home *** CD-ROM | disk | FTP | other *** search
- The following files are contained on this diskette:
-
- 1. Private.Exe - The executable Private Line program.
- 2. Private.Doc - Documentation for Private.Exe.
- 3. Msg.Dat - A sample file for encryption.
- 4. Msg.enc - The sample file encrypted.
- 5. Fact.Sht - A fact sheet on The Private Line.
-
- The Private Line (tm) is a full implementation of the Data Encryption
- Standard, published by the National Bureau of Standards, U.S. Department of
- Commerce. This command line and/or menu-driven program works on IBM
- PC/XT/AT, PS/2 and compatibles with MS-DOS 2.0 or later. It will encrypt
- any MS-DOS file, including LOTUS 1-2-3, dBase II/III, WordStar, etc.
- Single and double encryption is provided, along with program options to
- convert a file from binary format to printable ASCII for use over
- CompuServe or EasyLink and other bulletin boards. Files may be deleted or
- purged. Only 64K is required. Pathnames are fully supported. An option
- is included to demonstrate compliance with the 171 tests required by the
- NBS. Compliance is also checked during program initialization. This
- program is shareware and requires a $30 registration fee for continued use
- after evaluation.
-
- Private.Doc - A full 46-pages of clear, easy to follow instructions on the
- use of The Private Line. A table of contents is provided, in addition to a
- bibliography. The document was printed using WordPerfect 4.2, with page
- length set to 64 lines and with 52 lines of actual text. It is an ASCII
- file.
-
- Msg.Dat - This is a sample file which contains information about The
- Private Line. It also contains the 171 tests required by the National
- Bureau of Standards to insure complaince with the Data Encryption Standard.
-
- Msg.Enc - This is the same file encrypted with the key,
- 7C,A1,10,45,4A,1A,6E,57, using electronic codebook mode without padding.
-
- Version 6.01 fixed a bug in the ECB padding routine.
-
- Version 6.02 added the capability to disable the speaker. Several users
- have voiced their dislike of the beeps each time the program is waiting for
- user input. The default is speaker disabled. The user may enable the
- speaker from the Additional Options Menu and change the default by saving
- the selected options.
-
- Version 6.02 also changed the key to return to the previous menu. In
- previous versions, Control-R was used. Beginning with this version,
- ESCAPE, will back the user out of each operation, except for the List
- Directory option while the directory is being input by the user. This
- change is downward compatible; Control-R continues to work.
-
- Version 6.03 includes the display of the current directory when the program
- is waiting for a file name. The hi-light bar may be moved by using the
- arrow and page up/page down keys. The high-lighted filename may be
- selected by pressing RETURN. The desired filename may still be entered by
- typing it and/or the associated path. If the user begins typing a file
- name, the high-light bar may still be moved, but when RETURN is pressed,
- the filename used is the one entered by the user, not the one under the
- high-light bar. If a filename entered by the user is erased by using the
- backspace key, then the filename under the high-light bar may once again be
- selected by pressing RETURN.
-
- Version 6.04 increased the number of filenames from 10 to 50 which are
- displayed when the program is waiting for a filename to be entered by the
- user. Version 6.04 also added the use of hexidecimal keys from the command
- line.
-
- Version 6.05 corrected a bug found in the non EGA environment.
-
- Version 6.06 corrected a bug found in the CGA environment.
-
- Version 7.0 added screen memory write routines for the master and additional
- option menus, the opening and closing screens, the directory display and for
- the screens from which the filenames contained on the current directory are
- displayed.
-
- Version 7.01 corrected an error in the CBC short block decryption routine.
-
- Version 7.02 corrected errors in the short block decryption routine.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-