Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

US Cyber Command's code has been cracked
IT Wire ^ | , 09 July 2010 | David Heath

Posted on 07/11/2010 2:05:23 AM PDT by tlb

For those unfamiliar, a 'hash' is a computed summary of a longer piece of text. For instance, this entire article could be hashed to a simple 32-byte hash which can be used to guarantee that the text is unchanged as modifying a single character in the text would yield a totally different hash.

The article from The Age infers the solution, without actually revealing it, noting that it is connected with the organisation's mission statement: "USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries."

In fact, using a reverse hash calculator we can easily determine that indeed the code is the MD5 hash of the mission statement.

This all suggests a couple of things. That the new Cyber Command might actually know a thing or two about encryption techniques and also that they seem to have a mild sense of humour.


TOPICS: Extended News; Government; Political Humor/Cartoons
KEYWORDS: code; departmentofdefense; easteregg; hash; uscybercom
It's official. Some of the high school geeks have advanced to flag rank.

9ec4c12949a4f31474f299058ce2b22a

http://www.dshield.org/tools/reversehash.html

1 posted on 07/11/2010 2:05:26 AM PDT by tlb
[ Post Reply | Private Reply | View Replies]

To: tlb

Drat. First part of the post was lost.

Over the past few days, the Internet has been awash with reports of an intriguing secret code embedded in the logo of the United States Cyber Command.

The logo clearly shows a string of characters on the inner gold ring surrounding the usual eagle-based motif.

For those of poor eyesight, the characters are:

9ec4c12949a4f31474f299058ce2b22a

Let’s apply some simple analysis before we reveal the secret.

Firstly, it’s almost certainly a hexadecimal string – there are digits 0 - 9 and letters a – f only. Breaking it into 2-byte pairs gives us:

9e c4 c1 29 49 a4 f3 14 74 f2 99 05 8c e2 b2 2a

An inspection of which suggests a very low likelihood of a simple character translation to plain text.

What else do we know? There are 32 bytes in the string and this is a very common length for a hash value.


2 posted on 07/11/2010 2:11:21 AM PDT by tlb
[ Post Reply | Private Reply | To 1 | View Replies]

To: tlb

There’s no such thing as a a “reverse hash calculator” though. Hash is meant to be one-way encryption.

I’ve checked it, yes that’s the MD5 of that string.


3 posted on 07/11/2010 2:17:52 AM PDT by chuck_the_tv_out ( <<< click my name: now featuring Freeper classifieds)
[ Post Reply | Private Reply | To 2 | View Replies]

To: tlb
This all suggests a couple of things. That the new Cyber Command might actually know a thing or two about encryption techniques and also that they seem to have a mild sense of humour.

It also suggests that they are behind the times - as MD5 has been supplanted for several years by more trusted algorithms.

4 posted on 07/11/2010 2:35:43 AM PDT by The Duke
[ Post Reply | Private Reply | To 1 | View Replies]

To: tlb
9e c4 c1 29 49 a4 f3 14 74 f2 99 05 8c e2 b2 2a
d   r    i    n   k   y   o   u  r    o   v   a   l    t   i    n
5 posted on 07/11/2010 2:41:35 AM PDT by C210N (0bama, Making the world safe for Marxism)
[ Post Reply | Private Reply | To 2 | View Replies]

To: C210N
It's actually Ovaltine.

LOL!

6 posted on 07/11/2010 2:54:13 AM PDT by James C. Bennett
[ Post Reply | Private Reply | To 5 | View Replies]

To: James C. Bennett

only had 16 characters to work with


7 posted on 07/11/2010 3:00:05 AM PDT by C210N (0bama, Making the world safe for Marxism)
[ Post Reply | Private Reply | To 6 | View Replies]

To: chuck_the_tv_out

It’s not really encryption, it’s validation. An encrypted message has the same amount of information as the orginal message, thirty-two bytes can never contain all the information in a much longer message. For instance if the original message was the first one million digits of PI, the hash code would still only be 32 bytes. There are infinitely many messages that would have the same hash code, but the probability that two distinct messages would have the same hash code purely by chance is about one in two raised to (the number of bytes times eight). For a thiry two byte hash code that would be about one in 1e77.

BTW, it appears to me that 9e c4 c1 29 49 a4 f3 14 74 f2 99 05 8c e2 b2 2a only contains 16 bytes. What am I missing?


8 posted on 07/11/2010 3:53:21 AM PDT by Lonesome in Massachussets (The naked casuistry of the high priests of Warmism would make a Jesuit blush.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: tlb

Sheesh. It’s all Geek to me.


9 posted on 07/11/2010 4:27:38 AM PDT by tgusa (Investment plan: blued steel, brass, lead, copper)
[ Post Reply | Private Reply | To 1 | View Replies]

To: tlb
Comment from PC world:

"There's nothing quite like a governmental agency that uses our money to waste time coming up with puzzles for us. How cute. Glad I pay my taxes so that we can have a larger standing army rather than a proper, well-regulated militia, like we're supposed to."

10 posted on 07/11/2010 4:35:36 AM PDT by NY.SS-Bar9 (When in the course of human events...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: James C. Bennett; C210N
It's actually DRINK MORE OVALTINE. FYI
11 posted on 07/11/2010 5:19:50 AM PDT by IllumiNaughtyByNature (3(0|\|0/\/\1($ 101: (4P174L1$/\/\ R3QU1r3$ (4P174L. Could it be any more simple?)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Lonesome in Massachussets

What’s the lightning bolt stand for? Elvis?


12 posted on 07/11/2010 5:32:20 AM PDT by homegroan (Proud member of the Hoi Polloi......ILLIGITIMA NON CARBORUNDUM..... -that's 4U Dad!))
[ Post Reply | Private Reply | To 8 | View Replies]

To: Lonesome in Massachussets
BTW, it appears to me that 9e c4 c1 29 49 a4 f3 14 74 f2 99 05 8c e2 b2 2a only contains 16 bytes. What am I missing?

Dark Matter: the unseen Universal constant.


13 posted on 07/11/2010 5:33:07 AM PDT by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 8 | View Replies]

To: LonePalm

Ping


14 posted on 07/11/2010 5:35:29 AM PDT by ASA Vet (Natural-born citizens, are those born in the country, of parents who are citizens. De Vattel)
[ Post Reply | Private Reply | To 1 | View Replies]

To: homegroan
What’s the lightning bolt stand for?

It's was a common element in all three of the military cryptologic services working for the No Such Agency.
Our replacements use it to pretend they are as good as we were.


15 posted on 07/11/2010 6:41:06 AM PDT by ASA Vet (Natural-born citizens, are those born in the country, of parents who are citizens. De Vattel)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Lonesome in Massachussets

It can also be used for encryption. Passwords are stored using it. The intent is *one-way encryption*.


16 posted on 07/11/2010 7:33:47 AM PDT by chuck_the_tv_out ( <<< click my name: now featuring Freeper classifieds)
[ Post Reply | Private Reply | To 8 | View Replies]

To: IllumiNaughtyByNature

BE SURE TO DRINK YOUR OVALTINE


17 posted on 07/11/2010 7:40:24 AM PDT by Rodamala
[ Post Reply | Private Reply | To 11 | View Replies]

To: chuck_the_tv_out

Again, I think it’s an example of validation rather than encryption. You can’t determine a password knowing its hash, there are infinitely many possible plaintext messages that would produce the same hash. What you can determine is that it is extremely unlikely that password entered was not the one that produced the stored hash. For me encryption implies the possibility of decryption, it is not even possible in principle to decrypt a message given its hash.


18 posted on 07/11/2010 7:52:48 AM PDT by Lonesome in Massachussets (The naked casuistry of the high priests of Warmism would make a Jesuit blush.)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Lonesome in Massachussets

You can find the password if you guess the length. It’s been done. Hence it’s a form of encryption, which is intended to be one way. And almost always is.


19 posted on 07/11/2010 8:27:14 AM PDT by chuck_the_tv_out ( <<< click my name: now featuring Freeper classifieds)
[ Post Reply | Private Reply | To 18 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson