home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-03-01 | 119.0 KB | 2,990 lines |
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- THE PRIVATE LINE:(TM)
-
- A User's Guide to a MS-DOS
-
- Data Encryption Standard
-
- Implementation
-
- Version 7.02
-
-
-
-
-
- by
-
- Surry P. Everett
-
-
-
-
-
-
- Sep 30, 1989
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- _________________________________________________________________
- EVERETT Enterprises, 7839 Vervain Court, Springfield, VA 22152
-
-
-
-
-
-
- Copyright (c) 1985, 1986, 1987, 1988, 1989 by Everett Enterprises.
-
-
- All rights reserved worldwide. No part of this publication may be
- reproduced, transmitted, transcribed, stored in a retrival system,
- or translated into any language or computer language, in any form
- or by any means, electronic, mechanical, magnetic, optical,
- chemical, manual or otherwise, without the prior written permission
- of Everett Enterprises, 7839 Vervain Court, Springfield, VA 22152.
-
-
- Non-registered users are granted a limited license to use this product on a
- trial basis for evaluation purposes, and to copy the program for trial use by
- others subject to the following limitations:
-
-
- The program is distributed in unmodified form, complete with
- documentation.
-
- No fee, charge or other consideration is required or accepted.
-
- The program is not distributed in conjunction with any other product.
-
-
-
-
-
-
- Single CPU License
-
-
- Registration of The Private Line(TM) licenses you to use the product on
- one CPU.
-
-
- DISCLAIMER
-
- Everett Enterprises makes no representations or warranties with respect
- to the contents hereof and specifically disclaims any implied warranties
- of merchantability or fitness for any particular purpose. Further,
- Everett Enterprises reserves the right to revise this publication and to
- make changes from time to time in the content hereof without obligation
- of Everett Enterprises to notify any person of such revision or changes.
-
- TRADEMARKS
-
- CP/M is a registered trademark of Digital Research.
- CompuServe is a trademark of CompuServe Inc.
- EasyLink is a service mark of Western Union Telegraph Company.
- MS-DOS is a registered trademark of Microsoft Corp.
- PROCOMM is a trademark of PIL Software Systems.
- QMODEM is a trademark of the Forbin Project.
- WORDSTAR is a registered trademark of MicroPro Intl Corp.
- The Private Line is a trademark of Everett Enterprises.
-
-
-
-
-
-
- REGISTRATION
-
-
- The Private Line(TM) is distributed as User-Supported Software. We encourage
- you to try the program and share it with anyone as long as:
-
- The program is distributed complete and unchanged, accompanied by the
- documentation.
-
- No fee, charge or other compensation is requested or received except by
- Everett Enterprises.
-
- The Private LineTM is not distributed in conjunction with any other
- product.
-
-
- If you use our program for anything other than evaluation purposes, you are
- required to register such use. A printed User's Guide will be mailed upon
- registration. You may register by sending a check or money order for $30.00
- to:
-
-
- Everett Enterprises
- 7839 Vervain Court
- Springfield, VA 22152
-
-
- Program disks are not included in the registration fee.
-
- If you or your company need an invoice in order to generate payment, one is
- included in this manual.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Privacy, like freedom, is not missed until it's not there.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- The Private Line(TM) is dedicated to
- Dorothy Everett
- who shares her friend with a machine or two.
-
-
-
-
-
-
-
- We have enclosed invoice and order forms to simplify processing your orders.
- Use the order form to place an order with us. Use the invoice within your
- organization to generate payment for The Private Line(TM) registrations.
-
- We are now providing the program on diskettes for your convenience. Please
- note that the $10 disk fee covers media costs, postage and handling only. It
- does not cover registration. If you are using the program for other than
- evaluation purposes, you are required to register.
-
- Business, commercial or governmental use of non-registered
- copies of The Private Line(TM) is strictly forbidden. Write
- for details of site or corporate licensing.
-
-
-
-
-
-
-
- Invoice Form
-
-
-
-
-
- Remit to: Everett Enterprises
- 7839 Vervain Court
- Springfield, VA 22152
- (703) 866-3914
-
-
-
-
- Sold to: Ship to:
- -------------------- --------------------
-
- -------------------- --------------------
-
- -------------------- --------------------
-
-
-
- ============================================================
- Date: PO #:
- ============================================================
- Quan Description Unit Extended
- ------------------------------------------------------------
- | | |
- | The Private Line Registration | $30.00 | $
- -----| | |
- | The Private Line Evaluation Disk | $10.00 | $
- -----| | |
- | The Private Line User's Guide, | $ 6.00 | $
- -----| printed version | |
- ------------------------------------------------------------
-
- Total: $
-
- Orders outside the U.S.: Add $15, send check drawn on U.S.
- bank in U.S. dollars, or international money order
- in U.S. dollars.
-
-
-
-
-
-
-
- Order Form
-
-
-
- Make check Everett Enterprises
- payable to: 7839 Vervain Court
- Springfield, VA 22152
-
- ============================================================
- Date: PO #:
- ============================================================
- Quan Description Unit Extended
- ------------------------------------------------------------
- | | |
- | The Private Line Registration | $30.00 | $
- -----| (Includes printed User's Guide, | |
- | but does not include disk) | |
- | | |
- | The Private Line Evaluation Disk | $10.00 | $
- -----| (current version, manual on | |
- | disk) | |
- | | |
- | The Private Line User's Guide, | $ 6.00 | $
- -----| printed version | |
- ------------------------------------------------------------
-
- Total: $
-
- Payment by: ( ) Check ( ) Money Order
-
- Name:
- ------------------------------------------------
- Address:
- ------------------------------------------------
- :
- ------------------------------------------------
-
- Orders outside the U.S.: Add $15, send check drawn on U.S.
- bank in U.S. dollars, or international money order
- in U.S. dollars.
-
-
- Orders may also be placed using CompuServe: 70320,107
-
-
-
-
-
-
- Information Request
-
-
- Mail to: Everett Enterprises
- 7839 Vervain Court
- Springfield, VA 22152
-
- Please send information regarding corporate and site licenses.
-
-
- Name:
- -------------------------------------------------
- Title:
- -------------------------------------------------
- Company:
- -------------------------------------------------
- Address:
- -------------------------------------------------
- :
- -------------------------------------------------
- City:
- -------------------------------------------------
- State:
- -------------------------------------------------
- Zip:
- -------------------------------------------------
- Day Phone:
- -------------------------------------------------
-
- Estimated copies needed:
- -----------------------------------
- Possible uses:
- ---------------------------------------------
-
- ---------------------------------------------
-
- ---------------------------------------------
-
- ---------------------------------------------
- Questions:
- -------------------------------------------------
-
- -------------------------------------------------
-
- -------------------------------------------------
-
- -------------------------------------------------
-
- -------------------------------------------------
-
-
-
-
-
-
- Table of Contents
-
-
- Section Page
-
- I. Introduction 1
-
- A. What is it? 1
-
- B. Who needs it? 1
-
- II. Operating The Private Line(TM) 2
-
- A. Receiving The Private Line(TM) 2
-
- 1. Making a back-up copy 2
- 2. Floppy disk system 2
- 3. Hard disk system 3
-
- B. Using The Private Line(TM) 3
-
- 1. Single file encryption 3
- 2. Single file decryption 9
- 3. Displaying files 9
- 4. Purging files 10
- 5. Displaying disk directories 13
- 6. Double file decryption/encryption 14
- 7. Converting files to ASCII format 15
- 8. Converting files to binary format 16
- 9. Printing files 17
- 10. Disk write verify toggle switch 17
- 11. Key entry echo toggle switch 19
- 12. Creating a sub-directory 19
- 13. Changing the current sub-directory 20
- 14. Removing a sub-directory 21
- 15. Erasing a file from a sub-directory 22
- 16. Verification of compliance with the
- Data Encryption Standard 23
- 17. Selecting Alphabetic or Hexadecimal keys 28
- 18. Changing Purging Status 29
- 19. Saving Switch Settings 30
- 20. Selecting Command Line exit action 31
- 21. Changing File Re-use Status 32
- 22. DES Modes of Operation 33
-
- Electronic Code book 33
- Cipher Block Chaining 34
- Cipher Feedback 35
- Output Feedback 36
-
-
-
-
-
-
-
- Table of Contents (continued)
-
-
- Section Page
-
-
- 23. Short Block Processing 36
- 24. Initialization Values 38
- 25. Speaker Switch Setting 38
- 26. Filename Display Status 39
-
- C. Command Line execution 40
-
- 1. Encryption 40
-
- Using alphabetic keys
- Using hexadecimal keys
-
- 2. Decryption 40
-
- Using alphabetic keys
- Using hexadecimal keys
-
- 3. Convert file to ASCII form 41
- 4. Convert file to Binary form 41
- 5. Command line exit action 41
-
- D. Other Aspects of the Private LineTM 41
-
- 1. Selection of keys 41
- 2. Protection of keys 41
- 3. Destruction of unencrypted data 42
-
- III. Requirements 43
-
- IV. References 44
-
- V. Problem Report 45
-
- VI. Changes and Updates 46
-
- VII. Index 49
-
-
-
-
-
-
- I. Introduction
-
- A. What is The Private Line(TM)?
-
- The Private Line(TM) is a software implementation of the Data Encryption
- Algorithm using the Data Encryption Standard (DES) published by the National
- Bureau of Standards, U.S. Department of Commerce (NBS). The Private Line(TM)
- will decrypt files and messages encrypted by either hardware or other software
- implementations of the DES which meet NBS specifications. Files of either text
- or object code may be easily encrypted or decrypted.
-
- The Private Line(TM) provides a secure means of transmitting and storing
- messages and MS-DOS files without the danger of having an uninvited person read
- them. It provides a remedy to that age-old fear of having some one, be it a too
- nosy neighbor on a party line, hackers breaking a computer bulletin board's
- safeguards, or your 'friendly' big brother, reading your private material.
-
- In order for a file which has been encrypted by The Private Line(TM) to be
- transmitted to another user, a communications package, such as XMODEM by Ward
- Christensen (which is in the public domain), KERMIT, PROCOMM or QMODEM and a
- modem may be needed. The Private Line(TM) works without them but it will not
- allow one to up or download files from CompuServe or the Source. By using the
- expansion option of The Private Line, one may send encrypted messages on
- EasyLink, telegraph networks and other standard telecommunications networks and
- bulletin boards such as CompuServe and the Source in ASCII form.
-
- B. Who needs The Private Line(TM)?
-
- Anyone who transmits MS-DOS files of messages, data, or executable programs
- that are subject to be read, viewed, copied or otherwise accessed by people
- other than the intended recipient.
-
- Users who communicate by bulletin board or other electronic systems such
- as Telex or EasyLink may wish to use The Private Line. Writers who submit
- articles over networks such as CompuServe or the Source should consider using
- The Private Line. Anyone who has sensitive data laying around on a diskette
- should encrypt it in order to prevent unauthorized access. People who develop
- software in teams and communicate by leaving messages on networks should use
- The Private Line. People such as doctors and lawyers who keep personal
- financial or other sensitive records on diskettes, or on line, either on hard
- disks, bulletin boards, or otherwise, should use The Private Line.
-
- In short anyone should use The Private Line who has something that the user
- does not want to share, be it a message, a program, or just personal data.
-
-
-
-
-
-
- II. Operating The Private Line(TM)
-
-
- A. Receiving The Private Line.
-
- 1. Making a back-up copy. It will arrive on a diskette readable by your
- computer system. Before using The Private Line you should, for your own
- protection, make a back-up work copy of the distribution diskette and store the
- original in a safe place. Remember that the User's License allows you to make
- as many copies as you need for backup purposes only (if you registered your use
- of The Private Line) or to give away for evaluation purposes. Use a file copy
- program, such as MS-DOS's COPY, to make the copy and verify that it is
- accurately copied. A MS-DOS command such as COPY A: B: will copy all files on
- The Private Line original diskette. Remember that The Private Line does not
- have a copy of the MS-DOS operating system on it and that the backup diskette
- must be formatted before it can be used to store a copy of The Private Line.
- If you need additional help, refer to your MS-DOS system documentation on FORMAT
- and COPY or refer to one of the MS-DOS references listed in Section V of this
- manual. In short, take the following steps to make a back-up copy:
-
- a. Format a blank diskette and copy MS-DOS to it using FORMAT.
-
- b. Put the new diskette containing MS-DOS on Drive A: and put The
- Private Line original diskette on Drive B:.
-
- c. Execute the command COPY B:*.* A:. All files on The Private line
- will be copied to your backup copy. The following files are on The Private Line
- diskette:
-
- (1) PRIVATE.EXE - The heart of The Private Line. This is the
- executable program which one uses.
-
- (2) MSG.DAT - additional information and a sample message in clear
- text and
-
- (3) MSG.ENC - sample message in encrypted form.
-
- (4) Read.me - any last minute information from Everett Enterprises.
-
- d. Execute the command COMP A: B:. All files on The Private line
- original diskette will be compared to your backup copy.
-
- e. Put The Private Line original diskette in a secure, safe place.
-
- 2. Floppy disk system. Begin using The Private Line by inserting the
- diskette containing the work copy of The Private Line into a disk drive and by
- typing 'X:PRIVATE' after the MS-DOS prompt and pressing RETURN. 'X' is the
- letter designator of the disk drive in which you inserted the diskette. The
-
-
-
-
-
-
- Private Line will begin execution just like any other executable MS-DOS file.
- The Private Line will provide easy, clear and user-friendly instructions as it
- is used.
-
- 3. Hard disk system.
-
- a. Create a subdirectory called 'C:\tpl' using the MS-DOS command,
- MKDIR.
-
- b. Insert the working copy of The Private Line into drive A and type:
- copy a:*.* C:\tpl. Press RETURN and all files contained on the diskette will
- be copied to the correct sub-directory.
-
- c. Edit or create the autoexec.bat file contained on the root directory
- on the boot drive so that it will include a path command which requires the
- operating system to check the sub-directory, 'C:\tpl'. The path line in the
- autoexec.bat file will look similar to: 'path C:\tpl'. If there are multiple
- entries in the path command, each entry is separated with a semi-colon.
-
- d. After editing the autoexec.bat file, reboot the system by pressing
- the CNTL, ALT, and DEL keys at the same time.
-
- e. Begin using The Private Line by typing 'PRIVATE' after the MS-DOS
- prompt and pressing RETURN. The Private Line will begin execution just like
- any other executable MS-DOS file. The Private Line will provide easy, clear
- and user-friendly instructions as it is used.
-
- B. Using The Private Line.
-
- 1. Single file encryption:
-
- a. Insert the diskette containing the work copy of The Private Line
- into a disk drive. If the disk drive is not the currently logged disk drive,
- type the letter designator (A-P) of the disk drive being used, followed by a
- colon. Press RETURN.
-
- b. Type 'PRIVATE' after the MS-DOS prompt and press RETURN. (Note:
- some keyboards use ENTER or CARRIAGE RETURN, rather than RETURN). The Private
- Line will begin execution by displaying a copyright notice which will quickly
- be replaced by the master menu for The Private Line (see Figure 1).
-
- c. Press the letter 'A' (either upper or lower case) to encrypt a file.
-
-
-
-
-
-
- ____________________________________________________________________________
- THE PRIVATE LINE
-
- MASTER MENU
-
-
- A. Single File Encryption G. Convert File to ASCII
- B. Single File Decryption H. Convert File to Binary
- C. Return to MS-DOS I. Double File Encryption
- D. Display File in Hex Format J. Double File Decryption
- E. Purge File from Disk K. Print Disk File
- F. Display Disk Directory L. Additional Options
-
- Enter the letter of your choice:
- ____________________________________________________________________________
- Current Switch Selections
- DES Mode: Electronic Code book Short Block: No Padding
- Key type: Alphabetic Disk verify after write: On
- Automatic Purging (after encryption): No Purge Prompt (after encryption): Yes
- (after decryption): NO (after decryption): Yes
- Times purged file overwritten: 1 Command Line: Exit Speaker: Off
- Re-use existing files: Prompt Filename Display: On Key Entry Echo: On
- ____________________________________________________________________________
- (C) Everett Enterprises, 7839 Vervain Court, Springfield, VA 22152
-
-
- ____________________________________________________________________________
- Figure 1.
-
-
- d. The Private Line will ask for the name of the file to be encrypted
- (see Figure 2). If filename display is enabled (see paragraph 26), The Private
- Line will display the filenames of files contained in the current directory.
- The top filename in the display will be high-lighted. You may select it by
- pressing RETURN or you may move the high-light bar by using the cursor keys.
- Or you may enter the file name in the MS-DOS format, filename.filetype, if the
- file to be encrypted is on the currently logged disk drive and in the current
- directory. The currently logged disk drive is the drive which appears with the
- MS-DOS prompt symbol, such as A> or B>. Otherwise, use the form
- X:\pathname\filename.filetype where 'X' is a disk drive (A-P) that exists on
- your system; \pathname is a valid pathname; filename is a 1-8 character
- filename; filetype is a 3 character file type, such as ASM, BAS, COM, DAT, HEX,
- PAS, or PRN. Either lower or upper case characters may be used, but all
- characters are changed to upper case. If the file to be encrypted is not on the
- same disk as The Private Line, insert that diskette into another disk drive
- before entering the name of the file. If the disk drive does not exist or the
- file can not be found, The Private Line will tell you to press the RETURN key
- and will then ask you to enter the file name. If at any time you wish to cancel
-
-
-
-
-
-
- the current operation and to return to either the master menu or the additional
- options menu, simply press the CONTROL key and the letter 'R' at the same time
- (CNTL-R) whenever The Private Line is waiting for input from the terminal.
- _______________________________________________________________
- THE PRIVATE LINE
-
- WHAT IS THE NAME OF THE FILE TO BE ENCRYPTED?
- (DISK:FILENAME.FILETYPE)
- _______________________________________________________________
- Figure 2.
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- WHAT IS THE NAME OF THE FILE TO BE ENCRYPTED?
- (DISK:\PATHNAME\FILENAME.FILETYPE)
-
- FILE NOT FOUND
- (PRESS RETURN TO RE-ENTER)
-
- _______________________________________________________________
- Figure 3.
-
-
- e. After entering the file name, The Private Line will open a file to
- contain the encrypted data. The file will be placed on the chosen disk. The
- file name of the encrypted file will be the same as that of the file to be
- encrypted. The file type, however, will be 'ENC'. For example, if the file to
- be encrypted is 'A:SECRET.DAT', then the file to hold the encrypted data will
- be X:SECRET.ENC' where 'X' is the disk drive you selected. If the user did not
- enter a disk drive, the currently logged disk drive is used. If the file can
- not be found, a message (see Figure 3) is displayed, and the user is instructed
- to press the RETURN key.
-
- (1) The Private Line will attempt to open the new file if there
- is room on the chosen disk. If there is not enough room to open the file or if
- there is another error, a message will be displayed. Press RETURN to return to
- the master menu.
-
- (2) The Private Line will also check to see if the file to contain
- the encrypted data already exists on the selected disk. If it does and the user
- has not changed the settings of the file re-use switch (default=prompt), the
- user will be asked if it should be overwritten (see Figure 4). The user should
- press either 'Y' for yes or 'N' for no. If yes, The Private Line continues.
- If no, The Private Line asks if the user wants to return to the master menu or
- if the user wants to enter a new file name to contain the encrypted data (see
-
-
-
-
-
-
- Figure 5). The user should press either 'A' or 'B'. If 'A' is pressed, The
- Private Line returns to the master menu. If 'B' is selected, the user
- _______________________________________________________________
- THE PRIVATE LINE
-
-
- WHAT IS THE NAME OF THE FILE TO BE ENCRYPTED?
- (DISK:\PATHNAME\FILENAME.FILETYPE)
-
- ENTER THE LETTER DESIGNATOR (A-P) OF THE DISK ON WHICH THE
- ENCRYPTED FILE IS TO BE PLACED:
-
- FILE ALREADY EXISTS. DO YOU WANT TO OVERWRITE IT (Y/N)?
- _______________________________________________________________
- Figure 4.
-
-
- is asked for the name of the file to contain the encrypted data (see Figure 6).
- Any valid MS-DOS \pathname\filename.filetype on any valid disk drive may be
- used. If the file re-use switch has been set to re-use, the file will
- automatically be overwritten.
-
- f. After the file to be encrypted and the file to hold the encrypted
- data have been selected and opened, The Private Line will ask for the key to be
- used (see Figure 7). The key will be echoed to the terminal as it is entered.
- If the user desires to disable the key entry echo feature, see para 11, 'Key
- Entry Echo Toggle Switch.'
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- OPTIONS
-
- A - RETURN TO THE MASTER MENU.
-
- B - ENTER A NEW NAME FOR THE NEW FILE.
-
-
- ENTER THE LETTER OF YOUR CHOICE:
-
- _______________________________________________________________
- Figure 5.
-
-
-
-
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
-
- WHAT IS THE NAME OF THE FILE TO BE CREATED?
- (DISK:\PATHNAME\FILENAME.FILETYPE)
-
- _______________________________________________________________
- Figure 6.
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
-
- Enter the alphabetic key to be used (1-8 characters):
- (FOR EXAMPLE: aBcdeFGh)
-
- _______________________________________________________________
- Figure 7.
-
-
- (1) The user should enter 1-8 characters in the format in Figure
- 7 and press RETURN. After entering 8 characters, the user will be allowed only
- to enter a character editing key such as left-arrow or back-space or to press
- RETURN. If less than 8 characters are entered when RETURN is pressed, the key
- is right-filled with blanks (hex value 20H). Please note that key characters
- are case specific, i.e., there is a difference between an upper and lower case
- letter.
-
- (2) After pressing RETURN, The Private Line will display the key
- which you entered (see Figure 8) and ask if it is correct. Press a 'Y' or 'N'
- for yes or no. If 'Y' is pressed, The Private Line continues. If 'N' is
- pressed, The Private Line again asks for the key to be used. Remember, CNTL-R
- will return the user to the master menu. If the key entry echo feature has been
- turned off, the verification step will be bypassed.
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- LISTED BELOW IS THE KEY YOU ENTERED:
-
- aBcdeFGh
-
- IS IT CORRECT (Y/N)?
-
- _______________________________________________________________
- Figure 8.
-
-
-
-
-
-
- g. After the key has been verified, The Private Line begins to read
- the input file, encode it and write the encrypted file to the output disk. As
- a reminder the names of the encrypted file and the file being encrypted are
- displayed. A counter is displayed and incremented as each 256 bytes of data is
- processed.
-
- h. After the file has been encrypted, the user may be asked if the
- plain text source file should be purged (overwritten with binary zeros and then
- removed from the directory). If the answer is no, the user is returned to the
- master menu. If the answer is 'yes', then after confirmation, the file is
- purged before the user is returned to the master menu (see Figures 9 and 10).
- When the file has been purged, the user will be notified and told to press
- RETURN to continue (see Figure 11). The user will then be returned to the
- master menu. The default setting for the automatic purge after encryption is
- NO. The default setting for the purge prompt is YES. If the automatic purge
- switch has been set to automatic, the source file will automatically be purged,
- regardless of the purge prompt switch setting.
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- ENCRYPTING: X:FILENAME.FILETYPE
-
- ENCRYPTED FILE IS: X:FILENAME.ENC
-
- USING: Electronic Code book
-
- DO YOU WANT TO PURGE THE ABOVE PLAIN TEXT SOURCE FILE (Y/N)?
-
- _______________________________________________________________
- Figure 9.
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- ENCRYPTING: X:FILENAME.FILETYPE
-
- ENCRYPTED FILE IS: X:FILENAME.ENC
-
- USING: Electronic Code book
-
- DO YO WANT TO PURGE THE ABOVE PLAIN TEXT SOURCE FILE (Y/N)?
-
- PHYSICALLY ERASING: X:FILENAME.FILETYPE
-
- _______________________________________________________________
- Figure 10.
-
-
-
-
-
-
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- ENCRYPTING: X:FILENAME.FILETYPE
-
- ENCRYPTED FILE IS: X:FILENAME.ENC
-
- USING: Electronic Code book
-
- CONFIRM PURGE OF X:FILENAME.FILETYPE (Y/N)?
-
- PHYSICALLY ERASING: X:FILENAME.FILETYPE
-
- FILE OVERWRITTEN WITH BINARY ZEROS AND THEN DELETED
-
- PRESS RETURN TO CONTINUE
- _______________________________________________________________
- Figure 11.
-
-
- 2. Decrypting files:
-
- Files may be decrypted using the same procedures as in encryption.
- However, press 'B' for decryption when the master menu is displayed, and then
- continue exactly as for encryption in accordance with the instructions contained
- in paragraph B1c through B1h. Remember, the same key which was used in the
- encryption process must be used for decryption.
-
- 3. Displaying files:
-
- Normally there is no need to display files which have been encrypted or
- are to be encrypted. Displaying COM files certainly does not reveal anything,
- but it can be done by using utilities such as DUMP and Cntl-P. Text files which
- are in the clear may be displayed using utilities such as TYPE or text editors
- such as WORDSTAR. However, for the few times that one may want to review a
- file, The Private Line provides the capability. It should be understood that
- an encrypted text file is not a text file.
-
- a. From the master menu of The Private Line, press 'D'. The Private
- Line will ask for the name of the file to be displayed (see Figure 12). It must
- be contained in the current or specified directory. The existence of the file
- will be checked. If an error is found, the user will be prompted (see Figure
- 13) for corrective action.
-
-
-
-
-
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- WHAT IS THE NAME OF THE FILE TO BE DISPLAYED?
- (DISK:\PATHNAME\FILENAME.FILETYPE)
-
- _______________________________________________________________
- Figure 12.
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- WHAT IS THE NAME OF THE FILE TO BE DISPLAYED?
- (DISK:\PATHNAME\FILENAME.FILETYPE)
-
- FILE NOT FOUND
- (PRESS RETURN TO RE-ENTER)
- _______________________________________________________________
- Figure 13.
-
-
- b. The Private Line will read the desired file and display a CRT screen
- of data and then pause. The user will be prompted to choose between viewing the
- next screen of data (see Figure 14) by pressing RETURN or returning to the
- master menu by pressing CNTL-R. Each byte will be printed in hex format (two
- hex digits). In addition, all displayable bytes (hex value 20H through 7EH)
- will be displayed. Nondisplayable bytes are represented by a period.
-
- c. After the end of the file has been reached, the user will be
- informed and asked to press the RETURN key (see Figure 15). This allows the
- user to view the last screen of data in the file.
-
- 4. Purging files:
-
- After a file has been encrypted or decrypted, it may be necessary, for
- security purposes, to purge the original file. When MS-DOS erases a file, only
- the name is removed from the disk directory, the data remains on the disk (see
- para 15, 'Erasing Files'). With patience and a little effort, some one could
- reconstruct the file thought to be erased. Therefore, a means is provided in
- which the file to be erased is overwritten with binary zeros before it is purged
- from the MS-DOS disk directory. It also should be noted that because of the
- manner in which backup files are created by text editors such as WORDSTAR and
- EDLIN, care should be exercised to avoid leaving backup files (file type: BAK)
- available for general access. Please note that the
-
-
-
-
-
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F ................
- 20 21 22 23 24 25 26 27 28 29 2A 2B 2C 2D 2E 2F !"#$%&'()*+,-./
- 30 31 32 33 34 35 36 37 38 39 3A 3B 3C 3D 3E 3F 0123456789:;<=>?
- 40 41 42 44 44 45 46 47 48 49 4A 4B 4C 4D 4E 4F @ABCDEFGHIJKLMNO
- 50 51 52 55 54 55 56 57 58 59 5A 5B 5C 5D 5E 5F PQRSTUVWXYZ[ ]^-
- 60 61 62 66 64 65 66 67 68 69 6A 6B 6C 6D 6E 6F 'abcdefghijklmno
- 70 71 72 77 74 75 76 77 78 79 7A 7B 7C 7D 7E 7F pqrstuvwxyz{|}~.
- 20 21 22 23 24 25 26 27 28 29 2A 2B 2C 2D 2E 2F !"#$%&'()*+,-./
- 30 31 32 33 34 35 36 37 38 39 3A 3B 3C 3D 3E 3F 0123456789:;<=>?
- 40 41 42 44 44 45 46 47 48 49 4A 4B 4C 4D 4E 4F @ABCDEFGHIJKLMNO
- 50 51 52 55 54 55 56 57 58 59 5A 5B 5C 5D 5E 5F PQRSTUVWXYZ[ ]^-
- 20 21 22 23 24 25 26 27 28 29 2A 2B 2C 2D 2E 2F !"#$%&'()*+,-./
- 30 31 32 33 34 35 36 37 38 39 3A 3B 3C 3D 3E 3F 0123456789:;<=>?
-
- PRESS RETURN FOR NEXT SCREEN, CNTL-R FOR MASTER MENU
- _______________________________________________________________
- Figure 14.
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F ................
- 01 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F ................
- 20 21 22 23 24 25 26 27 28 29 2A 2B 2C 2D 2E 2F !"#$%&'()*+,-./
- 50 51 52 55 54 55 56 57 58 59 5A 5B 5C 5D 5E 5F PQRSTUVWXYZ[ ]^-
-
- END OF FILE REACHED. PRESS RETURN TO CONTINUE.
- _______________________________________________________________
- Figure 15.
-
-
- default settings of the automatic purge and purge prompt switches are 'no' and
- 'prompt' respectively. This means that unless the user changes the default
- settings, the user will be prompted after a file is encrypted. In order to
- completely purge a file, follow these steps:
-
- a. From The Private Line master menu, press the letter 'E' (either
- upper or lower case) to purge a file.
-
- b. The Private Line will ask for the name of the file to be purged (see
- Figure 16). The file to be purged must be in the current or specified
- directory. If the file can not be found, The Private Line will tell you to
- press the RETURN key and will then ask you to enter the file name (see Figure
- 25). If at any time you wish to return to the master menu, simply press the
-
-
-
-
-
-
- CONTROL key and the letter 'R' (CNTL-R) at the same time whenever The Private
- Line is waiting for input from the terminal. The master menu will then
- re-appear.
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- WHAT IS THE NAME OF THE FILE TO BE PURGED?
- (DISK:\PATHNAME\FILENAME.FILETYPE)
-
- _______________________________________________________________
- Figure 16.
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- WHAT IS THE NAME OF THE FILE TO BE PURGED?
- (DISK:\PATHNAME\FILENAME.FILETYPE)
-
- FILE NOT FOUND
- (PRESS RETURN TO RE-ENTER)
-
- _______________________________________________________________
- Figure 17.
-
- c. If the file is found, the user will be asked to verify that the file
- is to be purged by pressing 'Y' or 'N' (see Figure 18). If 'Y' is pressed,
- purging begins and the data will be destroyed (see Figure 19). If 'N' is
- pressed, the user will be returned to the master menu. After the file has been
- purged, the user will be informed that the file has been overwritten with binary
- zeros and deleted. The user is then instructed to press RETURN to continue (see
- Figure 20). After pressing RETURN, the user is returned to the master menu.
- The file will be overwritten 1-9 times before the file name is removed from the
- directory. The default number is 1; it may be changed from the Additional
- Options Menu.
- _______________________________________________________________
- THE PRIVATE LINE
-
- Confirm PURGE of x:\pathname\filename.filetype (y/n)?
-
- _______________________________________________________________
- Figure 18.
-
-
-
-
-
-
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- Confirm PURGE of x:\pathname\filename.filetype (y/n)?
-
- PHYSICALLY ERASING X:\PATHNAME\FILENAME.FILETYPE
- _______________________________________________________________
- Figure 19.
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- Confirm PURGE of x:\pathname\filename.filetype (y/n)?
-
- PHYSICALLY ERASING X:\PATHNAME\FILENAME.FILETYPE
-
- FILE OVERWRITTEN WITH BINARY ZEROS AND DELETED
-
- PRESS RETURN TO CONTINUE
-
- _______________________________________________________________
- Figure 20.
-
-
- 5. Displaying disk directories:
-
- a. From The Private Line master menu, press the letter 'F' (either
- upper or lower case) to list a disk directory.
-
- b. The Private Line will ask for the pathname of the directory which
- is to be displayed (see Figure 21). Type any valid disk drive,pathname and use
- any valid wildcard characters. You may simply press RETURN for the default
- directory (*.*).
-
- c. The Private Line will then display the pathname which you entered.
- The filenames contained in that directory will be printed in alphabetical order
- in one to four columns. Directory entries will be marked with an asterisk. If
- there are more than fifty-six entries a message will be shown which will
- instruct the user to press RETURN for more listings. When there are no more
- listings, a message indicating the end of the listings will be shown and the
- user will be instructed to press RETURN to return to the master menu (see Figure
- 22).
-
-
-
-
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
-
- Enter the pathname of the desired directory:
- (disk:\pathname\filename.filetype, RETURN = *.*)
- _______________________________________________________________
- Figure 21.
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- Directory of - A:\ROOT\SUB1
-
- PROG1 ASM :
- PROG1 HEX :
- PROG1 PRN :
- SUB11 * :
- TEST DAT :
- TEST HEX :
-
- * DIRECTORY ENTRIES
-
- END OF DIRECTORY LISTINGS. PRESS RETURN TO RETURN TO MASTER MENU.
-
- _______________________________________________________________
- Figure 22.
-
-
- 6. Double file decryption and encryption:
-
- a. Single file encryption generally is secure enough for most users.
- However, some people feel that it is too vulnerable and suggest double
- encryption. Double encryption involves encrypting an encrypted file, preferably
- with a different key. Even the most doubtful critic of the Data Encryption
- Standard admits that a file doubly encrypted with two different keys, will be
- secure from brute force solution for at least five to ten years!
-
- b. Options 'I' and 'J' on the master menu will automatically double
- encrypt or decrypt a file. When either option is selected, the user will be
- prompted to enter a second key after providing the first key if hexadecimal keys
- are used. If alphabetic keys are used, only one key consisting of 1-16
- characters is entered. The default key type is alphabetic. Of course double
- encryption takes more time than single encryption, but it is less than twice as
- much. Remember, for decryption the same keys must be entered in the same order
- as for the encryption process. Thus, the 1st key for encryption also is the 1st
- key for decryption. Note: if single decryption is used twice to decrypt a
-
-
-
-
-
-
- double encrypted file, then the key entered second in the encryption process
- must be used first in the decryption process. Other than being prompted to
- enter a second key, double encryption and decryption proceed as in para 1,
- 'Encrypting files.' Remember that alphabetic keys of length 9 to 15 characters
- are right-filled with blanks (hex value 20H).
-
- 7. Converting files to ASCII format:
-
- a. An encrypted file contains binary data, i.e., values from 00H
- through 0FFH or 0 through 255 decimal. Thus, a communications program such as
- XMODEM normally is required to transfer an encrypted file. However, for the
- people who desire to send encrypted files over Western Union, E-Mail, or similar
- services, ASCII files are required. ASCII files do not contain control
- characters. Option 'G' will expand any file into an ASCII file with a normal
- file type of EXP. It will be about 37% larger than the original file. Carriage
- returns and line feeds are inserted after each 64 characters in the
- expanded file.
-
- b. The file to be expanded must be in the current or specified
- directory of the selected disk.
-
- c. Press the letter 'G' (either upper or lower case) to expand a file.
-
- d. The Private Line will ask for the name of the file to be expanded
- (see Figure 23).
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
-
- WHAT IS THE NAME OF THE FILE TO BE EXPANDED?
- (DISK:\PATHNAME\FILENAME.FILETYPE)
- _______________________________________________________________
- Figure 23.
-
- e. After entering the file name, The Private Line will open a file to
- contain the expanded data. The file will be placed on the chosen disk using
- its current or specified directory. The file name of the expanded file will be
- the same as that of the file to be expanded. The file type, however, will be
- 'EXP'. For example, if the file to be expanded is 'A:SECRET.DAT', then the file
- to hold the expanded data will be X:SECRET.EXP' where 'X' is the disk drive you
- selected. If the user did not enter a disk drive, the currently logged disk
- drive is used.
-
- (1) The Private Line will attempt to open the new file if there is room
- on the chosen disk. If there is not enough room to open the file or if there
- is another error, a message will be displayed. Press RETURN to return to the
-
-
-
-
-
-
- master menu.
-
- (2) The Private Line will also check to see if the file to contain the
- expanded data already exists on the selected diskette. If it does, the user
- will be asked if it should be overwritten (see Figure 24). The user should
- press either 'Y' for yes or 'N' for no. If yes, The Private Line continues.
- If no, The Private Line asks if the user wants to return to the master menu or
- if the user wants to enter a new file name to contain the expanded data (see
- Figure 5). The user should press either 'A' or 'B'. If 'A' is pressed, The
- Private Line returns to the master menu. If 'B' is selected, the user is asked
- for the name of the file to contain the expanded data. The file will be placed
- on the selected disk using its current or specified directory.
-
- _______________________________________________________________
- THE PRIVATE LINE
-
-
- WHAT IS THE NAME OF THE FILE TO BE EXPANDED?
- (DISK:\PATHNAME\FILENAME.FILETYPE)
-
- FILE ALREADY EXISTS. DO YOU WANT TO OVERWRITE IT (Y/N)?
- _______________________________________________________________
- Figure 24.
-
-
- f. After the file to be expanded and the file to hold the expanded data
- have been selected and opened, The Private Line will read the input file,
- expanded it, and write it to the expansion file. As a reminder, the names of
- the expanded file and the file being expanded are displayed. The user will be
- returned to the master menu upon completion of the expansion.
-
- 8. Converting files to binary format:
-
- a. Option 'H' will contract any file into a binary file with a normal
- file type of CON. Carriage returns and line feeds inserted by Option 'G' are
- discarded. It will not make sense to use Option 'H' on any file other than a
- file of type EXP. The same checks are made for overwriting existing files as
- in the expansion option.
-
- b. Files may be contracted using the same procedures as in the
- expansion process. However, press 'H" for converting a file into binary format
- when the master menu is displayed, and then continue as for expansion in
- accordance with the instructions in para 7, 'Converting files to ASCII format.'
-
-
-
-
-
-
-
-
- 9. Printing Files.
-
- a. Option 'K' will print a selected file on the MS-DOS PRN device.
- Remember, only ASCII files can be printed. Thus, encrypted files can not be
- printed. However, you could encrypt a file, use Option 'G' to convert it to an
- ASCII file, and then print the new file using Option 'K'. If a file with a file
- type of EXE, COM, CON, or ENC is selected for printing, a warning message will
- be displayed and the user will be allowed to continue or to return to the master
- menu. During print, an 'S' will stop/start the printing process. A CNTL-R will
- return the user to the master menu.
-
- b. The file to be printed must be in the current or specified directory
- prior to option 'K' being selected.
-
- 10. Disk Write Verify switch:
-
- a. If the disk write verify toggle switch is on, a verify is performed
- during write operations to the disk drive to insure that data was written
- correctly. Although more time is required with the verify switch on, a higher
- degree of confidence in the data written is obtained. The additional time
- required is very small. Therefore, it is recommended that the verify switch be
- left on. The default condition is ON.
-
- b. To change the disk write verify toggle switch, select 'L',
- ADDITIONAL OPTIONS, on the master menu. The additional options menu (see Figure
- 25), will appear. Press 'A' and the verify toggle switch will be displayed (see
- Figure 26).
-
- c. Press 'A' to turn the switch on. The switch will be turned on and
- the display updated to reflect the new condition. Press 'C' to return to the
- additional options menu.
-
-
-
-
-
-
-
- ____________________________________________________________________________
- THE PRIVATE LINE
-
- ADDITIONAL OPTIONS MENU
-
- A. Disk Write Verify Toggle Switch I. Change Purging Status
- B. Key Entry Echo Toggle Switch J. Save Switch Settings to Disk
- C. Create Sub-Directory K. Command LineExit Status
- D. Change Current Sub-Directory L. Change FileRe-use Status
- E. Remove Sub-Directory M. Set DES Mode of Operation
- F. Erase File N. Return to Master Menu
- G. Return to Master Menu O. Change Initialization Value
- H. Select Alphabetic / Hex Keys P. Turn Speaker Switch On/Off
- Q. Change Filename Display Status
- Enter the letter of your choice: R. Return to Master Menu
- ____________________________________________________________________________
- Current Switch Selections
- DES Mode: Electronic Code book Short Block: No Padding
- Key type: Alphabetic Disk verify after write: On
- Automatic Purging (after encryption): No Purge Prompt (after encryption): Yes
- (after decryption): NO (after decryption): Yes
- Times purged file overwritten: 1 Command Line: Exit Speaker: Off
- Re-use existing files: Prompt Filename Display: On Key Entry Echo: On
- ____________________________________________________________________________
- (C) Everett Enterprises, 7839 Vervain Court, Springfield, VA 22152
-
-
- ____________________________________________________________________________
- Figure 25.
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- DISK WRITE VERIFY TOGGLE SWITCH
-
- CURRENT STATUS: ON
-
- A. TURN VERIFY SWITCH ON
-
- B. TURN VERIFY SWITCH OFF
-
- C. RETURN TO OPTIONS MENU
-
- _______________________________________________________________
- Figure 26.
-
-
- d. Press 'B' to turn the switch off. The switch will be turned off
-
-
-
-
-
-
- and the display updated to reflect the new condition. Press 'C' to return to
- the additional options menu.
-
- 11. Key Entry Echo toggle switch:
-
- a. If the key entry toggle switch is on, the key is displayed as it is
- entered during the encryption and decryption process. If the switch is turned
- off, the cursor will move as each character is entered, but only the commas will
- be shown and the verify step will be skipped. The default condition is ON.
-
- b. To change the key entry echo toggle switch, select 'L', ADDITIONAL
- OPTIONS, on the master menu. The additional options menu (see Figure 41), will
- appear. Press 'B' and the key entry toggle switch will be displayed (see Figure
- 27).
-
- c. Press 'A' to turn the switch on. The switch will be turned on and
- the display updated to reflect the new condition. Press 'C' to return to the
- additional options menu.
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- KEY ENTRY ECHO TOGGLE SWITCH
-
- CURRENT STATUS: ON
-
- A. TURN VERIFY SWITCH ON
-
- B. TURN VERIFY SWITCH OFF
-
- C. RETURN TO OPTIONS MENU
-
- _______________________________________________________________
- Figure 27.
-
- 12. Creating a sub-directory:
-
- a. Creating a sub-directory is the same as the MKDIR function in
- MS-DOS.
-
- b. To create a sub-directory, choose option 'L' on the master menu in
- order to obtain the additional options menu.
-
- c. Press 'C' when the additional options menu appears. The user will
- be asked to enter the disk drive on which the new sub-directory is to be created
- (see Figure 28).
-
-
-
-
-
-
-
- d. Press any letter (A-P) lower or upper case, which represents a disk
- drive on your system. Again The Private Line will check to determine if the
- entered disk drive actually exists. If it does not exist, a message will be
- displayed. If it exists, but is not the default drive, a message will be
- displayed which instructs the user to insert the desired diskette and to press
- RETURN.
-
- e. The current directory pathname of the selected disk drive will be
- displayed and the user will be prompted to enter the name of the sub-directory
- to be created (see Figure 29). You have to enter the backslash followed by the
- name of the sub-directory to be created. Press RETURN.
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- ENTER THE LETTER DESIGNATOR (A-P) OF THE DISK DRIVE
- ON WHICH THE SUB-DIRECTORY SHOULD BE CREATED?
-
- _______________________________________________________________
- Figure 28.
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- CURRENT DIRECTORY:
- X:
-
- WHAT IS THE PATHNAME OF THE SUB-DIRECTORY TO BE CREATED?
-
- _______________________________________________________________
- Figure 29.
-
-
- f. The sub-directory will be created and the user returned to the
- additional options menu. If an error occurs, a message will be displayed and
- the user will be instructed to press RETURN to return to the additional options
- menu.
-
- 13. Changing the current sub-directory:
-
- a. Changing the current sub-directory is the same as the CHDIR function
- in MS-DOS.
-
- b. To change the current sub-directory, choose option 'L' on the master
- menu in order to obtain the additional options menu.
-
- c. Press 'D' when the additional options menu appears. The user will
- be asked to enter the disk drive on which the current sub-directory is to be
- changed (see Figure 30).
-
- d. Press any letter (A-P) lower or upper case, which represents a disk
- drive on your system.
-
-
-
-
-
-
-
- e. The current directory pathname of the selected disk drive will be
- displayed and the user will be prompted to enter the name of the new current
- sub-directory (see Figure 31). You have to enter the backslash followed by the
- name of the sub-directory to be changed. Press RETURN.
-
- f. The current sub-directory will be changed and the user returned to
- the additional options menu. If an error occurs, a message will be displayed
- and the user will be instructed to press RETURN to return to the additional
- options menu.
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- ENTER THE LETTER DESIGNATOR (A-P) OF THE DISK DRIVE
- OF WHICH THE SUB-DIRECTORY SHOULD BE CHANGED?
-
- _______________________________________________________________
- Figure 30.
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- CURRENT DIRECTORY:
- X:
-
- WHAT IS THE PATHNAME OF THE NEW SUB-DIRECTORY?
-
- _______________________________________________________________
- Figure 31.
-
-
- 14. Removing a sub-directory:
-
- a. Removing a sub-directory is the same as the RMDIR function in
- MS-DOS.
-
- b. To remove a sub-directory, choose option 'L' on the master menu in
- order to obtain the additional options menu.
-
- c. Press 'E' when the additional options menu appears. The user will
-
-
-
-
-
-
- be asked to enter the disk drive on which the sub-directory is to be removed
- (see Figure 32).
-
- d. Press any letter (A-P) lower or upper case, which represents a disk
- drive on your system.
-
- e. The current directory pathname of the selected disk drive will be
- displayed and the user will be prompted to enter the name of the sub-directory
- to be removed (see Figure 33). You have to enter the backslash followed by the
- name of the sub-directory to be removed. Press RETURN.
-
- f. The sub-directory will be removed and the user returned to the
- additional options menu. If an error occurs, a message will be displayed and
- the user will be instructed to press RETURN to return to the additional options
- menu.
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- ENTER THE LETTER DESIGNATOR (A-P) OF THE DISK DRIVE
- OF WHICH THE SUB-DIRECTORY SHOULD BE REMOVED?
-
- _______________________________________________________________
- Figure 32.
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- CURRENT DIRECTORY:
- X:
-
- WHAT IS THE PATHNAME OF THE SUB-DIRECTORY TO BE REMOVED?
-
- _______________________________________________________________
- Figure 33.
-
-
- 15. Erasing a file from a sub-directory:
-
- a. Erasing a file from a sub-directory is the same as using the 'del'
- command in MS-DOS.
-
- b. From The Private Line master menu, choose option 'L' in order to
- obtain the additional options menu.
-
- c. When the additional options menu appears, press 'F' (either upper
-
-
-
-
-
-
- or lower case) to erase a file from the directory.
-
- d. The Private Line will ask for the name of the file to be erased (see
- Figure 34). The file to be erased must be in the current or specified directory
- of the selected drive.
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- WHAT IS THE NAME OF THE FILE TO BE ERASED?
-
- _______________________________________________________________
- Figure 34.
-
-
- The Private Line will then attempt to find the desired file. If the file is
- found, the user will be asked to verify that the file is to be erased by
- pressing 'Y' or 'N' (see Figure 35). If 'Y' is pressed, the filename will be
- removed from the directory. If 'N' is pressed, the user will be returned to
- the additional options menu. After the filename has been erased, the user will
- be informed that the filename has been removed from the directory. The user is
- then instructed to press RETURN to continue. After pressing RETURN, the user
- is returned to the additional options menu.
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- Confirm Erasure of x:\pathname\filename.filetype (y/n)?
-
- _______________________________________________________________
- Figure 35.
-
-
- 16. Verification of Compliance with Data Encryption Standard.
-
- Another feature is provided for those who desire more proof that The
- Private Line actually works in compliance with the requirements of the Data
- Encryption Standard contained in NBS Special Publication 500-20. Listed below
- are the hexadecimal values of the test keys, plain text, and ciphers used by
- the National Bureau of Standards in order to determine if an encryption
- algorithm produces the correct output. You may check these by selecting Option
- G, Test DES Compliance, on the Additional Options Menu. As each of the 171
- tests are performed, The Private Line will display the test key, test plain
- text, expected cipher code and the generated cipher. The expected cipher will
- be compared to the cipher generated by The Private Line and the results of the
- comparison will be displayed for each test. These tests are also performed each
- time that The Private Line is started, as part of the initialization process,
-
-
-
-
-
-
- however, no indication is given unless one of the tests fail. If one of the
- tests fail, the only thing a user can do is to copy the source diskette of The
- Private Line in order to obtain a good copy. If that does not work, something
- has damaged or destroyed the data contained on the diskette. You will need to
- obtain another copy by downloading it or by requesting another disk from Everett
- Enterprises at a nominal handling/postage charge of $10.
-
-
- KEY PLAIN TEXT CIPHER TEXT
-
- IP and E tests
-
- 1. 01,01,01,01,01,01,01,01 95,F8,A5,E5,DD,31,D9,00 80,00,00,00,00,00,00,00
- 2. 01,01,01,01,01,01,01,01 DD,7F,12,1C,A5,01,56,19 40,00,00,00,00,00,00,00
- 3. 01,01,01,01,01,01,01,01 2E,86,53,10,4F,38,34,EA 20,00,00,00,00,00,00,00
- 4. 01,01,01,01,01,01,01,01 4B,D3,88,FF,6C,D8,1D,4F 10,00,00,00,00,00,00,00
- 5. 01,01,01,01,01,01,01,01 20,B9,E7,67,B2,FB,14,56 08,00,00,00,00,00,00,00
- 6. 01,01,01,01,01,01,01,01 55,57,93,80,D7,71,38,EF 04,00,00,00,00,00,00,00
- 7. 01,01,01,01,01,01,01,01 6C,C5,DE,FA,AF,04,51,2F 02,00,00,00,00,00,00,00
- 8. 01,01,01,01,01,01,01,01 0D,9F,27,9B,A5,D8,72,60 01,00,00,00,00,00,00,00
- 9. 01,01,01,01,01,01,01,01 D9,03,1B,02,71,BD,5A,0A 00,80,00,00,00,00,00,00
- 10. 01,01,01,01,01,01,01,01 42,42,50,B3,7C,3D,D9,51 00,40,00,00,00,00,00,00
- 11. 01,01,01,01,01,01,01,01 B8,06,1B,7E,CD,9A,21,E5 00,20,00,00,00,00,00,00
- 12. 01,01,01,01,01,01,01,01 F1,5D,0F,28,6B,65,BD,28 00,10,00,00,00,00,00,00
- 13. 01,01,01,01,01,01,01,01 AD,D0,CC,8D,6E,5D,EB,A1 00,08,00,00,00,00,00,00
- 14. 01,01,01,01,01,01,01,01 E6,D5,F8,27,52,AD,63,D1 00,04,00,00,00,00,00,00
- 15. 01,01,01,01,01,01,01,01 EC,BF,E3,BD,3F,59,1A,5E 00,02,00,00,00,00,00,00
- 16. 01,01,01,01,01,01,01,01 F3,56,83,43,79,D1,65,CD 00,01,00,00,00,00,00,00
- 17. 01,01,01,01,01,01,01,01 2B,9F,98,2F,20,03,7F,A9 00,00,80,00,00,00,00,00
- 18. 01,01,01,01,01,01,01,01 88,9D,E0,68,A1,6F,0B,E6 00,00,40,00,00,00,00,00
- 19. 01,01,01,01,01,01,01,01 E1,9E,27,5D,84,6A,12,98 00,00,20,00,00,00,00,00
- 20. 01,01,01,01,01,01,01,01 32,9A,8E,D5,23,D7,1A,EC 00,00,10,00,00,00,00,00
- 21. 01,01,01,01,01,01,01,01 E7,FC,E2,25,57,D2,3C,97 00,00,08,00,00,00,00,00
- 22. 01,01,01,01,01,01,01,01 12,A9,F5,81,7F,F2,D6,5D 00,00,04,00,00,00,00,00
- 23. 01,01,01,01,01,01,01,01 A4,84,C3,AD,38,DC,9C,19 00,00,02,00,00,00,00,00
- 24. 01,01,01,01,01,01,01,01 FB,E0,0A,8A,1E,F8,AD,72 00,00,01,00,00,00,00,00
- 25. 01,01,01,01,01,01,01,01 75,0D,07,94,07,52,13,63 00,00,00,80,00,00,00,00
- 26. 01,01,01,01,01,01,01,01 64,FE,ED,9C,72,4C,2F,AF 00,00,00,40,00,00,00,00
- 27. 01,01,01,01,01,01,01,01 F0,2B,26,3B,32,8E,2B,60 00,00,00,20,00,00,00,00
- 28. 01,01,01,01,01,01,01,01 9D,64,55,5A,9A,10,B8,52 00,00,00,10,00,00,00,00
- 29. 01,01,01,01,01,01,01,01 D1,06,FF,0B,ED,52,55,D7 00,00,00,08,00,00,00,00
- 30. 01,01,01,01,01,01,01,01 E1,65,2C,6B,13,8C,64,A5 00,00,00,04,00,00,00,00
- 31. 01,01,01,01,01,01,01,01 E4,28,58,11,86,EC,8F,46 00,00,00,02,00,00,00,00
- 32. 01,01,01,01,01,01,01,01 AE,B5,F5,ED,E2,2D,1A,36 00,00,00,01,00,00,00,00
- 33. 01,01,01,01,01,01,01,01 E9,43,D7,56,8A,EC,0C,5C 00,00,00,00,80,00,00,00
- 34. 01,01,01,01,01,01,01,01 DF,98,C8,27,6F,54,B0,4B 00,00,00,00,40,00,00,00
- 35. 01,01,01,01,01,01,01,01 B1,60,E4,68,0F,6C,69,6F 00,00,00,00,20,00,00,00
- 36. 01,01,01,01,01,01,01,01 FA,07,52,B0,7D,9C,4A,B8 00,00,00,00,10,00,00,00
-
-
-
-
-
-
- KEY PLAIN TEXT CIPHER TEXT
-
- IP and E tests (continued)
-
- 37. 01,01,01,01,01,01,01,01 CA,3A,2B,03,6D,BC,85,02 00,00,00,00,08,00,00,00
- 38. 01,01,01,01,01,01,01,01 5E,09,05,51,7B,B5,9B,CF 00,00,00,00,04,00,00,00
- 39. 01,01,01,01,01,01,01,01 81,4E,EB,3B,91,D9,07,26 00,00,00,00,02,00,00,00
- 40. 01,01,01,01,01,01,01,01 4D,49,DB,15,32,91,9C,9F 00,00,00,00,01,00,00,00
- 41. 01,01,01,01,01,01,01,01 25,EB,5F,C3,F8,CF,06,21 00,00,00,00,00,80,00,00
- 42. 01,01,01,01,01,01,01,01 AB,6A,20,C0,62,0D,1C,6F 00,00,00,00,00,40,00,00
- 43. 01,01,01,01,01,01,01,01 79,E9,0D,BC,98,F9,2C,CA 00,00,00,00,00,20,00,00
- 44. 01,01,01,01,01,01,01,01 86,6E,CE,DD,80,72,BB,0E 00,00,00,00,00,10,00,00
- 45. 01,01,01,01,01,01,01,01 8B,54,53,6F,2F,3E,64,A8 00,00,00,00,00,08,00,00
- 46. 01,01,01,01,01,01,01,01 EA,51,D3,97,55,95,B8,6B 00,00,00,00,00,04,00,00
- 47. 01,01,01,01,01,01,01,01 CA,FF,C6,AC,45,42,DE,31 00,00,00,00,00,02,00,00
- 48. 01,01,01,01,01,01,01,01 8D,D4,5A,2D,DF,90,79,6C 00,00,00,00,00,01,00,00
- 49. 01,01,01,01,01,01,01,01 10,29,D5,5E,88,0E,C2,D0 00,00,00,00,00,00,80,00
- 50. 01,01,01,01,01,01,01,01 5D,86,CB,23,63,9D,BE,A9 00,00,00,00,00,00,40,00
- 51. 01,01,01,01,01,01,01,01 1D,1C,A8,53,AE,7C,0C,5F 00,00,00,00,00,00,20,00
- 52. 01,01,01,01,01,01,01,01 CE,33,23,29,24,8F,32,28 00,00,00,00,00,00,10,00
- 53. 01,01,01,01,01,01,01,01 84,05,D1,AB,E2,4F,B9,42 00,00,00,00,00,00,08,00
- 54. 01,01,01,01,01,01,01,01 E6,43,D7,80,90,CA,42,07 00,00,00,00,00,00,04,00
- 55. 01,01,01,01,01,01,01,01 48,22,1B,99,37,74,8A,23 00,00,00,00,00,00,02,00
- 56. 01,01,01,01,01,01,01,01 DD,7C,0B,BD,61,FA,FD,54 00,00,00,00,00,00,01,00
- 57. 01,01,01,01,01,01,01,01 2F,BC,29,1A,57,0D,B5,C4 00,00,00,00,00,00,00,80
- 58. 01,01,01,01,01,01,01,01 E0,7C,30,D7,E4,E2,6E,12 00,00,00,00,00,00,00,40
- 59. 01,01,01,01,01,01,01,01 09,53,E2,25,8E,8E,90,A1 00,00,00,00,00,00,00,20
- 60. 01,01,01,01,01,01,01,01 5B,71,1B,C4,CE,EB,F2,EE 00,00,00,00,00,00,00,10
- 61. 01,01,01,01,01,01,01,01 CC,08,3F,1E,6D,9E,85,F6 00,00,00,00,00,00,00,08
- 62. 01,01,01,01,01,01,01,01 D2,FD,88,67,D5,0D,2D,FE 00,00,00,00,00,00,00,04
- 63. 01,01,01,01,01,01,01,01 06,E7,EA,22,CE,92,70,8F 00,00,00,00,00,00,00,02
- 64. 01,01,01,01,01,01,01,01 16,6B,40,B4,4A,BA,4B,D6 00,00,00,00,00,00,00,01
-
-
- KEY PLAIN TEXT CIPHER TEXT
-
- PC1 AND PC2 TESTS
-
- 65. 80,01,01,01,01,01,01,01 00,00,00,00,00,00,00,00 95,A8,D7,28,13,DA,A9,4D
- 66. 40,01,01,01,01,01,01,01 00,00,00,00,00,00,00,00 0E,EC,14,87,DD,8C,26,D5
- 67. 20,01,01,01,01,01,01,01 00,00,00,00,00,00,00,00 7A,D1,6F,FB,79,C4,59,26
- 68. 10,01,01,01,01,01,01,01 00,00,00,00,00,00,00,00 D3,74,62,94,CA,6A,6C,F3
- 69. 08,01,01,01,01,01,01,01 00,00,00,00,00,00,00,00 80,9F,5F,87,3C,1F,D7,61
- 70. 04,01,01,01,01,01,01,01 00,00,00,00,00,00,00,00 C0,2F,AF,FE,C9,89,D1,FC
- 71. 02,01,01,01,01,01,01,01 00,00,00,00,00,00,00,00 46,15,AA,1D,33,E7,2F,10
- 72. 01,80,01,01,01,01,01,01 00,00,00,00,00,00,00,00 20,55,12,33,50,C0,08,58
- 73. 01,40,01,01,01,01,01,01 00,00,00,00,00,00,00,00 DF,3B,99,D6,57,73,97,C8
- 74. 01,20,01,01,01,01,01,01 00,00,00,00,00,00,00,00 31,FE,17,36,9B,52,88,C9
-
-
-
-
-
-
- KEY PLAIN TEXT CIPHER TEXT
-
- PC1 AND PC2 TESTS (continued)
-
- 75. 01,10,01,01,01,01,01,01 00,00,00,00,00,00,00,00 DF,DD,3C,C6,4D,AE,16,42
- 76. 01,08,01,01,01,01,01,01 00,00,00,00,00,00,00,00 17,8C,83,CE,2B,39,9D,94
- 77. 01,04,01,01,01,01,01,01 00,00,00,00,00,00,00,00 50,F6,36,32,4A,9B,7F,80
- 78. 01,02,01,01,01,01,01,01 00,00,00,00,00,00,00,00 A8,46,8E,E3,BC,18,F0,6D
- 79. 01,01,80,01,01,01,01,01 00,00,00,00,00,00,00,00 A2,DC,9E,92,FD,3C,DE,92
- 80. 01,01,40,01,01,01,01,01 00,00,00,00,00,00,00,00 CA,C0,9F,79,7D,03,12,87
- 81. 01,01,20,01,01,01,01,01 00,00,00,00,00,00,00,00 90,BA,68,0B,22,AE,B5,25
- 82. 01,01,10,01,01,01,01,01 00,00,00,00,00,00,00,00 CE,7A,24,F3,50,E2,80,B6
- 83. 01,01,08,01,01,01,01,01 00,00,00,00,00,00,00,00 88,2B,FF,0A,A0,1A,0B,87
- 84. 01,01,04,01,01,01,01,01 00,00,00,00,00,00,00,00 25,61,02,88,92,45,11,C2
- 85. 01,01,02,01,01,01,01,01 00,00,00,00,00,00,00,00 C7,15,16,C2,9C,75,D1,70
- 86. 01,01,01,80,01,01,01,01 00,00,00,00,00,00,00,00 51,99,C2,9A,52,C9,F0,59
- 87. 01,01,01,40,01,01,01,01 00,00,00,00,00,00,00,00 C2,2F,0A,29,4A,71,F2,9F
- 88. 01,01,01,20,01,01,01,01 00,00,00,00,00,00,00,00 EE,37,14,83,71,4C,02,EA
- 89. 01,01,01,10,01,01,01,01 00,00,00,00,00,00,00,00 A8,1F,BD,44,8F,9E,52,2F
- 90. 01,01,01,08,01,01,01,01 00,00,00,00,00,00,00,00 4F,64,4C,92,E1,92,DF,ED
- 91. 01,01,01,04,01,01,01,01 00,00,00,00,00,00,00,00 1A,FA,9A,66,A6,DF,92,AE
- 92. 01,01,01,02,01,01,01,01 00,00,00,00,00,00,00,00 B3,C1,CC,71,5C,B8,79,D8
- 93. 01,01,01,01,80,01,01,01 00,00,00,00,00,00,00,00 19,D0,32,E6,4A,B0,BD,8B
- 94. 01,01,01,01,40,01,01,01 00,00,00,00,00,00,00,00 3C,FA,A7,A7,DC,87,20,DC
- 95. 01,01,01,01,20,01,01,01 00,00,00,00,00,00,00,00 B7,26,5F,7F,44,7A,C6,F3
- 96. 01,01,01,01,10,01,01,01 00,00,00,00,00,00,00,00 9D,B7,3B,3C,0D,16,3F,54
- 97. 01,01,01,01,08,01,01,01 00,00,00,00,00,00,00,00 81,81,B6,5B,AB,F4,A9,75
- 98. 01,01,01,01,04,01,01,01 00,00,00,00,00,00,00,00 93,C9,B6,40,42,EA,A2,40
- 99. 01,01,01,01,02,01,01,01 00,00,00,00,00,00,00,00 55,70,53,08,29,70,55,92
- 100. 01,01,01,01,01,80,01,01 00,00,00,00,00,00,00,00 86,38,80,9E,87,87,87,A0
- 101. 01,01,01,01,01,40,01,01 00,00,00,00,00,00,00,00 41,B9,A7,9A,F7,9A,C2,08
- 102. 01,01,01,01,01,20,01,01 00,00,00,00,00,00,00,00 7A,9B,E4,2F,20,09,A8,92
- 103. 01,01,01,01,01,10,01,01 00,00,00,00,00,00,00,00 29,03,8D,56,BA,6D,27,45
- 104. 01,01,01,01,01,08,01,01 00,00,00,00,00,00,00,00 54,95,C6,AB,F1,E5,DF,51
- 105. 01,01,01,01,01,04,01,01 00,00,00,00,00,00,00,00 AE,13,DB,D5,61,48,89,33
- 106. 01,01,01,01,01,02,01,01 00,00,00,00,00,00,00,00 02,4D,1F,FA,89,04,E3,89
- 107. 01,01,01,01,01,01,80,01 00,00,00,00,00,00,00,00 D1,39,97,12,F9,9B,F0,2E
- 108. 01,01,01,01,01,01,40,01 00,00,00,00,00,00,00,00 14,C1,D7,C1,CF,FE,C7,9E
- 109. 01,01,01,01,01,01,20,01 00,00,00,00,00,00,00,00 1D,E5,27,9D,AE,3B,ED,6F
- 110. 01,01,01,01,01,01,10,01 00,00,00,00,00,00,00,00 E9,41,A3,3F,85,50,13,03
- 111. 01,01,01,01,01,01,08,01 00,00,00,00,00,00,00,00 DA,99,DB,BC,9A,03,F3,79
- 112. 01,01,01,01,01,01,04,01 00,00,00,00,00,00,00,00 B7,FC,92,F9,1D,8E,92,E9
- 113. 01,01,01,01,01,01,02,01 00,00,00,00,00,00,00,00 AE,8E,5C,AA,3C,A0,4E,85
- 114. 01,01,01,01,01,01,01,80 00,00,00,00,00,00,00,00 9C,C6,2D,F4,3B,6E,ED,74
- 115. 01,01,01,01,01,01,01,40 00,00,00,00,00,00,00,00 D8,63,DB,B5,C5,9A,91,A0
- 116. 01,01,01,01,01,01,01,20 00,00,00,00,00,00,00,00 A1,AB,21,90,54,5B,91,D7
- 117. 01,01,01,01,01,01,01,10 00,00,00,00,00,00,00,00 08,75,04,1E,64,C5,70,F7
- 118. 01,01,01,01,01,01,01,08 00,00,00,00,00,00,00,00 5A,59,45,28,BE,BE,F1,CC
-
-
-
-
-
-
- KEY PLAIN TEXT CIPHER TEXT
-
- PC1 AND PC2 TESTS (continued)
-
- 119. 01,01,01,01,01,01,01,04 00,00,00,00,00,00,00,00 FC,DB,32,91,DE,21,F0,C0
- 120. 01,01,01,01,01,01,01,02 00,00,00,00,00,00,00,00 86,9E,FD,7F,9F,26,5A,09
-
-
- KEY PLAIN TEXT CIPHER TEXT
-
- PTESTS
-
- 121. 10,46,91,34,89,98,01,31 00,00,00,00,00,00,00,00 88,D5,5E,54,F5,4C,97,B4
- 122. 10,07,10,34,89,98,80,20 00,00,00,00,00,00,00,00 0C,0C,C0,0C,83,EA,48,FD
- 123. 10,07,10,34,C8,98,01,20 00,00,00,00,00,00,00,00 83,BC,8E,F3,A6,57,01,83
- 124. 10,46,10,34,89,98,80,20 00,00,00,00,00,00,00,00 DF,72,5D,CA,D9,4E,A2,E9
- 125. 10,86,91,15,19,19,01,01 00,00,00,00,00,00,00,00 E6,52,B5,3B,55,0B,E8,B0
- 126. 10,86,91,15,19,58,01,01 00,00,00,00,00,00,00,00 AF,52,71,20,C4,85,CB,B0
- 127. 51,07,B0,15,19,58,01,01 00,00,00,00,00,00,00,00 0F,04,CE,39,3D,B9,26,D5
- 128. 10,07,B0,15,19,19,01,01 00,00,00,00,00,00,00,00 C9,F0,0F,FC,74,07,90,67
- 129. 31,07,91,54,98,08,01,01 00,00,00,00,00,00,00,00 7C,FD,82,A5,93,25,2B,4E
- 130. 31,07,91,94,98,08,01,01 00,00,00,00,00,00,00,00 CB,49,A2,F9,E9,13,63,E3
- 131. 10,07,91,15,B9,08,01,40 00,00,00,00,00,00,00,00 00,B5,88,BE,70,D2,3F,56
- 132. 31,07,91,15,98,08,01,40 00,00,00,00,00,00,00,00 40,6A,9A,6A,B4,33,99,AE
- 133. 10,07,D0,15,89,98,01,01 00,00,00,00,00,00,00,00 6C,B7,73,61,1D,CA,9A,DA
- 134. 91,07,91,15,89,98,01,01 00,00,00,00,00,00,00,00 67,FD,21,C1,7D,BB,5D,70
- 135. 91,07,D0,15,89,19,01,01 00,00,00,00,00,00,00,00 95,92,CB,41,10,43,07,87
- 136. 10,07,D0,15,98,98,01,20 00,00,00,00,00,00,00,00 A6,B7,FF,68,A3,18,DD,D3
- 137. 10,07,94,04,98,19,01,01 00,00,00,00,00,00,00,00 4D,10,21,96,C9,14,CA,16
- 138. 01,07,91,04,91,19,04,01 00,00,00,00,00,00,00,00 2D,FA,9F,45,73,59,49,65
- 139. 01,07,91,04,91,19,01,01 00,00,00,00,00,00,00,00 B4,66,04,81,6C,0E,07,74
- 140. 01,07,94,04,91,19,04,01 00,00,00,00,00,00,00,00 6E,7E,62,21,A4,F3,4E,87
- 141. 19,07,92,10,98,1A,01,01 00,00,00,00,00,00,00,00 AA,85,E7,46,43,23,31,99
- 142. 10,07,91,19,98,19,08,01 00,00,00,00,00,00,00,00 2E,59,19,DB,4D,19,62,D6
- 143. 10,07,91,19,98,1A,08,01 00,00,00,00,00,00,00,00 23,A8,66,A8,09,D3,08,94
- 144. 10,07,92,10,98,19,01,01 00,00,00,00,00,00,00,00 D8,12,D9,61,F0,17,D3,20
- 145. 10,07,91,15,98,19,01,0B 00,00,00,00,00,00,00,00 05,56,05,81,6E,58,60,8F
- 146. 10,04,80,15,98,19,01,01 00,00,00,00,00,00,00,00 AB,D8,8E,8B,1B,77,16,F1
- 147. 10,04,80,15,98,19,01,02 00,00,00,00,00,00,00,00 53,7A,C9,5B,E6,9D,A1,E1
- 148. 10,04,80,15,98,19,01,08 00,00,00,00,00,00,00,00 AE,D0,F6,AE,3C,25,CD,D8
- 149. 10,02,91,15,98,10,01,04 00,00,00,00,00,00,00,00 B3,E3,5A,5E,E5,3E,7B,8D
- 150. 10,02,91,15,98,19,01,04 00,00,00,00,00,00,00,00 61,C7,9C,71,92,1A,2E,F8
- 151. 10,02,91,15,98,10,02,01 00,00,00,00,00,00,00,00 E2,F5,72,8F,09,95,01,3C
- 152. 10,02,91,16,98,10,01,01 00,00,00,00,00,00,00,00 1A,EA,C3,9A,61,F0,A4,64
-
-
-
-
-
-
-
-
- KEY PLAIN TEXT CIPHER TEXT
-
- S-BOX TESTS
-
- 153. 7C,A1,10,45,4A,1A,6E,57 01,A1,D6,D0,39,77,67,42 69,0F,5B,0D,9A,26,93,9B
- 154. 01,31,D9,61,9D,C1,37,6E 5C,D5,4C,A8,3D,EF,57,DA 7A,38,9D,10,35,4B,D2,71
- 155. 07,A1,13,3E,4A,0B,26,86 02,48,D4,38,06,F6,71,72 86,8E,BB,51,CA,B4,59,9A
- 156. 38,49,67,4C,26,02,31,9E 51,45,4B,58,2D,DF,44,0A 71,78,87,6E,01,F1,9B,2A
- 157. 04,B9,15,BA,43,FE,B5,B6 42,FD,44,30,59,57,7F,A2 AF,37,FB,42,1F,8C,40,95
- 158. 01,13,B9,70,FD,34,F2,CE 05,9B,5E,08,51,CF,14,3A 86,A5,60,F1,0E,C6,D8,5B
- 159. 01,70,F1,75,46,8F,B5,E6 07,56,D8,E0,77,47,61,D2 0C,D3,DA,02,00,21,DC,09
- 160. 43,29,7F,AD,38,E3,73,FE 76,25,14,B8,29,BF,48,6A EA,67,6B,2C,B7,DB,2B,7A
- 161. 07,A7,13,70,45,DA,2A,16 3B,DD,11,90,49,37,28,02 DF,D6,4A,81,5C,AF,1A,0F
- 162. 04,68,91,04,C2,FD,3B,2F 26,95,5F,68,35,AF,60,9A 5C,51,3C,9C,48,86,C0,88
- 163. 37,D0,6B,B5,16,CB,75,46 16,4D,5E,40,4F,27,52,32 0A,2A,EE,AE,3F,F4,AB,77
- 164. 1F,08,26,0D,1A,C2,46,5E 6B,05,6E,18,75,9F,5C,CA EF,1B,F0,3E,5D,FA,57,5A
- 165. 58,40,23,64,1A,BA,61,76 00,4B,D6,EF,09,17,60,62 88,BF,0D,B6,D7,0D,EE,56
- 166. 02,58,16,16,46,29,B0,07 48,0D,39,00,6E,E7,62,F2 A1,F9,91,55,41,02,0B,56
- 167. 49,79,3E,BC,79,B3,25,8F 43,75,40,C8,69,8F,3C,FA 6F,BF,1C,AF,CF,FD,05,56
- 168. 4F,B0,5E,15,15,AB,73,A7 07,2D,43,A0,77,07,52,92 2F,22,E4,9B,AB,7C,A1,AC
- 169. 49,E9,5D,6D,4C,A2,29,BF 02,FE,55,77,81,17,F1,2A 5A,6B,61,2C,C2,6C,CE,4A
- 170. 01,83,10,DC,40,9B,26,D6 1D,9D,5C,50,18,F7,28,C2 5F,4C,03,8E,D1,2B,2E,41
- 171. 1C,58,7F,1C,13,92,4F,EF 30,55,32,28,6D,6F,29,5A 63,FA,C0,D0,34,D9,F7,93
-
-
- 17. Selecting Alphabetic or Hexadecimal keys
-
- a. Either hexadecimal or alphabetic keys may be selected by choosing
- Option H on the Additional Options Menu.
-
- b. From the Master Menu, select Option L, Additional Options Menu by
- pressing the letter 'L', upper or lower case.
-
- c. From the Additional Options Menu, select Option H by pressing the
- letter 'H', upper or lower case. When the Key Type Status Menu appears (see
- Figure 36), press the letter of your choice. The menu will be changed to
- reflect your selection. Press the letter 'C' to return to the Additional
- Options Menu.
-
- d. Your selection will be effective for the duration of this work
- session only. If you wish to change it again during this session, repeat the
- steps a through c, above.
-
- e. If you wish to make your selection the new default which will be
- in effect the next time The Private Line is started, see Section 19, Saving
- Switch Settings.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- _______________________________________________________________
- THE PRIVATE LINE
-
- KEY TYPE STATUS
-
- CURRENT STATUS: Alphabetic
-
- OPTIONS
-
- A. Use Hexadecimal keys
- B. Use Alphabetic keys
- C. RETURN TO OPTIONS MENU
-
- Enter the letter of your choice:
- _______________________________________________________________
- Figure 36.
-
-
- 18. Changing Purging Status
-
- a. Several features may be selected concerning the purging status.
-
- b. From the Master Menu, select Option L, Additional Options Menu by
- pressing the letter 'L', upper or lower case.
-
- c. From the Additional Options Menu, select Option I by pressing the
- letter 'I', upper or lower case. When the Purging Status Menu appears (see
- Figure 37), press the letter of your choice. The menu will be changed to
- reflect your selection. Press the letter 'C' to return to the Additional
- Options Menu.
-
- d. Your selection will be effective for the duration of this work
- session only. If you wish to change it again during this session, repeat the
- steps a through c, above.
-
- e. If you wish to make your selection the new default which will be
- in effect the next time The Private Line is started, see Section 19, Saving
- Switch Settings.
-
- f. It should be noted that if you select automatic purge of the input
- file after encryption, you will not be prompted to confirm the purge, regardless
-
-
-
-
-
-
- of the setting of the prompt switch. This is also true for automatic purging
- after decryption.
-
- ____________________________________________________________________________
- THE PRIVATE LINE
-
- PURGING STATUS
-
- OPTIONS
-
- A. Change Automatic purge status after encryption
- B. Change Automatic purge status after decryption
- C. Change purge prompt status after encryption
- D. Change purge prompt status after decryption
- E. Enter the number of times purged file is overwritten
- F. Return to Additional Options Menu
-
- Enter the letter of your choice:
-
- ____________________________________________________________________________
- Current Switch Selections
- DES Mode: Electronic Code book Short Block: No Padding
- Key type: Alphabetic Disk verify after write: On
- Automatic Purging (after encryption): No Purge Prompt (after encryption): Yes
- (after decryption): NO (after decryption): Yes
- Times purged file overwritten: 1 Command Line: Exit Speaker: Off
- Re-use existing files: Prompt Filename Display: On Key Entry Echo: On
- ____________________________________________________________________________
- (C) Everett Enterprises, 7839 Vervain Court, Springfield, VA 22152
-
- ____________________________________________________________________________
- Figure 37.
-
-
- 19. Saving Switch Settings
-
- a. The switch settings displayed below the Master Menu may be changed
- from the Additional Options Menu for either the duration of the current session
- by selecting the appropriate option or they may be changed permanently, also
- from the Additional Options Menu using Option J.
-
- b. To change an individual option for the duration of the current work
- session, see the appropriate section.
-
- c. To save the current settings permanently, select Option L,
- Additional Options Menu from the Master Menu by pressing the letter 'L', upper
- or lower case.
-
-
-
-
-
-
-
- d. From the Additional Options Menu, select Option J by pressing the
- letter 'J', upper or lower case. When the Save Switch Settings to Disk Menu
- appears (see Figure 38), press the letter of your choice. The switch settings
- will be saved in \tpl.def and you will be returned to the Additional Options
- Menu.
-
- e. The current settings will be effective until you change them during
- this work session. If you change your selection during this session but do not
- save it to disk, you will obtain the previous default settings when you again
- use The Private Line.
-
- f. If you delete \tpl.def from the root directory, you will obtain
- the original default settings shown below:
-
- ____________________________________________________________________________
- THE PRIVATE LINE
-
- Save Switch Settings to Disk
-
- OPTIONS
-
- A. Save Current Switch Settings to Disk
- B. RETURN TO OPTIONS MENU
-
- Enter the letter of your choice:
- ____________________________________________________________________________
- Current Switch Selections
- DES Mode: Electronic Code book Short Block: No Padding
- Key type: Alphabetic Disk verify after write: On
- Automatic Purging (after encryption): No Purge Prompt (after encryption): Yes
- (after decryption): NO (after decryption): Yes
- Times purged file overwritten: 1 Command Line: Exit Speaker: Off
- Re-use existing files: Prompt Filename Display: On Key Entry Echo: On
- ____________________________________________________________________________
- (C) Everett Enterprises, 7839 Vervain Court, Springfield, VA 22152
-
- ____________________________________________________________________________
- Figure 38.
-
- 20. Selecting Command Line exit action
-
- a. You may either exit to the operating system or you may exit to the
- master menu upon termination of the command line action. Command line exit
- action is selected by choosing Option K on the Additional Options Menu.
-
- b. From the Master Menu, select Option L, Additional Options Menu by
- pressing the letter 'L', upper or lower case.
-
-
-
-
-
-
-
- c. From the Additional Options Menu, select Option K by pressing the
- letter 'K', upper or lower case. When the Command Line Exit Status Menu appears
- (see Figure 39), press the letter of your choice. The menu will be changed to
- reflect your selection. Press the letter 'C' to return to the Additional
- Options Menu.
-
- d. Your selection will be effective for the duration of this work
- session only. If you wish to change it again during this session, repeat the
- steps a through c, above.
-
- e. If you wish to make your selection the new default which will be
- in effect the next time The Private Line is started, see Section 19, Saving
- Switch Settings.
- _________________________________________________________________
- THE PRIVATE LINE
-
- Command Line Exit Status
-
- CURRENT STATUS: Menu
-
- OPTIONS
-
- A. Exit after Command Line
- B. Return to Master Menu after Command Line
- C. RETURN TO OPTIONS MENU
-
- Enter the letter of your choice:
- _________________________________________________________________
- Figure 39.
-
-
-
- 21. Changing File Re-use Status
-
- a. You may automatically re-use a file which currently exits or you
- may be prompted before it is re-used.
-
- b. From the Master Menu, select Option L, Additional Options Menu by
- pressing the letter 'L', upper or lower case.
-
- c. From the Additional Options Menu, select Option L by pressing the
- letter 'L', upper or lower case. When the Change File Re-use Status Menu
- appears (see Figure 40), press the letter of your choice. The menu will be
- changed to reflect your selection. Press the letter 'C' to return to the
- Additional Options Menu.
-
- d. Your selection will be effective for the duration of this work
- session only. If you wish to change it again during this session, repeat the
-
-
-
-
-
-
- steps a through c, above.
-
- e. If you wish to make your selection the new default which will be
- in effect the next time The Private Line is started, see Section 19, Saving
- Switch Settings.
-
-
- _________________________________________________________________
- THE PRIVATE LINE
-
- Re-Use Existing File Status
-
- CURRENT STATUS: Prompt
-
- OPTIONS
-
- A. Prompt user before re-use
- B. Automatically re-use
- C. RETURN TO OPTIONS MENU
-
- Enter the letter of your choice:
- _________________________________________________________________
- Figure 40.
-
-
-
- 22. DES Modes of Operation.
-
- a. Electronic Code book Mode (ECB). The electronic code book mode
- is defined as follows:
-
- (1) In ECB encryption, a plain text data block is used
- directly as the DES input block which is processed through a DES device in the
- encrypt state. The resulting output block is used as the cipher text. If the
- plain text does not consist of an integral number of data blocks, then the final
- partial data block is processed using either padding or cipher text stealing,
- depending on the user selection for Short Blocks.
-
- (2) In ECB decryption, a cipher text data block is used
- directly as the DES input block which is processed through a DES device in the
- decrypt state. The resulting output block is the plain text. If the plain text
- does not consist of an integral number of data blocks, then the final partial
- data block is processed using either padding or cipher text stealing, depending
- on the user selection for Short Blocks.
-
-
-
-
-
-
-
- (3) To use ECB mode, take the following steps:
-
- (a) From the additional options menu, select Option 'M'.
- See Figure 41.
-
- (b) Select the DES Mode of choice by pressing the letter
- which represents the desired mode.
-
- ____________________________________________________________________________
- THE PRIVATE LINE
-
- DES Mode of Operation
-
- CURRENT STATUS: Electronic Code book
-
- OPTIONS
-
- A. Electronic Code Book
- B. Cipher Block Chaining
- C. 64 Bit Cipher Feedback
- D. 64 Bit Output Feedback
- E. 8 Bit Cipher Feedback
- F. 8 Bit Output Feedback
- G. Return to Options Menu
-
- Enter the letter of your choice:
-
- ____________________________________________________________________________
- (C) Everett Enterprises, 7839 Vervain Court, Springfield, VA 22152
-
- ____________________________________________________________________________
- Figure 41.
-
-
- (c) Once you make a selection, the current status will
- be changed and the DES Mode of Operation Menu will re-appear. Press 'G' to
- return to the Additional Options Menu.
-
- b. Cipher Block Chaining Mode (CBC). The cipher block chaining
- mode is defined as follows:
-
- (1) In CBC encryption, a plain text is divided into blocks.
- The first DES input block is formed by exclusive-ORing the first block of a
- message with a 64-bit initialization value (IV). The input block is processed
- through a DES device in the encrypt state and the resulting output block is used
- as the first cipher text. The cipher text block is then exclusive-ORed with the
- next plain text data block to form the next DES input block, which is processed
-
-
-
-
-
-
- through the DES device in the encrypt state to produce the next cipher text
- block. This encryption process continues to "chain" successive cipher and plain
- text blocks until the last plain text block in the message is encrypted. If the
- plain text does not consist of an integral number of data blocks, then the final
- partial data block is processed using either padding or cipher text stealing,
- depending on the user selection for Short Blocks.
-
- (2) In CBC decryption, the first cipher text block is used
- as the input block and is processed through a DES device in the decrypt state;
- the resulting output block is then exclusive-ORed with the initialization value
- (must be the same as that used during encryption) to produce the first plain
- text block. The second cipher text block is then used as the input block and
- is processed through the DES device in the decrypt state and the resulting
- output block is exclusive-ORed with the first cipher text block to produce the
- second plain text block. The CBC decryption process continues in this manner
- until the last complete cipher text block has been decrypted. If the cipher
- text does not consist of an integral number of data blocks, then the final
- partial data block is processed using either padding or cipher text stealing,
- depending on the user selection for Short Blocks.
-
- (3) To use CBC mode, take the following steps:
-
- (a) From the additional options menu, select Option
- 'M'. See Figure 41.
-
- (b) Select the DES Mode of choice by pressing the
- letter which represents the desired mode. After the current status has been
- updated, select another choice or return to the Additional Options menu.
-
- c. Cipher Feedback Mode (CFB). The cipher feedback mode is
- defined as follows:
-
- (1) A message to be encrypted is divided into data units each
- containing K bits. In both the CFB encrypt and decrypt operations, an
- initialization value (IV) is used. The IV is placed in the least significant
- bits of the DES input block with the unused bits set to '0's. This input block
- is processed through a DES device in the encrypt state to produce an output
- block. During encryption, cipher text is produced by exclusive-ORing a k-bit
- plain text data unit with the most significant k bits of the output block.
- Similarly, during decryption, plain text is produced by exclusive-ORing a k-bit
- unit of cipher text with the most significant k-bits of the output block. In
- both cases, the unused bits of the DES output block are discarded. In both
- cases the next input block is created by discarding the most significant k-bits
- of the previous input block, shifting the remaining bits k positions to the left
- and then inserting the k bits of cipher text just produced in the encryption
- operation or just used in the decrypt operation into the least significant
- positions. This input block is then processed through the DES device in the
- encrypt state to produce the next output block. This process continues until
-
-
-
-
-
-
- the entire plain text message has been encrypted or until the entire cipher text
- message has been decrypted.
-
- (2) To use 64 or 8-bit CFB mode, take the following steps:
-
- (a) From the additional options menu, select Option
- 'M'. See Figure 41.
-
- (b) Select the DES Mode of choice by pressing the
- letter which represents the desired mode. After the current status has been
- updated, select another choice or return to the Additional Options menu.
-
- d. Output Feedback Mode (OFB). The output feedback mode is
- defined as follows:
-
- (1) A message to be encrypted is divided into data units each
- containing K bits. In both the OFB encrypt and decrypt operations, an
- initialization value (IV) is used. The IV is placed in the least significant
- bits of the DES input block with the unused bits set to '0's. This input block
- is processed through a DES device in the encrypt state to produce an output
- block. During encryption, cipher text is produced by exclusive-ORing a k-bit
- plain text data unit with the most significant k bits of the output block.
- Similarly, during decryption, plain text is produced by exclusive-ORing a k-bit
- unit of cipher text with the most significant k-bits of the output block. In
- both cases, the unused bits of the DES output block are discarded. In both
- cases the next input block is created by discarding the most significant k-bits
- of the previous input block, shifting the remaining bits k positions to the left
- and then inserting the k bits of cipher text just used into the least
- significant positions. This input block is then processed through the DES
- device in the encrypt state to produce the next output block. This process
- continues until the entire plain text message has been encrypted or until the
- entire cipher text message has been decrypted.
-
- (2) To use 64 or 8-bit OFB mode, take the following steps:
-
- (a) From the additional options menu, select Option
- 'M'. See Figure 41.
-
- (b) Select the DES Mode of choice by pressing the
- letter which represents the desired mode. After the current status has been
- updated, select another choice or return to the Additional Options menu.
-
- 23. Short block processing.
-
- The ECB and CBC modes are block methods of encryption and as such,
- must operate on 64-bit data blocks. Partial data blocks (short blocks of less
- than 64-bits, or 8 characters) require special handling. The Private Line uses
- the following methods:
-
-
-
-
-
-
- a. Padding - If padding is used, The Private Line will extend the
- input text to be encrypted to the next whole multiple of 64-bits using whatever
- characters are present in the input buffer. This precludes anyone from guessing
- if the last block consists of mostly spaces, binary zeros, etc. The user is
- responsible for knowing what to expect in the decryption mode. One cannot
- select 'no padding' to decrypt a file which was encrypted using 'padding.'
-
- b. No Padding - If padding is not used, The Private Line will use
- cipher text stealing to encrypt any short block at the end of the plain text.
- The will maintain the integrity of the security of the encryption process. In
- a plain text file with a short block, the last eight characters are encrypted
- as a complete block. In ECB mode, the short block will consist of the
- characters in the short block and characters already encrypted from the previous
- whole block in order to make a complete block. In CBC mode, the last encrypted
- whole block is used to produce the DES input text for the short block which also
- has been lengthened by adding characters from the previously encrypted whole
- block to those in the short block.
-
- c. Selecting Padding choice. To use 64 or 8-bit OFB mode, take
- the following steps:
-
- (1) From the additional options menu, select Option 'N'. See
- Figure 42.
-
- (2) Select the use of padding by pressing the letter which
- represents the desired mode. After the current status has been updated, select
- another choice or return to the Additional Options menu.
-
- ____________________________________________________________________________
- THE PRIVATE LINE
-
- Short Block Processing
-
- CURRENT STATUS: No Padding
-
- OPTIONS
-
- A. Do not pad short blocks
- B. Pad short blocks
- C. Return to Options Menu
-
- Enter the letter of your choice:
- ____________________________________________________________________________
- (C) Everett Enterprises, 7839 Vervain Court, Springfield, VA 22152
-
- ____________________________________________________________________________
- Figure 42.
-
-
-
-
-
-
-
- 24. Initialization value. All of the DES modes of operation used by the
- Private Line use an initialization value or vector (IV) except ECB. The user
- is cautioned that the same IV must be used for decryption which was used for
- encryption. The default, or preset IV is: 12,34,56,78,90,ab,cd,ef in
- hexadecimal pairs. The user may change this default to one's own choice. To
- set a different IV, take the following steps:
-
- a. From the additional options menu, select Option 'O'. See Figure
- 43.
-
- b. Select your choice by pressing the letter which represents the
- desired action. After the current status has been updated, select another
- choice or return to the Additional Options menu. If 'Change Initial Value' is
- selected, the user will be prompted to enter a new IV in hexadecimal pairs.
- After the new IV is entered, the user will be asked to verify the new IV. If
- it is correct, press 'Y' and return to the Additional Options Menu. If it is
- incorrect, press 'N' to re-enter a new IV. A CNTRL-R will return the user to
- the additional options menu at anytime.
-
- ____________________________________________________________________________
- THE PRIVATE LINE
-
- Initial Value
-
- CURRENT VALUE: 12,34,56,78,90,ab,cd,ef
-
- OPTIONS
-
- A. Change Initial Value
- B. Return to Options Menu
-
- Enter the letter of your choice:
- ____________________________________________________________________________
- (C) Everett Enterprises, 7839 Vervain Court, Springfield, VA 22152
-
- ____________________________________________________________________________
- Figure 43.
-
-
- 25. Turn Speaker Switch On/Off. A beep will occur whenever The Private
- Line is waiting for input from the user. This is most annoying to some users!
- Thus, the user may select Option P from the Additional Options Menu in order to
- turn the speaker on or off (See Figure 44). The default is: speaker off.
-
-
-
-
-
-
- ____________________________________________________________________________
- THE PRIVATE LINE
-
- Speaker Switch
-
- CURRENT STATUS: Speaker Off
-
- OPTIONS
-
- A. Turn Speaker On
- B. Turn Speaker Off
- C. Return to Options Menu
-
- Enter the letter of your choice:
- ____________________________________________________________________________
- (C) Everett Enterprises, 7839 Vervain Court, Springfield, VA 22152
-
- ____________________________________________________________________________
- Figure 44.
-
-
- 26. Change Filename Display Status. Whenever The Private Line is
- waiting for a file name to be entered, the file names which are contained on the
- current directory are displayed. The user may select either the filename which
- is high-lighted by pressing RETURN or the user may type in the desired file
- name, with or without a path name. The high-light bar may be moved by using the
- cursor keys. If the user does not want the file names displayed, the option
- switch may be changed by using Selection Q from the Additional Options Menu (See
- Figure 45). The default is: display file names.
- ____________________________________________________________________________
- THE PRIVATE LINE
-
- Filename Display
-
- CURRENT STATUS: Off
-
- OPTIONS
-
- A. Display filenames
- B. Do not display filenames
- C. Return to Options Menu
-
- Enter the letter of your choice:
- ____________________________________________________________________________
- (C) Everett Enterprises, 7839 Vervain Court, Springfield, VA 22152
-
- ____________________________________________________________________________
- Figure 45.
-
-
-
-
-
-
-
- C. Command Line execution
-
-
- 1. Encryption - A file may be encrypted from the DOS prompt using either
- an alphabetic key consisting of 1-16 characters or a hexadecimal key of 2-32 hex
- characters. The key will be right-filled with blanks (hex value 20H) to the
- shorter of 8 or 16 characters. If 16 characters are used, the file will be
- doubly encrypted. To encrypt a file from the DOS prompt, take the following
- steps:
-
- a. Type 'private e ' followed by a file name followed by a space and
- an alphabetic key of 1 to 16 characters. Remember that the characters in the
- alphabetic key are case specific. The file name may be any MS-DOS file name;
- it may contain a pathname specification.
-
- b. All current default switches are valid when the command line mode
- is used except the key type. Regardless of the key type setting, alphabetic
- keys are the default on the command line entry. The use of hexadecimal keys is
- indicated by placing an 'h' before the 'e' or 'd' in the command line (see
- example). If the command line mode exits to the master menu, the current
- setting for the key type again takes precedence.
-
- c. Examples: 'private e \tpl\msg.dat abcdefgH',
- 'private he \tpl\msg.dat 7ca110454a1a6e57'.
-
- 2. Decryption - A file may be decrypted from the DOS prompt using either
- an alphabetic key consisting of 1-16 characters or a hexadecimal key of 2-32 hex
- characters. The key will be right-filled with blanks (hex value 20H) to the
- shorter of 8 or 16 characters. If 16 characters are used, the file will be
- doubly decrypted. To decrypt a file from the DOS prompt, take the following
- steps:
-
- a. Type 'private d ' followed by a file name followed by a space and
- an alphabetic key of 1 to 16 characters. Remember that the characters in the
- key are case specific. The file name may be any MS-DOS file name; it may
- contain a pathname specification.
-
- b. All current default switches are valid when the command line mode
- is used except the key type. Regardless of the key type setting, alphabetic
- keys are the default on the command line entry. The use of hexadecimal keys is
- indicated by placing an 'h' before the 'e' or 'd' in the command line (see
- example). If the command line mode exits to the master menu, the current
- setting for the key type again takes precedence.
-
- c. Examples: 'private d \tpl\msg.dat abcdefgH',
- 'private hd \tpl\msg.dat 7ca110454a1a6e57'.
-
-
-
-
-
-
-
- 3. Convert file to ASCII data - A file may be converted from binary data
- to ASCII which can then be sent over a telecommunications network or printed.
-
- a. Type 'private a ' followed by a file name followed by a carriage
- return. The file name may be any MS-DOS file name; it may contain a pathname
- specification.
-
- b. All current default switches are valid when the command line mode
- is used.
-
- c. Example: 'private a \tpl\msg.dat'.
-
- 4. Convert file to binary data. - A file may be converted from ASCII data
- to binary. Please note that it does not make sense to use this function unless
- a file has first been converted to ASCII data using The Private Line.
-
- a. Type 'private b ' followed by a file name followed by a carriage
- return. The file name may be any MS-DOS file name; it may contain a pathname
- specification.
-
- b. All current default switches are valid when the command line mode
- is used.
-
- c. Example: 'private b \tpl\msg.dat'.
-
- 5. Command Line Exit action - The command line mode may exit to DOS or it
- may exit to The Private Line Master Menu. If the current setting saved in
- \tpl.def indicates 'EXIT', The Private Line will return to the DOS prompt upon
- termination of encryption or decryption. If 'MENU' is the current setting, the
- command line mode will pass to the master menu upon completion of either
- encryption or decryption. To change the action taken upon termination of the
- command line option, see paragraph 20, Section II B, 'Selecting Command Line
- exit action.'
-
- 6. Only encryption/decryption, single or double, and conversion to and/or
- from ASCII to binary form, may be performed from the MS-DOS command line. All
- other actions must be selected from the master menu.
-
- D. Other Aspects of The Private Line
-
- 1. Selection of keys - Users should pick keys which are random and known
- only by the user and intended recipient. Keys such as one's nickname, spouse's
- name, or other keys which could be associated with either the user or the
- recipient, should not be used. Using one's birthday or wedding date is not a
- good idea. Such keys are too easy to guess. Keys should be changed as
- frequently as possible, depending on the criticality of the data involved.
-
- 2. Protection of keys - Keys should be afforded the same protection as the
-
-
-
-
-
-
- data itself. Keys should never be stored with either the clear text or the
- associated encrypted file. After a key has been used by The Private Line, it
- as well as the input and output data areas, is overwritten with binary zeroes
- in order to preclude a possible compromise. For obvious reasons, users should
- take special care not to lose or destroy keys of files which are maintained only
- in encrypted form.
-
- 3. Destruction of unencrypted data - Files which have been encrypted may
- be maintained in clear form in a safe and secure place, separate from that used
- to store either the keys or the encrypted file. This will protect the user
- against either lost keys or destruction of data because of CPU or disk failure
- (hopefully a rare occurrence).
-
- 4. When the Private Line terminates execution, it has destroyed all data,
- including keys, maintained in RAM memory and input/output buffers.
-
-
-
-
-
-
- III. Requirements
-
- A. Hardware requirements: IBM PC, XT, AT, PS/2 or compatible.
-
- B. Software requirements: MS-DOS Operating System, Version 2.x or later,
- including 3.x and 4.x.
-
- C. Memory requirements: 64K.
-
-
-
-
-
-
-
- IV. REFERENCES
-
-
-
- a. Bosworth, Bruce. Codes, Ciphers, and Computers. Rochelle Park, New
- Jersey: Hayden Book Company, 1982.
-
- b. 'Data Encryption Standard,' Federal Information Processing Standards
- (FIPS) Publication 46, National Bureau of Standards, U.S. Department of
- Commerce, Washington, D.C., January 1977.
-
- c. 'DES Modes of Operation,' Federal Information Processing Standards (FIPS)
- Publication 81, National Bureau of Standards, U.S. Department of
- Commerce, Washington, D.C., December 1980.
-
- d. 'Guidelines for Implementing and Using the NBS Data Encryption Standard,'
- Federal Information Processing Standards (FIPS) Publication 81, National
- Bureau of Standards, U.S. Department of Commerce, Washington, D.C.,
- April 1981.
-
- e. Meyer, Carl H. and Stephen M. Matyas. Cryptography. New York: John
- Wiley & Sons, 1982.
-
- f. Norton, Peter. MS-DOS and PC-DOS User's Guide. Englewood Cliffs:
- Prentics/Hall International, 1984.
-
- g. 'Validating the Correctness of Hardware Implementations of the NBS Data
- Encryption Standard,' NBS Special Publication 500-20, National Bureau of
- Standards, U.S. Department of Commerce, Washington, D.C., Revised
- September 1980.
-
-
-
-
-
-
- V. THE PRIVATE LINE PROBLEM REPORT
-
-
- Date: ________________ Version #: ___________
- Please Report only one problem per report.
-
- Describe your hardware and operating system. Please include disk format,
- graphics card, monitor, operating system, memory and TSRs in use.
-
- Please provide a clear description of the problem and the circumstances
- surrounding its occurrence. If possible, give an example. If a software patch
- or other solution is being used, please provide a complete description. This
- form may also be used to submit suggested enhancements to The Private Line.
-
- Problem Description:
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Please complete the following before submitting the form:
-
- Name: ____________________________ Phone: ______________________
- Company: _______________________________________________________
- Address: _______________________________________________________
- City: __________________________________________________________
- State: _________ ZIP:______________
-
- Return this form to: Everett Enterprises
- 7839 Vervain Court
- Springfield, VA 22152
-
-
-
-
-
-
- VI. Changes and Updates
-
- A. Changes.
-
- 1. Version 4.01 of The Private Line included an improved binary to ASCII
- conversion routine. Previous versions contained an algorithm which doubled the
- size of the file when converting from binary to ASCII. This version, however,
- increases the file only by 37%. The user must be cautioned that files converted
- to ASCII by earlier versions must be converted to binary by the same version
- before decryption can take place.
-
- 2. The other major change in Version 4.01 is an improved directory listing
- routine. Older versions of The Private Line only allowed the current directory
- to be listed. This version (4.01) allows the user to specify any pathname,
- including wildcard characters.
-
- 3. Version 4.02 adds an automated compliance test to determine if the
- program complies with the Data Encryption Standard. The test is run at program
- initialization time and is invisible to the user unless one of the 19 tests
- fail. The user may also run the compliance tests and view the results of each
- test by selecting option G from the additional options menu.
-
- 4. Version 4.03 added all 171 tests used by the National Bureau of
- Standards to verify compliance with the DES.
-
- 5. Version 4.04 contained an improved display routine and changed the
- encryption routine so that the encrypted file was no more than 1-7 bytes longer
- than the source file. Previous versions expanded the encrypted file to the end
- of the last 128 byte sector in the source file.
-
- 6. Version 4.05 added a routine which allowed the display of the default
- directory (*.*) by simply pressing RETURN. It also fixed a bug in the display
- directory routine which occurred if a file type contained only 1 or 2
- characters.
-
- 7. Version 5.0 adds the capability of using alphabetic keys, command line
- execution and the following user-set default switches:
-
- a. key echo
- b. automatic purge of input files after encryption and/or decryption
- c. purge prompting of input file after encryption and/or decryption
- d. verify after disk writes
- e. key types
- f. re-use of existing files with or without prompts
- g. the number of times a file is overwritten with binary zeros before
- the file name is removed from the directory.
-
-
-
-
-
-
-
- 8. Version 5.0 also uses raw output mode in order to speed up The Private
- Line.
-
- 9. Version 6.0 adds additional modes of operation for the DES as
- contained in FIPS Pub 81. Specifically, the following modes are supported:
-
- a. electronic code book (this method, with padding, is the one
- used by all earlier versions of The Private Line),
- b. cipher block chaining,
- c. cipher feedback (both 64 & 8 bit), and
- d. output feedback (both 64 & 8 bit).
-
- 10. In addition, the method of handling short blocks has been expanded
- to include no padding, as well as the original method of padding the message to
- a multiple of 8 bytes. Ciphertext stealing is the method used by both
- electronic code book and cipher block chaining modes to encrypt a short block.
- The other DES modes do not require padding.
-
- 11. Under Version 6.0, users may specify a default initialization value,
- which if not changed, is set to: 12,34,56,78,90,ab,cd,ef in hexadecimal pairs.
-
- 12. The following additional user-set default switches have been added
- in Version 6.0:
-
- a. DES Mode of Operation
- b. Padding Selection
- c. Initialization Value
-
- 13. Beginning with Version 6.0, printed User's Guides are mailed upon
- registration.
-
- 14. Version 6.01 fixed a bug in the ECB padding routine.
-
- 15. Version 6.02 added the capability to disable the speaker. Several
- users have voiced their dislike of the beeps each time the program is waiting
- for user input. The default is speaker disabled. The user may enable the
- speaker from the Additional Options Menu and change the default by saving the
- selected options.
-
- 16. Version 6.02 also changed the key to return to the previous menu.
- In previous versions, Control-R was used. Beginning with this version, ESCAPE,
- will back the user out of each operation, except for the List Directory option
- while the directory is being input by the user. This change is downward
- compatible; Control-R continues to work.
-
- 17. Version 6.03 includes the display of the current directory when the
- program is waiting for a file name. The hi-light bar may be moved by using the
-
-
-
-
-
-
- arrow and page up/page down keys. The high-lighted filename may be selected by
- pressing RETURN. The desired filename may still be entered by typing it and/or
- the associated path. If the user begins typing a file name, the high-light bar
- may still be moved, but when RETURN is pressed, the filename used is the one
- entered by the user, not the one under the high-light bar. If a filename
- entered by the user is erased by using the backspace key, then the filename
- under the high-light bar may once again be selected by pressing RETURN.
-
- 18. Version 6.04 increased the number of filenames from 10 to 50 which
- are displayed when the program is waiting for a filename to be entered by the
- user. Version 6.04 also added the use of hexadecimal keys from the command
- line.
-
- 19. Version 6.05 corrected a bug which occurred when the Private Line
- was used in a non EGA environment.
-
- 20. Version 6.06 corrected an error which occurred when the Private Line
- was used in a CGA or MGA environment. Actually, the problem occurred because
- of the manner in which older ROM programs returned from INT 16H.
-
- 21. Version 7.0 added screen memory write routines for the master and
- additional option menus, the opening and closing screens, the directory display
- and for the screens from which the filenames contained on the current directory
- are displayed.
-
- 22. Version 7.01 corrected an error in the CBC short block
- decryption routine.
-
- 23. Version 7.02 corrected errors in the short block decryption
- routine.
-
- B. Updates.
-
- Updates to The Private Line may be obtained from the IBM Software Special
- Interest Group (IBMSW SIG) on CompuServe by downloading the file, TPL.ARC. This
- file contains all of the files associated with The Private Line, including the
- User Manual documentation. It is located in Data Library 0 for the first 30
- days and then moved to Data Library 3.
-
- Or, one may order a diskette from Everett Enterprises, 7839 Vervain Court,
- Springfield, VA 22152, containing the latest version of The Private Line at a
- nominal cost of $10 (media, handling, and postage fee).
-
- Registration fees have to be paid only once. All updates are included in
- that one price. The nominal disk fee of $10 is due each time a diskette is
- obtained from Everett Enterprises.
-
-
- VII. INDEX
-
-
- command line use
- decryption 40
- encryption 40
- exit action 41
- file conversion
- Binary to ASCII 41
- ASCII to Binary 41
- compliance with DES tests 23
- decrypting files 9
- default switches 30
- changing 30
- temporary 30
- permanent 30
- original values 30
- displaying disk directories 13
- displaying files 9
- double decryption 14
- encryption 14
- encrypting files 3
- erasing files 22
- exit, action taken upon command line 41
- files
- ASCII 15
- binary 16
- contracted 16
- erasing 22
- expanded 15
- printable 17
- purging 10
- re-use 31
- automatic 31
- with prompts 31
- invoices viii
- keys 28
- alphabetic 28
- hexadecimal 28
- printing files 17
- Private Line, The
- action upon receipt 2
- floppy disk systems 2
- hard disk systems 3
- execution
- command line 40
- menu 3
- testing 22
-
-
-
-
-
-
- VII. INDEX (continued)
-
- Private Line, The
- using 3
- problem reports 45
- purging
- automatic 29
- with prompts 29
- references 44
- requirements 43
- hardware 43
- memory 43
- software 43
- trouble reports 45
- user set options 30
- automatic purge 29
- command line exit action 41
- disk write verification 17
- file re-use 31
- key echo 19
- key type 28
- number of times files overwritten 29
- purge prompt 29
- write verify 17
-
-
-
-
-
-
-
-
-