Link to Wired’s Challenge:
Here’s their mission:
This looks as if it might be right up the SDMB’s alley!
Link to Wired’s Challenge:
Here’s their mission:
This looks as if it might be right up the SDMB’s alley!
I moved yesterday’s thread on this to the Game Room, so I’ll move this one thither as well. I’ll leave it to the mods there to merge or whatever.
twickster, MPSIMS moderator
it’s the md5 hash of their mission statement
The article mentions that they tried it and it wasn’t a match.
Go here: Crack the Code In US Cyber Command's Logo - Slashdot
Search for message:
#32838952
In short, this is the command and output to reproduce it:
echo -n "USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries." | md5sum
9ec4c12949a4f31474f299058ce2b22a -
Okay - how the hell does that work? There doesn’t appear to be nearly enough information to expand that code out into their mission statement. Can someone translate the translation into moronspeak?
A hash is not an encoded message, more like a way of verifying a message. The idea is that you can easily create a shorter hash from a long message, but it’s nearly impossible to create a different but plausible message that gives the same hash.
So for instance if someone wants to distribute a big file but can only send small messages through a secure channel, they can post the file to peer-to-peer services or whatever, and then give out the hash through a secure channel. Anyone can the file from an untrusted source, and compare the hash of that file to the correct hash from the secure channel. If they’re the same, the file is untampered with.
Another use is password files on servers – when someone logs in the server takes the password, creates the hash and compares it to the file. But if someone steals the file, they still don’t know the passwords.