home *** CD-ROM | disk | FTP | other *** search
Text File | 1991-10-23 | 39.7 KB | 1,123 lines |
-
- (C) Copyright 1991 MaeDae Enterprises
-
-
-
-
-
-
-
-
- E N C R Y P T - I T F O R D O S
-
-
-
-
-
- Version 1.xx
-
- Reference Manual
-
-
-
-
- Encryption, decryption, and cryptanalysis program.
- Supporting the secure Data Encryption Standard (DES).
-
- Context sensitive help and on-line manual make it easy!
- Encrypt-It is user supported software (Shareware). If you use it
- past the initial 15 day evaluation period you are required to
- register it. No exceptions!
-
- Registered Users: Your serial number can be found on the back of
- your manual, the distribution disk, or on the registration card.
-
-
- Encrypt-It for DOS
-
- "Encryption/Decryption/Cryptanalysis -- Fast, Safe, and Easy to Use"
-
- is published by
-
- MaeDae Enterprises
- 5430 Murr Road
- Peyton, CO 80831 USA
- Published and printed in the United States of America.
-
- Copyright 1991 by MaeDae Enterprises as a licensed, unpublished,
- proprietary work. All international rights reserved.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 1
-
-
-
-
- (C) Copyright 1991 MaeDae Enterprises
-
- The printed Reference Manual and associated registered software
- may not be copied, resold, reproduced, disclosed, archived,
- transmitted, or transferred in any form, electronic or otherwise,
- without the expressed written permission of MaeDae Enterprises.
- You may freely distribute the Shareware version.
-
- REGISTERED USERS: (those who paid and receive a serial number)
- MaeDae Enterprises hereby grants a "book" license to the original
- individual (even if purchased by a company) user of this copy of
- Encrypt-It. You may use the program on your computer and make
- one backup for storage as long as there is no possibility of use
- or residence on more than one machine at any time. Just like two
- people cannot read the same book in different locations at the
- same time. Every registered copy of Encrypt-It has a unique
- embedded serial number for traceabililty. You may not sell or
- give copies of the registered program or printed documentation to
- anyone. No exceptions.
-
- Pricing, specifications, and conditions are subject to change
- without notice.
-
- Send all registrations and inquires for site (multiple CPU or
- network) licensing to MaeDae Enterprises at the address on the
- previous page.
-
- Disclaimer:
-
- MaeDae Enterprises makes NO claims AND offers NO warranties of
- any sort with Encrypt-It. MaeDae Enterprises assumes NO
- responsibility for any sort of damage resulting from the apparent
- or actual use of Encrypt-It(mental or physical). The program
- provided is not guaranteed as to merchantability or fitness for
- its ultimate use. The user accepts all responsibility for use
- and may not resell the program.
-
- IBM PC/XT/AT are registered trademarks of the International
- Business Machines Corporation.
-
- Encrypt-It is a trademark of MaeDae Enterprises. Other
- trademarks belong to their respective owners.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 2
-
-
-
-
- (C) Copyright 1991 MaeDae Enterprises
-
- PREFACE
-
- ABOUT THIS MANUAL
-
- You will notice that this manual is concise. This is intentional
- as we have strived to make Encrypt-It the easiest program of its
- type to use. We have opted to provide an on-line manual and
- extensive context sensitive user help. Feel free to use this
- reference manual to install and get acquainted with the program.
-
- For many of you, this may be your first exposure to Shareware.
- To help eliminate possible confusion, we have included a short
- description of the Shareware marketing concept, explaining what
- it is and why it relies on you for its survival.
-
- What is Shareware? Shareware is not a kind of software. It is a
- revolutionary method of marketing Commercial software. Our
- software is Commercial software that we are allowing you to
- examine for 15 days before you make the purchase decision. With
- traditional marketing methods, you have to purchase Commercial
- software from a computer store or through mail order businesses,
- then try it out, and hope it does what you want. Shareware
- allows you to "try before you buy!"
-
- We rely upon you, the customer, to examine our software. If you
- find our software useful, please register. Your support is
- needed for us to continue to improve our products.
-
- Enough of this verbage. The real fun and learning begin when you
- use the program. So enjoy, live long, and prosper.
-
- With warmest regards,
-
- The gang at MaeDae Enterprises.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 3
-
-
-
-
- (C) Copyright 1991 MaeDae Enterprises
-
- Table of Contents
- =================
-
- Page Description
- ==== ============
-
- 5. What is the Data Encryption Standard (DES)?
-
- 5. What is Encrypt-It? An overview of its features.
-
- 6. Hardware Requirements
-
- 7. Installation - the "README.DOC" file.
-
- 7. Installation Notes
-
- 9. Getting Started
-
- 10. Tutorial
-
- 11. Additional Features
-
- 14. Troubleshooting
-
- 15. Basic Definitions
-
- 16. Encrypted Ramblings
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 4
-
-
-
-
- (C) Copyright 1991 MaeDae Enterprises
-
- WHAT IS THE DATA ENCRYPTION STANDARD (DES)?
- ===========================================
-
- Most encryption schemes are kept secret. One exception is the
- Data Encryption Standard (DES) which was issued by the U.S.
- National Bureau of Standards. Even the National Security Agency
- (NSA) was intimately involved in the development and acceptance
- testing of the algorithm.
-
- Now we know where DES came from, but how does it work? DES
- performs its encryption by working on a block of 64 bits of your
- data using a 64 bit key (we generate the 64 bit key from yours).
- Basically DES is a substitution cipher. We know this sounds very
- technical but don't worry, we have hidden all the complexity of
- DES behind an extremely easy to use interface. Our context
- sensitive help and extensive on-line manual makes protecting your
- data a simple task.
-
- Why did we choose to implement DES? We chose DES because it is a
- standard. Its ability to protect your data is well documented.
- Our goal is to provide you the best possible software tool for
- the protection of your data. We use multiple layers of
- encryption with DES as the final layer of protection for your
- data. Because of this approach, we feel your data is protected
- far better than using DES by itself.
-
-
- WHAT IS Encrypt-It?
- ===================
-
- Encrypt-It is a powerful encryption/decryption package that
- allows you to:
-
- 1. Encrypt any file using Data Encryption Standard encryption,
-
- 2. Decrypt the file using a confidental key,
-
- 3. Perform encryption and decryption on entire groups of files in
- a batch mode,
-
- 4. Obtain file statistics (frequency/distribution, mode, mean,
- median, and more) to determine how well the file is encrypted
- (also to look at other encrypted files),
-
- 5. And do it all without cryptic commands!
-
- 6. Other features:
-
- -- Keyboard macros - 100+ macros each with 1000 keystrokes.
- -- DOS Shell - Call up a DOS shell at any prompt.
- -- Screen Blanker - Also protects your key by erasing it!
-
- Encrypt-It comes configured to work with most display adapters
- and monitors. You can easily customize it to suit your needs.
-
-
-
-
-
- Page 5
-
-
-
-
- (C) Copyright 1991 MaeDae Enterprises
-
- HARDWARE REQUIREMENTS
- =====================
-
- 1. IBM PC/XT/AT, IBM PS/2, or fully compatible computer.
-
- 2. 512K RAM and DOS 3.0 or later.
-
- 3. Any monitor. Encrypt-It has been written to accommodate
- monochrome, color, enhanced graphics, and video graphics array
- adapters. Some "autoswitch" adapters may need to be in "manual".
-
- 4. At least one 5.25" floppy disk drive. Two floppy disk drives
- or one floppy and a hard disk (300K free space minimum for the
- full system) are strongly recommended.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 6
-
-
-
-
- (C) Copyright 1991 MaeDae Enterprises
-
- INSTALLATION - README.DOC
- =========================
-
- For all installation information see the README.DOC on the main
- distribution diskette. You can view the information on-line or
- print it out on your printer. README.DOC is constantly updated to
- contain the latest information.
-
- P.S. The Shareware version of Encrypt-It is compelete. However,
- it is a 15 day trial version. Also, additional product
- information screens are added.
-
- Feel free to share ONLY the Shareware version with friends and
- potential users of Encrypt-It for 15 day trial/evaluation purposes
- only. You may not use the Shareware version on other machines in
- order to avoid purchasing additional copies of the full program.
- You may not give away any copies or make more than one copy of
- the fully operational program for other than archival purposes.
- The full version of Encrypt-It has a unique serial number
- embedded in each copy for traceability.
-
-
- IMPORTANT INSTALLATION NOTES:
-
- 1. Diskette #1 contains many files in addition to EID.EXE.
- Because Encrypt-It is a large program, the additional files
- EID_HM.TXT and EID_HM.INX are required for context sensitive help
- and on-line manual. So please make sure that these files are in
- your default directory when running the program.
-
- If you have only one floppy drive, you can build a work diskette
- containing: EID.EXE, EID_HM.TXT, and EID_HM.INX. Do not copy
- EID.CNF, if it exists. A new EID.CNF will be saved when you
- select options and retain them.
-
- 2. If your Encrypt-It does not run properly:
-
- A. Delete the EID.CNF file and try to run again. Check out
- our troubleshooting section near the end of this manual.
-
- B. Your machine may not be totally IBM PC operating system
- compatible. This is not always disastrous and a quick call to
- our phone support staff may solve your problem.
-
- C. You may have a slightly incompatible "EGA" card with auto
- switch features. Usually, turning off autoswitch and forcing the
- system into the EGA mode solves the problem.
-
- D. If you have any memory resident programs or system drivers,
- try running without them loaded in your computer. On some
- computers, ANSI.SYS is suspect.
-
- 3. If your monitor appears to be losing certain characters or
- features, you may have a "color" system with a composite
- monochrome (green, amber, LCD, etc.) monitor. Adjust the
-
-
-
-
- Page 7
-
-
-
-
- (C) Copyright 1991 MaeDae Enterprises
-
- contrast and brightness of the monitor until the screen is
- readable. In some cases, you may have to go to the Install Menu
- to choose acceptable "colors". See the "Troubleshooting" section.
-
- 4. This Manual is designed to give you a general overview and
- familiarity with the program. More complete, up-to-date
- information is available to you through the context sensitive
- help (F1) and the on-line manual. When using the more advanced
- features of the program, the help screens will guide you through
- the toughest questions with ease. As Encrypt-It continues to add
- more features, you can be sure that the on-line manual and
- context sensitive help will give you the guidance needed. This
- way everybody wins. We don't spend money continually revising
- manuals and charging you higher prices, and you get what you want
- and deserve: accurate up-to-date information. So fire up the
- computer, dig in, and welcome to Encrypt-It!
-
- 5. Note to advanced users: To be able to run Encrypt-It from any
- point on your hard disk, create a batch file called EID.BAT and
- store it in your path.
-
- It should contain --> C:\EID\EID.EXE /C=C:\EID\EID.CNF
-
- This will enable you to run Encrypt-It from anywhere on your hard
- disk with full context sensitive help and on-line manual. Be
- sure to install the help/manual path within Encrypt-It to be
- C:\EID.
-
- Encrypt-It supports optional configuration files through the use
- of the /C= command line switch. You saw an example of this in
- the above section. Create as many unique configuration files as
- you would like using unique names. At startup time you can
- specify any of the configuration files through the use of an
- optional /C=MyConfig.CNF type command.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 8
-
-
-
-
- (C) Copyright 1991 MaeDae Enterprises
-
- GETTING STARTED
- ===============
-
- After you type EID <<cr>> (Enter or Return), the opening screen
- of Encrypt-It will appear. At the bottom of your Encrypt-It
- opening screen you are instructed to press any key to continue.
- The MAIN MENU will appear on your screen.
-
- The Main Menu options with descriptions are below.
-
- *On-Line Manual: This is an on-line manual covering features of
- Encrypt-It in more depth than the documentation available in this
- manual.
-
- *Encrypt: Encode or hide the information within a file to make
- it unreadable to anyone who doesn't have a special access code
- called a key. Just like you can't unlock a lock without a key,
- you can't look at an encrypted file without the key. You limit
- the number of people who know the key, thereby limiting the
- number of people who can access the intelligence within the file
- even if they have access to the file. A key is simply a
- combination of letters and numbers. They may or may not have any
- conventional meaning. For example, the letters xyz12345 could be
- a key.
-
- Please note that we provide two methods of encryption and
- decryption. The methods are our lighter proprietary method and
- the Data Encryption Standard (DES) encryption method. The DES
- provides the more powerful method, but is much slower. Choose
- the appropriate method for the level of protection you require.
- Encrypt-It can't retrieve the key you used to encrypt the file.
- If you forget the key for the decryption process you can also
- forget your file. This is the nature of data protection. We
- have no way of helping you recover any lost data due to a lost
- key! So be careful!
-
- *Decrypt: Decryption is the opposite of encryption. You use a
- key with the encrypted file to reverse the encryption process
- giving you the file you started with.
-
- *Analysis/Statistics: Here you can "look" at any file to see how
- the characters are distributed within the file. Statistics are
- provided to allow you to get a feel for the "goodness" of the
- encryption process.
-
- *Install: The installation portion of Encrypt-It allows you to
- customize the colors, directory defaults, and other options.
-
- Quit and exit to DOS: All good things must come to an end.
- Choose this option if you want to leave Encrypt-It and return to
- DOS.
-
- You may choose any of the displayed options by pressing the first
- letter or by moving the light bar (the giant cursor) with your
- cursor keys or space bar to the desired option and pressing
-
-
-
-
- Page 9
-
-
-
-
- (C) Copyright 1991 MaeDae Enterprises
-
- Return. Please note that once you have a pulldown active, the
- first letter selects options within the pulldown NOT the top
- Encrypt-It main menu line.
-
- (If you have a "color" system with a composite monochrome monitor
- and don't see a light bar or other features, try adjusting the
- brightness or contrast of your monitor. You may also need to
- install special colors for your system. See the Install Menu.)
-
- Now let's do something simple to demonstrate how Encrypt-It
- works.
-
- Press E (Encrypt)
-
- Then press enter with the "pick from a menu" option highlighted.
- You will be asked for the directory mask and path for your files.
- Your screen should clear and you will be given a list of files to
- encrypt. Press enter with the first file highlighted. Press
- enter again on the next menu to accept the default name for the
- encrypted file. Don't forget to pick a unique key for encrypting
- the file.
-
- You have just encrypted your first file.
-
- *** Warning *** Encrypt-It remembers the last key you used!
- You don't have to retype it in if you want to use the same key
- for the next operation. This makes it easier for you but it can
- lead to a problem if you walk away from your computer with
- Encrypt-It still running. Another user could potentially find
- out the last key you used by checking the encrypt or decrypt
- screens. We recommend that you NEVER encrypt or decrypt a file
- and then leave the area with Encrypt-It running.
-
-
- TUTORIAL (ENCRYPTING/DECRYPTING A FILE)
- =======================================
-
- Now let's encrypt a file while using various options. Don't
- worry about being fancy or being intimidated; this first use is
- only for practice. We can get fancy later.
-
- From the Main Menu, highlight the encrypt section and press
-
- E
-
- (Encrypt) a file.
-
- The encrypt pulldown will appear on the menu with the SelectMenu
- option highlighted. Steps are:
-
- 1. Press enter. You will now be prompted for where the file is
- located which is to be encrypted and the mask for the directory.
- You are being asked for the subdirectory name for its storage
- location.
-
-
-
-
-
- Page 10
-
-
-
-
- (C) Copyright 1991 MaeDae Enterprises
-
- 2. Press enter to accept the default directory. A directory of
- files will appear with the first filename highlighted.
-
- 3. Press enter to use this file. You will then see a window
- listing multiple options for paths, key, and output file. Since
- this is the first file we've encrypted, the key won't contain
- anything. The cursor should be on the line prompting you for a
-
-
- key. So choose an easy to remember key and type it in. Accept
- all the defaults by pressing enter. Note: Pressing enter on the
- destination filename is the signal that you are done editing the
- options.
-
- 4. A file will now be written in encrypted form using the
- default key and the default filename show. The file to be
- encrypted is broken into small blocks which can be easily be read
- into your computer's memory then encrypted. You will see the
- block number increase as each block is processed. The screen
- will display an "Operation Successful" message and return to the
- main menu after it finishes.
-
- From the Main Menu, highlight the decrypt section and press
-
- D
-
- (Decrypt) a file.
-
- To decrypt a file you reverse the process for encrypting a file.
- You first select the file you just encrypted using the same steps
- as for encryption. Use the same key as when you encrypted the
- file. The output file name will be extracted from the header of
- the encrypted file. It's that simple.
-
-
- ADDITIONAL FEATURES
- ===================
-
- MULTIPLE FILE OPERATIONS
-
- Use the tag option to tag multiple files for encryption or
- decryption in a batch mode. When you use the directory screen
- you have the option of tagging multiple files. If multiple
- files are tagged, Encrypt-It will prompt you for some information
- and then work with the entire group of files at one time.
-
- AUTO FILENAME GENERATION
-
- Encrypt-It will automatically generate a unique destination name
- when you encrypt a file. You have the option to override this
- feature for single file operations. We suggest a tilde (~) as
- the first character of an encrypted file's extension. We
- automatically generate an extension of a ~ followed by two
- characters. Your directory is checked for files and we generate
- 00-99 and AA-ZZ until we find a unique unused filename. Most of
-
-
-
-
- Page 11
-
-
-
-
- (C) Copyright 1991 MaeDae Enterprises
-
- the time the extension will be a .~00 for the first encrypted
- file, a .~01 for the second, etc. This technique is what allows
- us to encrypt entire groups of files in a batch mode without your
- manual inputs. Using this method we can generate about 776
- unique filenames by working with the file extension and leaving
- the main portion of the filename unchanged.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 12
-
-
-
-
- (C) Copyright 1991 MaeDae Enterprises
-
- DOS SHELL
-
- Encrypt-It provides a quick interface to DOS for you. At any
- prompt press Ctrl+X (control X). A second copy of the DOS
- command processor will be loaded to allow you to use standard DOS
- commands. Type EXIT and press enter when you want to return.
- Warning: Do NOT load any memory resident programs while in the
- DOS shell!
-
- KEYBOARD MACROS
-
- Keyboard macros are supported to allow you to easily emulate you
- at the keyboard. They allow you to attach command strings to
- over 100 keys. These execute exactly as if you were at the
- keyboard typing the commands. We support Shift+F1-F10 directly
- as a single keystroke. We also have two keystroke macros where
- the first key is Ctrl+O then you press a second key. For the two
- keystroke macros first press Ctrl+O then 0-9, Alt0-9, A-Z, AltA-Z,
- AltF1-F10, or CtrlF1-F10. When you play back the macros, the
- Shift+F1 through Shift+F10 keys execute directly, all others are
- two keystroke combinations where you first use Control+O as the
- first key. The shifted F10 is the autostart macro and will
- execute automatically when you bring up Encrypt-It. To modify the
- keyboard macros use the Alt+= key combination (hold down Alt and
- tap =) to call up the macro menu. We provide extensive context
- sensitive help in the program to make this easy.
-
- The default keyboard macro file's name is EID.MAC. If you would
- like to specify a different name use the /M=MyMacro.MAC command
- line argument at startup time. Example:
-
- EID /M=C:\EID\MyMacros.MAC (The path is optional)
-
- SCREEN BLANKER
-
- Encrypt-It will automatically blank your screen after a few
- minutes of inactivity. This will prevent your screen from having
- a pattern burned into its phosphor if you leave Encrypt-It running
- for extended periods of time in an unattended mode. A special
- feature of the screen blanker is to zero out the stored key. If
- you leave your computer unattended long enough for this screen to
- come up, the key that you last used has a chance of being
- compromised. This automatic key erase feature of Encrypt-It will
- help protect your data by automatically erasing your key from
- memory.
-
- COLOR CONTROL
-
- For users with color monitors, the color option in the Install
- menu gives you total color control of text, background, borders,
- highlighted areas, etc. Just press C from the install menu.
-
-
-
-
-
-
-
-
- Page 13
-
-
-
-
- (C) Copyright 1991 MaeDae Enterprises
-
- TROUBLESHOOTING
- ===============
-
- Displays - If, after loading Encrypt-It, you see text and no
- borders, or nothing at all, you may have a compatibility problem.
- Encrypt-It uses high speed screen updates which may cause a problem
- with some not-too-close IBM PC operating system compatibles. For
- example, the Tandy 2000 and Sanyo 555 series computers are not
- compatible with Encrypt-It.
-
- IBM type monochrome (MDA), color (CGA), EGA (enhanced graphic),
- and VGA (video graphics array) adapters are known to work with
- Encrypt-It. If you are using a compatible color video card with a
- green or amber screen, or LCD monitor, you may need to adjust
- your brightness and contrast, or Install other "colors" from the
- color installation screen. Sometimes executing the DOS "MODE
- BW80" command works.
-
- Some "autoswitch" Enhanced Graphic Adapters and "Hercules" type
- mono-graphics cards may need to have their auto modes disabled
- for proper operation.
-
- If Encrypt-It will not run, you may have insufficient memory, or
- too many memory resident programs. Try running Encrypt-It with
- no memory resident programs.
-
- If Encrypt-It just stops running or "freezes", you may have
- removed the program diskette from the disk drive. The program
- disk must be available to access the context sensitive help and
- on-line manual. Of course, if EID.EXE and its support files are
- on your hard drive, this will probably not be a problem.
-
- Occasionally, certain memory resident, TSR, or "pop-up" programs
- conflict with Encrypt-It. In general, there is no problem, but
- there are many new programs being written without regard to the
- system requirements of Encrypt-It. Remove them from memory, and
- try again. If that fails, try getting rid of device drivers in
- your CONFIG.SYS file. ANSI.SYS is a prime suspect for some
- not-so-compatibles.
-
- MISCELLANEOUS
-
- Encrypt-It works closely with your computer's hardware to gain
- much of its speed. However, it never directly addresses the
- hardware without using standard DOS calls. If you have any
- memory resident software that modifies the way DOS works, then
- Encrypt-It Pro may not function properly. We strongly recommend
- you remove all memory resident software before running Encrypt-It!
-
-
-
-
-
-
-
-
-
-
-
- Page 14
-
-
-
-
- (C) Copyright 1991 MaeDae Enterprises
-
- BASIC DEFINITIONS:
- ==================
-
- The terms used in Encrypt-It may be a little confusing. These
- terms are not made up, they are frequently used when discussing
- cryptography. We have tried to pick a handful of the most
- important terms and define them for you. They are:
-
- Data Encryption Standard (DES) - The Data Encryption Standard was
- issued by the U.S. National Bureau of Standards. The National
- Security Agency (NSA) was intimately involved in the development
- and acceptance testing of the algorithm. DES performs its
- encryption by working on a block of 64 bits of your data using a
- 64 bit key (we generate the 64 bit key from yours). Basically
- DES is a substitution cipher.
-
- Cryptography -- The general study of hiding the meaning of
- messages and the general techniques used for the hiding.
-
- Cryptanalysis -- The solving or breaking of codes without any
- knowledge of the key.
-
- Cipher -- Any technique, method, or scheme (substitution,
- transposition, and XOR) used to encrypt and decrypt text,
- without regard to its linguist structure.
-
- Plaintext -- The unencrypted or totally decrypted readable text.
-
- Ciphertext -- The unintelligible text, after encrypting it.
-
- Encrypting -- The process of encoding/encrypting a plaintext file
- to hide the intelligence.
-
- Decrypting -- Decoding an encrypted/ciphertext file.
-
- Key -- The text that was used to encrypt or decrypt a file.
- Sometimes called a code word. Keys can be simple everyday words
- or very complex combinations of characters that have no meaning.
- Some electronic information services pick your password by
- combining two regular words with a character between them.
- Examples keys: abc1234, Never:Again, and alsdkfqiaef.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 15
-
-
-
-
- (C) Copyright 1991 MaeDae Enterprises
-
- ENCRYPTED RAMBLINGS - SOME GOOD INFORMATION
- ===========================================
-
- As networks proliferate the need for data security increases.
- The world in the past has largely depended on physical security,
- that is safes and locks. Computers, much to the bureaucrats
- consternation, are rapidly eroding the possibility of physical
- security (wherever a modem is connected to a phone line). Laws
- will be passed, but in the final result, honesty depends on good
- locks and all the ministrations of legislators and bureaucrats
- will come have little positive effect on security. Human nature
- will win out. The easier it is to get, the more likely it is to
- be stolen. Encryption provides part of the answer to the need
- for increased security. It will be especially useful in systems
- that are open to all users but have some confidential data.
- Instead of complex levels of users verification through
- passwords, everyone can get the file but only the people with the
- key can decode the information. Encryption at its present state
- is cumbersome and time consuming but, faster computers and better
- programs can ease this problem. This is where Encrypt-It comes
- to the rescue.
-
- Encryption if nothing else is a fascinating exercise. Encrypt-It
- implements a version of Vernham's machine developed at Bell
- labs in the 20's as part of its lite encryption methods. The
- original machine used Baudot code on the Teletype and performed
- an exclusive or (XOR) on each character of the message and the
- key to produce the encrypted character. The message was decoded
- by the same machine in the same manner. The method is considered
- unbreakable if two conditions are met. First the key is longer
- than the message and second the key is only used once, sometimes
- called a "one time pad." Typically the files you will be
- encrypting are much longer than the key (also much longer than
- the one we build from your key) thereby weakening the encryption.
-
- Distribution and maintenance of keys is unworkable in the day to
- day operation of any communications operation of any size.
- Encrypt-It builds a much more complex key in its lite encryption
- from your simple key, in an effort to provide a method to ease
- this problem. It creates a one time pad based on your unique
- key. Most random keys are not truly random since all random
- functions are repeatable and their true randomness is somewhat
- suspect. What is the solution? Always the specter of a bigger
- and faster computers loom in the future to provide even faster
- encryption. Thinkers build on the best thoughts of those
- preceding them. More powerful computers and better encryption
- techniques will eventually provide a good solution to this
- problem.
-
- Encrypt-It provides encryption methods that range from the fairly
- secure to the very secure. When you choose DES we use the lite
- encryption methods as the first layer followed by the secure DES.
- This further complicates the process of breaking the code.
-
- The best encryption in the world won't protect your data if you
-
-
-
-
- Page 16
-
-
-
-
- (C) Copyright 1991 MaeDae Enterprises
-
- give away the key. The secure encrypting of the data is our job.
- The choice of a good key and its protection is your job.
-
- How do you select a good key? Several things should be
- considered. The key should not have a lot of repeating
- characters, if they have any pattern to the eye they should not
- be used. The keys should be kept secure.
-
- Encrypt-It supports keys up to 40 characters in length. We
- recommend you use as long a key as practical. Phrases or short
- sentences should work well as the key and still be easy to
- remember.
-
- NOTE: If there is any question of the randomness of the
- encrypted file, Encrypt-It could be used on it multiple times
- using different keys. The true randomness of the key should not
- matter since the use of more than one key should make unraveling
- very difficult, if not impossible. This process could be
- repeated until the paranoia of the person generating the keys was
- satisfied.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 17
-
-
-
-