antivirus vendor Panda Security, said that the characters visible in a gold ring on Cybercom's official seal represent the MD5 hash of the group's mission statement. MD5 is a 128-bit cryptographic hash most often used to verify file integrity.

A representative of Cybercom confirmed that Correll had it right. " Mr. Correll is correct...it's a MD5 hash," said Lt. Commander Steve Curry of the U.S. Navy, in an e-mail.

"It wasn't very difficult," said Correll, adding that thanks to the clue on Wired.com's Danger Room blog, it took him just a few minutes to figure out that the characters -- 9ec4c12949a4f31474f299058ce2b22a -- were the hash value for Cybercom's mission statement.


"I knew right away it was an MD5 hash, and I was fairly confident that it wasn't a specific file," said Correll, adding that security professionals will often use an MD5 hash as reminders, or to verify that a file's contents after downloading match the original edition.

Correll said he figured out the mystery shortly after 10 a.m. PT Wednesday, within an hour of Wired.com publishing its story.

At least one other code-breaker came up with the same solution. Buried in the nearly 500 comments added to the Wired.com story was the solution, posted Wednesday at 12:46 p.m. PT by someone identified only as "jemelehill".
In a follow-up story, Wired.com credited jemelehill with first decoding the message.

"Information security professionals are very challenge driven," said Correll, so tackling the problem was fun...while it lasted. "Absolutely, this was definitely fun," he said.

Correll is familiar with code-breaking problems, since Panda regularly sponsors secret code challenges. The next challenge is scheduled to go live at 3:00 a.m. ET Saturday, 12:00 a.m. PT.

The MD5 value is a hash of Cybercom's 58-word mission statement, Correll noted on his blog: "USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries."

Cybercom was created in June 2009, when Defense Secretary Robert Gates approved the group. Two months ago, the Senate appointed Lt. Gen. Keith Alexander as the head Cybercom. Alexander is also the director of the National Security Agency (NSA).

U.S. Cyber Command is part of the U.S. Strategic Command, and is based in Fort Meade, MD. Several units of the U.S. military, including ones from the Army, Navy, Air Force and Marines comprise Cybercom.

source : http://www.computerworld.com/s/article/9179004/Researcher_cracks_secret_code_in_U.S._Cyber_Command_logo?taxonomyId=13

POPULAR

Rasulullah Pingsan dan Menangis Saat Mendengarkan Jibril Mengisahkan Pintu Neraka

Yazid Ar raqqasyi dari Anas bin Malik ra. berkata: Jibril datang kepada Rasulullah pada waktu yang ia tidak biasa datang dalam keadaan berubah mukanya, maka ditanya oleh Rasululah Saw: "Mengapa aku melihat kau berubah muka (wajah)?" Jawabnya: "Ya Muhammad, aku datang kepadamu di saat Allah menyuruh supaya dikobarkan penyalaan api neraka, maka tidak layak bagi orang yang mengetahui bahwa neraka Jahannam itu benar, siksa kubur itu benar, dan siksa Allah itu terbesar untuk bersuka-suka sebelum ia merasa aman daripadanya".

Kerajaan Jeumpa, Kerajaan Islam Pertama Nusantara

Teori tentang kerajaan Islam pertama di Nusantara sampai saat ini masih banyak diperdebatkan oleh para peneliti, baik cendekiawan Muslim maupun non Muslim. Umumnya perbedaan pendapat tentang teori ini didasarkan pada teori awal mula masuknya Islam ke Nusantara. Mengenai teori Islamisasi di Nusantara, para ahli sejarah terbagi menjadi 3 kelompok besar, yaitu pendukung (i) Teori Gujarat (ii) Teori Parsia dan (iii) Teori Mekah (Arab). Bukan maksud tulisan ini untuk membahas teori-teori tersebut secara mendetil, namun dari penelitian yang penulis lakukan, maka dapat disimpulkan bahwa Teori Mekkah (Arab) lebih mendekati kebenaran dengan fakta-fakta yang dikemukakan. Teori Mekkah (Arab) hakikatnya adalah koreksi terhadap teori Gujarat dan bantahan terhadap teori Persia. Di antara para ahli yang menganut teori ini adalah T.W. Arnold, Crawfurd, Keijzer, Niemann, De Holander, SMN. Al-Attas, A. Hasymi, dan Hamka. i Arnold menyatakan para pedagang Arab menyebarkan Islam ketika mereka mendo...

Jakarta, Kota Kelima Terburuk Bagi Pekerja IT

Jakarta di malam hari Pekerja profesional di bidang teknologi Informasi membutuhkan sebuah lingkungan kerja yang nyaman untuk mendukung pekerjaannya. Banyak para profesional di bidang teknologi Informasi yang hijrah ke luar negara asalnya untuk menerapkan semua kemampuannya. Tapi ada beberapa kota di dunia yang dinilai sebaiknya harus dihindari bagi Pekerja IT, dan salah satunya adalah Jakarta. Dalam daftar 10 kota yang harus dihindari oleh pekerja IT dunia yang dikeluarkan majalah CIO, Jakarta disebut sebagai kota terburuk dan tak mampu menyediakan lingkungan kerja yang ideal bagi seorang pekerja IT.