Researcher cracks 'secret' code in U.S. Cyber Command logo

MD5 cryptographic hash translates into cyber defense command's mission statement

Panda Security researchers solved the mystery of the 32-character code in the inner gold ring of U.S. Cyber Command's logo.

A security researcher said on Thursday he was the first to crack the code embedded in the seal of the U.S. Cyber Command (Cybercom), the group responsible for protecting the country's military networks from attack.

Sean-Paul Correll, a threat researcher with antivirus vendor Panda Security, said that the characters visible in a gold ring on Cybercom's official seal represent the MD5 hash of the group's mission statement. MD5 is a 128-bit cryptographic hash most often used to verify file integrity.

A representative of Cybercom confirmed that Correll had it right. " Mr. Correll is correct...it's a MD5 hash," said Lt. Commander Steve Curry of the U.S. Navy, in an e-mail.

"It wasn't very difficult," said Correll, adding that it took him only two minutes to figure out that the characters -- 9ec4c12949a4f31474f299058ce2b22a -- were the hash value for Cybercom's mission statement.

Correll had a leg up on the solution, since Wired.com's "Danger Room" blog -- which first noticed the characters -- had published the 32-character code.

"I knew right away it was an MD5 hash, and I knew it wasn't anything to do with a specific file," " said Correll, adding that security professionals will often use an MD5 hash as reminders, or to verify that a file's contents after downloading match the original edition.

Correll said he figured out the mystery shortly after 10 a.m. PT Wednesday, within an hour of Wired.com publishing its story.

At least one other code-breaker came up with the same solution. Buried in the nearly 500 comments added to the Wired.com story was the solution, posted Wednesday at 12:46 p.m. PT by someone identified only as "jemelehill" .

In a follow-up story, Wired.com credited jemelehill with first decoding the message.

"Information security professionals are very challenge driven," said Correll, so tackling the problem was fun...while it lasted. "Absolutely, this was definitely fun," he said.

Correll is familiar with code-breaking problems, since Panda regularly sponsors secret code challenges. The next challenge is scheduled to go live at 3:00 a.m. ET Saturday, 12:00 a.m. PT.

The MD5 value is a hash of Cybercom's 58-word mission statement, Correll noted on his blog: "USCYBERCOM plans, coordinates, integrates, synchronizes, and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full-spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries."

Cybercom was created in June 2009 , when Defense Secretary Robert Gates approved the group. Two months ago, the Senate appointed Lt. Gen. Keith Alexander as the head Cybercom. Alexander is also the director of the National Security Agency (NSA).

U.S. Cyber Command is part of the U.S. Strategic Command, and is based in Fort Meade, Md. Several units of the U.S. military, including ones from the Army, Navy, Air Force and Marines, comprise Cybercom.

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is gkeizer@ix.netcom.com .

Read more about cybercrime and hacking in Computerworld's Cybercrime and Hacking Topic Center.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags governmentpanda securityGovernment use of ITCybercrime and HackingIT in GovernmentU.S. Navy

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gregg Keizer

Computerworld (US)
Show Comments

Father’s Day Gift Guide

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?