home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
17 Bit Software 6: Level 6
/
17 Bit - Level 6 (1998)(Epic Marketing)[!].iso
/
quartz
/
q1171.dms
/
q1171.adf
/
Perplexity
/
Perplexity.Doc
< prev
next >
Wrap
Text File
|
1997-04-10
|
6KB
|
160 lines
Perplexity V0.99 Document
-------------------------
An Encryptor
With more combinations than there are known quarks in the universe!
Essence Developments
Copyright © 1995/1996 Imdad Shah
All Rights Reserved
Disclaimer
----------
While Perplexity has proven stable and problem free, the standard
disclaimer applies; no warranty is expressed or implied, and the author
shall not be liable for any damages or claims that arise from the
usage of this program.
You are entirely responsible at your own risk for all things sustained
by the legal use or misuse.
Distribution
------------
Perplexity is freely distributable. However, the binary and
documentation files must be distributed together in their unaltered
form.
What is Perplexity?
-------------------
Perplexity is a encryption program that (surprise, surprise) encrypts
files so that no one else can attainment access to your valuable and
highly confidential information (if you have any).
Now you may be thinking, well what is so good about Perplexity compared
to my super duper FBI-CIA-MI5-ABC version 6502.097+ encryption program
(that is if you have one). Well nothing really. This is just another
sad attempt to provide an encryption program. This program like most
encryptors uses a key to encrypt and decrypt data.
A key (for any one that is unsure what one is) is data that is used in
conjunction with your file (that is to be encrypted) to produce it
into a file that has been altered so that it is unreadable or not
executable. To Decode the file you will need the key which will change
it back to the original file.
The difference here, is that a key file is used to encrypt the data.
Normally a key is a secret code or password which encrypts the data,
this usually is in the form of a 32 bit number (4 billion
combinations!) but keys can range over 128 bits!
As mentioned earlier you can have any key. This key takes the form of
a file, any file so you can have as your key a ASCII file, a
IFF/JPEG/picture, your latest music module,imagine object, sound
samples of your voice, put it this way ANY file (memory permitting).
Usage:
The executable file has been called "CODER" instead of Perplexity,
because it is easier to type!
CLI usage only at the moment!
To encrypt a file use:
Coder MyData MyKeyFile MyProcessedData
Where MyData is the name of the source file, MyKeyFile is the name of
the key file, and MyProcessedData is the name of the processed
destination file.
To decrypt a previously encrypted file use:
Coder MyProcessedData MyKeyFile MyData
The same Keyfile *must* be used for the Encryption/Decryption process,
to decode the file otherwise... So do NOT loose or even change a
single bit in the key file.
Please note, the bigger the size of the key, the better the encryption
process works and this directly effects the number of different
combinations there are for the decoding process.
Please ensure that the keyfile is at least 8 bytes in length.
***********************************************************************
If you are a seasoned hacker, and are at this point thinking, this one
looks easy to crack. Then here is a challenge for you!
I have included a file in the archive called "CrackMe", feel free to
attempt to decrypt the file at your own peril.
If you do crack it (yeah) then why not contact me and let me know of
your findings. Proof will be required, so grab yourself a super
computer (or just an Amiga) and fire away.
If you need further clues as to the files identity and such like, let
it be known to me.
***********************************************************************
History
-------
18th July 1995
First version, completed on this date and fully working.
30th January 1996
============
Version 0.99
============
This is the first release. Animals mark their tertiaries with scent, I
don't! think that is necessary here
This is a complete version, however no error checking has been
included, but if used properly this will not make a difference. I
promise, the next version will be nicer!
Credits
-------
Program and Design - Imdad H. Shah
Documentation - Imran H. Rehman (sad man) :-(
Imdad H. Shah
Ideas - Jhangeir Akhtar (of File-Wizard fame)
Editing and Comments - No time for that at the moment
but the Moon can take the credit!
If in doubt - try not to be!
Contact
-------
Please send in bug reports, any suggestions, chit chat, gossip, Fridge
freezers, Spoons, Dishes, Snow flakes, Feathers, Water (distilled
only), Magnets, Postcards, $$$ Money £££, or anything else to:
Imdad Shah
4 Lloyd Street
Small Heath
Birmingham
B10 OLH
England
OR Phone 0956 649 075 anytime... (Except dawn)
From outside the UK +44 956 649 075