home *** CD-ROM | disk | FTP | other *** search
-
-
-
-
-
-
-
-
-
-
-
-
- _______________________________________________________________
- | |
- Crypto--The Quick File Encrypter | |
- Version 3.02 | |
- _______________________________________________________________ | |
- | |
- Jim Leonard | |
- 1065 Spruce | |
- Winnetka, Illinois | |
- 60093 | |
- _______________________________________________________________ | |
- | |
- Copyright February 28, 1989, All Rights Reserved | |
- _______________________________________________________________ | |
-
-
-
-
- THIS IS NOT FREE SOFTWARE and may not be sold without the
- author's express written permission. If you have paid a
- ShareWare vendor for this program, none of the money you
- paid gets back to the author. If you use this program, YOU
- MUST REGISTER. Jim Leonard will not answer questions,
- technical or otherwise, from unregistered users.
-
- To register, send $5.00 (non-commercial single-user regis-
- tration fee) or $50.00 (commercial and multisystem site fee)
- with your name, company name (if applicable), phone number,
- and address to:
-
- _______________________________________________________________
- | |
- Jim Leonard | |
- 1065 Spruce Street | |
- Winnetka, Illinois 60093 | |
- _______________________________________________________________ | |
-
- Upon receipt of your registration, you will be sent the most
- current version of CRYPTO and its accompanying documenta-
- tion. (Please specify disk type.)
-
- Please read the more detailed registration information at
- the end of this manual.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- _______________________________________________________________
- | |
- Table of Contents | |
- _______________________________________________________________ | |
- Short Registration Notice............................... 1
-
- Quick Start............................................. 3
- Syntax............................................. 3
-
- Method of Operation--Questions and Answers.............. 4
- Encryption......................................... 4
- Switching Encryption and Decryption................ 5
- Requirements....................................... 5
-
- Things to Remember...................................... 6
- Mistakes........................................... 6
- Non-Standard Monitors.............................. 6
- *.COM or *.EXE files............................... 6
-
- Techniques.............................................. 7
- Choosing a Password................................ 7
- Batch file usage................................... 7
- Exit Codes.................................... 7
-
- Registration............................................ 8
- Single-User........................................ 8
- Multi-User......................................... 8
- BBS SysOps......................................... 8
- Distributors....................................... 8
-
- Warranty................................................ 9
-
- Warning and Revision Numbers............................ 10
-
- Credits and Background.................................. 11
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Crypto Documentation--Printed on February 28, 1989 at 10:42 PM--Page 2
-
-
-
-
-
-
-
- _______________________________________________________________
- | |
- Quick Start | |
- _______________________________________________________________ | |
- Crypto is a file encrypter/decrypter. It works on any file
- of any size.
-
- The syntax for Crypto is:
-
- CRYPTO [path]filename[.ext] Password
-
- where:
-
- [path]filename[.ext] is the filename with optional path
- and extension. Examples:
-
- mybook
-
- b:tacos.dat
-
- c:\word\jim\stuff\secret.txt
-
- Password is the password or password-sentence that you
- wish to use as the key to the file.
-
- Crypto uses a toggle method: Run it once with the above
- parameters to encrypt; run it with the same above parameters
- to decrypt.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Crypto Documentation--Printed on February 28, 1989 at 10:42 PM--Page 3
-
-
-
-
-
-
-
- _______________________________________________________________
- | |
- Method of Operation--Questions and Answers | |
- _______________________________________________________________ | |
-
- Quickly, What exactly does Crypto do?
-
- Crypto is a file encrypter. It encrypts and de-
- crypts any kind of file, any size--without changing the
- size of the file. It's also fast.
-
- What's Encryption?
-
- Encryption is a process that takes any kind of
- data--numbers, letters, or words--and scrambles the
- data so no one can read it. Decryption is the same
- process, but the other way around: it de-garbles the
- data, so it is again readable. An example of this is
- the way spies send messages to each other; the messages
- are unreadable without a decoder.
-
- So Crypto turns files into a secret code?
-
- Yes. It reads any file you specify and encrypts
- it, so that no one can run your program, read your
- secret files, and so on.
-
- But can't someone figure out what I've done and run Crypto
- to change it back?
-
- No; when you run Crypto, it won't even start en-
- coding or decoding your file unless you enter a pass-
- word or password-sentence for that particular file.
- That "key" is the vital element in its coding process.
- Every key works differently with every file.
-
- Can anyone quess the key from looking at the file?
-
- No. Crypto wouldn't be effective if that was the
- case.
-
- What if I forget my key?
-
- DON'T FORGET YOUR KEY! Without the key, the file
- can never be decrypted. The coding process is so good
- that no one can decode a file without the EXACT
- password.
-
-
-
-
-
-
-
-
-
-
-
- Crypto Documentation--Printed on February 28, 1989 at 10:42 PM--Page 4
-
-
-
-
-
-
-
-
- How do I tell Crypto to encode or decode?
-
- You don't. The translation process is the same
- both ways: The encryption process with a key password
- comes first, then the decryption process is next with
- the same key password. So if you try to load a file
- into a word processor and you get an error, or you run
- a program and it doesn't do anything, chances are that
- those files/programs are encrypted and need to be put
- through Crypto again (with the same password that was
- used to encrypt them in the first place). Another
- example is to think of Crypto like a toggle switch: you
- switch it one way to turn it on, the other way to turn
- it off; but the process of moving your finger to hit
- the switch is the same.
-
- How much memory do I need?
-
- At least 128k available to DOS.
-
- What kind of computer do I need?
-
- An IBM or compatible. Crypto works with
- everything, and works well with memory-resident
- programs as well.
-
- Do I need a color/graphics card to see the program run?
-
- Crypto has been written for use on a monochrome or
- Hercules(tm) board, but has only been tested on a CPT
- white-monochrome page-length monitor, so read your dis-
- play with caution. Color displays, however, look beau-
- tiful.
-
- What is the size limit on the file I can encrypt?
-
- If you have the memory specified above, then there
- is no size limit. So if you have the disk space to
- hold a 32 megabyte file, then Crypto can still handle
- it.
-
- How fast is Crypto?
-
- Quite fast. During operation, Crypto will pop up
- a window with what file is being processed, the total
- file size, and how much is being worked on during its
- operation. To show you how speedy Crypto is, it will
- display the time it took when it's finished.
-
-
-
-
-
-
-
-
-
- Crypto Documentation--Printed on February 28, 1989 at 10:42 PM--Page 5
-
-
-
-
-
-
-
- _______________________________________________________________
- | |
- Things to Remember | |
- _______________________________________________________________ | |
-
- 1. NEVER FORGET THE PASSWORD YOU USED TO ENCRYPT THE FILE.
- If you try to decrypt a file with the wrong password by
- mistake, don't worry--just "encrypt" it with the
- mistyped password, and then "decrypt" it with the real
- one again.
-
- For example:
- Crypto Myfile Jimbo (Encrypted)
- Crypto Myfile Jimbop (Typing error; Mistakenly
- encrypted again)
- Crypto Myfile Jimbop (Decrypted mistake)
- Crypto Myfile Jimbo (Correctly decrypted file)
-
- So, if you feel threatened, keep a backup of the file
- you are working with in a very hidden, secret place
- (preferably, a floppy disk locked in a safe).
-
- 2. IF YOU RUN CRYPTO ON A NON-STANDARD MONITOR, AND CAN'T
- QUITE SEE ANYTHING, CHANCES ARE IT'S WORKING PERFECTLY.
- Display type has nothing to do with Crypto's method of
- operation, and it will work just fine. If you wish to
- see the result of the program's operation, check the
- exit code at the end of its operation (See "batch file
- techniques" below).
-
- 3. IF YOU ENCODE A *.COM OR *.EXE FILE, PLEASE DON'T RUN
- THAT PROGRAM INTENTIONALLY UNTIL YOU DECODE IT.
- There's a very good chance it will freeze your
- computer.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Crypto Documentation--Printed on February 28, 1989 at 10:42 PM--Page 6
-
-
-
-
-
-
-
- _______________________________________________________________
- | |
- Techniques | |
- _______________________________________________________________ | |
-
- "The success of encryption relies more on the disci-
- plined use of passwords than on the complexity of the algo-
- rithm."
- --Lewis Perdue
-
- --It's understandable that you will want a password
- you'll remember; but too many people choose passwords that
- are easy to guess. Remember these important points about
- choosing a password:
-
- Try to avoid:
-
- Names
- Common phrases
- Slang
- Inside jokes
- Birthdays
- Aniversaries
- License numbers
- Vital statistics
-
- --People tend to use passwords that are too short--six
- characters should be the MINIMUM.
-
- --Passwords should be changed frequently.
-
- --Try using Crypto in a batch file, like when you want
- to work on a book that you don't want anyone peeking at.
- You'd first decrypt the file, work with it, and then encrypt
- it again. A similar batch file might look like:
-
- echo off
- cls
- echo Decrypting data...
- CRYPTO C:\jim\document\myfile.txt This is my password
- echo Done. Loading word processor...
- Word c:\jim\document\myfile.txt
- echo Encrypting data...
- CRYPTO C:\jim\document\myfile.txt This is my password
- echo Done! Have a nice DOS!
- echo on
-
- --Experienced batch file users: Crypto exits with the
- standard DOS exit code (ERRORLEVEL) for a program. If you
- want to check for Crypto's exit code, here's what the codes
- mean:
- 0 = Normal termination
- 1 = Required parameters on the command line not found
- 2 = Work file not found or doesn't exist
-
-
-
-
- Crypto Documentation--Printed on February 28, 1989 at 10:42 PM--Page 7
-
-
-
-
-
-
-
- _______________________________________________________________
- | |
- Registration | |
- _______________________________________________________________ | |
-
- No version of Crypto, including version 3.02, is public
- domain or free software. Crypto is a work copyright (C)
- 1989 by Jim Leonard. Non-registered users are granted a
- limited license to use Crypto on a trial basis for the pur-
- pose of determining whether Crypto is suitable for their
- needs (described below). Any other use of Crypto requires
- registration. Use of non-registered copies of Crypto by any
- person, business, corporation, governmental agency or other
- institution is strictly forbidden.
-
- --Non-commercial Single-User Registration ($5.00)
- permits a user a license to use Crypto on a single
- computer. A single registered user may use the program
- on a different computer, but may not use the program on
- more than one computer at the same time.
-
- --Commercial and Multisystem Site Registration ($50.00)
- permits an unlimited number of people within a comapny
- to use and make copies of Crypto, provided the
- organization has paid the multisystem fee and the
- person(s) can prove their affiliation with the
- organization.
-
- --No user may modify Crypto in any way, including but
- not limited to reverse compilation, disassembling or
- otherwise reverse-engineering the program.
-
- --All users are granted a limited license to copy
- Crypto only for the trial use of others subject to the
- above limitations, and the following conditions:
-
- A. Crypto must be copied in unmodified form, and the
- full manual must be included with the program.
-
- B. No fee, charge, or other compensation may be col-
- lected for distribution by any licensee.
-
- C. Crypto may not be distributed in conjunction with
- any other product without prior written permis-
- sion.
-
- --Operators of electronic bulletin board systems
- (SysOps) are encouraged to post Crypto for downloading
- by their users as long as the above conditions are met.
-
- --Distributors of user- supported software are also
- encouraged to distribute copies of Crypto only if they
- agree to the above conditions and if the fee for
- expenses and handling does not exceed $10.
-
-
-
-
- Crypto Documentation--Printed on February 28, 1989 at 10:42 PM--Page 8
-
-
-
-
-
-
-
- _______________________________________________________________
- | |
- Warranty | |
- _______________________________________________________________ | |
-
- Jim Leonard makes no warranty of any kind, express or
- implied, including, without limitation, any warranties of
- merchantability and/or fitness for a particular purpose.
- Jim Leonard shall not be liable for any damages or financial
- losses, whether direct, indirect, special or consequential
- arising from a failure of this program to operate in the
- manner desired by the user. Jim Leonard shall not be liable
- for any damage to data or property which may be caused
- directly or indirectly by use of the program.
-
- _______________________________________________________________
- | |
- IN NO EVENT WILL JIM LEONARD BE LIABLE TO YOU FOR ANY | |
- DAMAGES, INCLUDING ANY LOST PROFITS, LOST SAVINGS, LOST DATA | |
- OR OTHER INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF | |
- YOUR USE OR INABILITY TO USE THE PROGRAM, OR FOR ANY CLAIM | |
- BY ANY OTHER PARTY. | |
- _______________________________________________________________ | |
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Crypto Documentation--Printed on February 28, 1989 at 10:42 PM--Page 9
-
-
-
-
-
-
-
- _______________________________________________________________
- | |
- Warning and Revision Numbers | |
- _______________________________________________________________ | |
-
- IF YOU HAVE TWO VERSIONS OF CRYPTO, USE THE LATEST ONE.
-
- The methods for encryption are different in all versions of
- Crypto, so use the latest one and delete the older one.
-
-
- Revision Numbers:
-
- 1.0 Initial release.
-
-
-
- 2.0 Faster algorithm for encryption.
-
- 2.1 Added pop-up windows and documentation.
-
-
-
- 3.0 More secure and faster algorithm for encryption.
-
- 3.01 Fixed bug in windows and inproved documentation.
-
- 3.02 Fixed bug that cut memory requirements down by
-
- half, turned off cursor, and improved
-
- documentation. Current release.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Crypto Documentation--Printed on February 28, 1989 at 10:42 PM--Page 10
-
-
-
-
-
-
-
- _______________________________________________________________
- | |
- Credits/Background | |
- _______________________________________________________________ | |
- Jim Leonard is a high school student, classical radio
- DJ with WNTH, first tenor with the New Trier Concert Choir,
- a computer consultant with Direct Solutions, and is an
- advisor to Vertical Software. He wrote and developed Crypto
- as a security measure for a client. Jim recently decided
- not to pursue his consulting business for a while to
- concentrate on his studies and prepare for college. He is
- planning to major in Computer Science and
- Marketing/Advertising.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Crypto Documentation--Printed on February 28, 1989 at 10:42 PM--Page 11
-
-
-