home *** CD-ROM | disk | FTP | other *** search
- ECHO OFF
- CLS
- ECHO IRIS Demonstration
- ECHO ------------------
- ECHO.
- ECHO IRIS provides the MS-DOS user with access to commercial cryptographic
- ECHO techniques such as high-speed DES encryption for securing large amounts
- ECHO of data, the elegant RSA public key system, which has special properties
- ECHO which lend it to the task of distributing keys in a large network, and
- ECHO MAC calculation, useful for authentication.
- ECHO.
- PAUSE
- CLS
- ECHO IRIS file Encryption and Decryption
- ECHO -----------------------------------
- ECHO.
- ECHO Encryption is performed by applying a particular encryption 'ALGORITHM'
- ECHO and a user selected 'KEY' to the MS-DOS file which is to be secured.
- ECHO This process results in the MS-DOS file being completely unusable by
- ECHO anyone who does not have knowledge of the KEY employed.
- ECHO.
- ECHO Decryption is essentially the reverse of the above, and results in the
- ECHO MS-DOS file being usable again.
- ECHO.
- ECHO Keys may be entered from the command line or may be stored in 'KEYFILES'.
- ECHO.
- PAUSE
- CLS
- ECHO To demonstrate the above, we will encrypt the following file:
- ECHO.
- TYPE ozy.txt
- ECHO.
- PAUSE
- CLS
- ECHO Now we will ENCRYPT the file ...
- ECHO.
- iris cipher /function=encrypt /file=ozy.txt /keyv=1c-23-ea-f7-91-8f-91-d5
- ECHO.
- PAUSE
- CLS
- ECHO The MS-DOS file is now encrypted and looks like this:
- ECHO.
- ECHO -------------------------------------------------------------------------
- TYPE ozy.txt
- ECHO.
- ECHO -------------------------------------------------------------------------
- ECHO.
- PAUSE
- CLS
- ECHO Now we will DECRYPT the file ...
- ECHO.
- iris cipher /function=decrypt /file=ozy.txt /keyv=1c-23-ea-f7-91-8f-91-d5
- ECHO.
- PAUSE
- CLS
- ECHO The (encrypted) MS-DOS file has been decrypted:
- ECHO.
- TYPE ozy.txt
- ECHO.
- PAUSE
- CLS
- ECHO The shortest and simplest form of the encrypt/decrypt command is:
- ECHO.
- ECHO IRIS CIPHER /FILENAME=filename /FUNCTION=ENCRYPT /KEYVALUE=keyphrase
- ECHO IRIS CIPHER /FILENAME=filename /FUNCTION=DECRYPT /KEYVALUE=keyphrase
- ECHO.
- ECHO Be sure to remember the key value used, there is no way back without it !
- ECHO.
- PAUSE
- CLS
- ECHO IRIS Message Authentication (MAC generation)
- ECHO --------------------------------------------
- ECHO.
- ECHO The principle usage of MAC's are for inter-bank financial message exchange
- ECHO where the the bank counter-parties will exchange a secret DES key, and then
- ECHO exchange messages accompanied by a MAC code computed using the secret key.
- ECHO The receiving bank will re-compute the MAC from the file received and the
- ECHO secret key, and if the received MAC matches the computed MAC, then the file
- ECHO is deemed to be authentic.
- ECHO.
- PAUSE
- CLS
- ECHO To demonstrate the principles of Message Authentication, consider the
- ECHO following 'SWIFT' format payment message:
- ECHO.
- TYPE swift.msg
- ECHO.
- PAUSE
- CLS
- ECHO Now we will generate a MAC for this message ...
- ECHO.
- iris mac /file=swift.msg /keyv=1c-23-ea-f7-91-8f-91-d5 /iv=1a-2b-3c-4d-5f-6a-7b-8c
- ECHO.
- ECHO The MAC generated is dependant on the message content, the DES keyvalue
- ECHO and the DES IV (initialization vector). If any of these variables change,
- ECHO then the generated MAC will also change.
- ECHO.
- ECHO ---- Demonstration complete ----