|
It's a shame for USCYBERCOM to put a weak hash 9ec4c12949a4f31474f299058ce2b22a on its emblem |
|
Subject: It's a shame for USCYBERCOM to put a weak hash 9ec4c12949a4f31474f299058ce2b22a on its emblem
Author: X509
In response to: Secret code on USCYBERCOM's emblem
Posted on: 07/09/2010 07:13:36 PM
SHA-1 --> (160bits/20bytes)
SHA-1("USCYBERCOM plans, coordinates, integrates, synchronizes
and conducts activities to: direct the operations and defense
of specified Department of Defense information networks and;
prepare to, and when directed, conduct full spectrum military
cyberspace operations in order to enable actions in all domains,
ensure US/Allied freedom of action in cyberspace and deny
the same to our adversaries.")
= ded78b51e66596ba095d39b138b2aa22bc9185e2
As discussed above, like SHA-1, MD5 has been compromised. NIST.gov and even the US Department of Homeland security itself have stated that it is weak and the US government will be moving away from using it after 2010. So why did the USCYBERCOM choose the weaker form and proudly imprint it on its face? It's simply a shame. Instead, one of the stronger hash should be picked just for fun. SHA-256 --> (256bits/32bytes)
[code]
SHA-256("USCYBERCOM plans, coordinates, integrates, synchronizes
and conducts activities to: direct the operations and defense
of specified Department of Defense information networks and;
prepare to, and when directed, conduct full spectrum military
cyberspace operations in order to enable actions in all domains,
ensure US/Allied freedom of action in cyberspace and deny
the same to our adversaries.")
= 7521ea74913335fc0fb3a47dfa0ca32636ff59bceabadee0dcfbf25ad85a03eb
SHA-384--> (384bits/48bytes)
[code]
SHA-384("USCYBERCOM plans, coordinates, integrates, synchronizes
and conducts activities to: direct the operations and defense
of specified Department of Defense information networks and;
prepare to, and when directed, conduct full spectrum military
cyberspace operations in order to enable actions in all domains,
ensure US/Allied freedom of action in cyberspace and deny
the same to our adversaries.")
= 1cdb694138c5548c2e967fadeae96acb5343fbc7963318be7
c14045c828b2ee7602d4599dce0ebe77beee0e7de1f0e91
SHA-512--> (512bits/64bytes)
[code]
SHA-512("USCYBERCOM plans, coordinates, integrates, synchronizes
and conducts activities to: direct the operations and defense
of specified Department of Defense information networks and;
prepare to, and when directed, conduct full spectrum military
cyberspace operations in order to enable actions in all domains,
ensure US/Allied freedom of action in cyberspace and deny
the same to our adversaries.")
= e038a25f13427fce20e6ac5b0a24c84db01d105f589bef0013
6b8581bf021ea8826f98b8f8d8db63551c2837edab2b491fb4
1f71d844042636e84252476fc8a9
>
> On 07/09/2010 07:11:28 PM X509 wrote:
The inner golden ring of the U.S. Cyber Command emblem includes some kind of secret code which has drawn a huge public attention. It reads 9ec4c12949a4f31474f299058ce2b22a. What the heck is it?
It is simply an MD5 hash of the U.S. militarys new Cyber Command mission statement which is:
USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.
MD5 --> (128bits/16bytes)
MD5("USCYBERCOM plans, coordinates, integrates, synchronizes
and conducts activities to: direct the operations and defense
of specified Department of Defense information networks and;
prepare to, and when directed, conduct full spectrum military
cyberspace operations in order to enable actions in all domains,
ensure US/Allied freedom of action in cyberspace and deny
the same to our adversaries.")
= 9ec4c12949a4f31474f299058ce2b22a
References:
|
|
|
|