home *** CD-ROM | disk | FTP | other *** search
- -----------------------------Encrypt V1.00-----------------------------
- ---------------------------by Dave Schreiber---------------------------
-
- Encrypt V1.00 is Copyright (c)1990 by Dave Schreiber. All Rights Reserved.
- Encrypt must by freely distributed, except for costs associated with
- shipping, copying, media, labels, taxes, and other necessary costs.
-
- Files in this release:
- Encrypt (the binary program)
- Encrypt.c (the source code to Encrypt)
- Encrypt.doc (the documentation, this file)
- Please keep all three files of this release together, if you can.
-
- Encrypt secures your files against prying eyes. It will take any
- file (a program, IFF picture, text, whatever) and convert it into an
- unusable form using a password that you specify. When you want to
- access the file, it will convert the file back to its original form,
- assuming you give it the correct password.
-
- Encrypt is called using the form:
- 1> Encrypt [options] -p<Password> <infile> [<outfile>]
- where <infile> is the file you want to encrypt/decrypt, <outfile> is the
- filename of the encrypted/decrypted file, and <Password> is the password
- that you want to use. The options are:
-
- -e -- Encrypt the file
- -d -- Decrypt the file
- -r -- Process <infile> and replace <infile> with the processed file.
- This option will leave you without the original version of
- the file, so use it with care. Note that the original file
- is not deleted until the processed version has been created
- sucessfully, so you won't end up with a half-processed version
- and no original version (the original file is stored as
- <infile> with a .tmp after it until the encrypted version is
- completed). The -r flags works with both encryption and
- decryption.
-
- If a '?' is the only command line option, the options information is
- displayed.
-
- How secure is the encrypted file? Data encryption isn't really
- my field, so I don't know (I got the algorithm idea from a program for
- the Apple ][, published in Compute! magazine (1987?), that does the same
- thing as Encrypt). The algorithm is layed out in the source code
- (Encrypt.c, included with this release) if you want to take a look. You
- can encrypt a file more than once, in which case you'll have to decrypt
- it the same number of times. Decrypting an unencrypted file is another
- way of securing it; encrypting it will then give you the original file
- back.
-
- Enjoy.
-
- -Dave Schreiber
-
- davids@slugmail.ucsc.edu (preferred, but flakey. If it doesn't work, try
- davids@ucscb.ucsc.edu (school) or
- davids@cup.portal.com (summer, vacations, etc)).
-
-