home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
High Voltage Shareware
/
high1.zip
/
high1
/
DIR3
/
EN29A_2.ZIP
/
EN29A.DOC
< prev
next >
Wrap
Text File
|
1993-12-28
|
5KB
|
105 lines
** Encrypt 29A - File Encryption Utility **
(c) NES/Theo Van Dinter/Bill Smith 1993
This program was developed as Shareware by Nor'Easter Software which
is a small software programming group which mostly makes utilities for
Bulletin Boards, and other small utilities which don't already exist to do
something which we need done. Nor'Easter software is made up of:
Theo Van Dinter : Sysop of the GS Connection BBS (1)
William Smith : Sysop of the GS Connection BBS (2)
Lucas Ives : Co-Sysop of the GS Connection BBS
-------------------------------------------------------------------------------
I wrote this program because I've always been interested in encryption, and
while I was trying to figure out the ultimate compression utility (which I
have concluded can't be done the way I want to), I found a very interesting
way to encrypt things.
This program uses these various algorithms (routines to figure out data...)
to make the data virtually untouchable. The password that you select is the
only password that will be able to decrypt the file. If you lose this code,
no one will be able to get to the data. Note: All encryption programs are
open to something called the "Brute force" method. This basically means that
if someone was really determined, they can try to enter every password possible
until the right one is found. However, as the length of the password is
increased, the time it takes to find the correct one is increased
exponentially. (excerpt from old research paper I did):
Number of characters Possible Combinations Time to Solve
~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~
1 36 6 minutes
2 1300 4 hours
3 47000 5 days
4 1700000 6 months
5 60000000 19 years
6 2000000000 630 years
7 78000000000 25000 years
8 2.8 * 10^12 890000 years
9 1.0 * 10^14 32000000 years
10 3.7 * 10^15 1200000000 years
The combinations were found assuming that you only use the lowercase letters
(a through z) and the 10 numbers (0 through 9), and the person is trying a
different combination every 10 seconds. Using roughly the same restrictions
(the try per 10 seconds is VERY conservative).
How chosen Example Possible Combinations Time to Solve
~~~~~~~~~~ ~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~
Name (Short/Long) al/charlotte 2000 5 hours
Word (Short/Long) a/xylophone 60000 7 days
2 words together dogcat 3.6 * 10^9 1140 years
Mix of initials and atas02ctw08 3.7 * 10^15 1.2 * 10^9 yrs
dates
First line of poem maryhadalittle- 1.0 * 10^28 3.0 * 10^21 yrs
lamb
First 2 letters of mahaalila 1.0 * 10^14 3.2 * 10^6 yrs
first line of poem
These figures are all approximate, and some are averaged. As you can tell,
if you pick a password that you can easily remember, but is midrange to long
in size, the time to find the password is MUCH more then the data is probably
worth.
To run this program, you just need double the space of the file, on your
disk. The program will not check, so you must make sure you have the space,
or else you will lose the end of the file (equal in the number bytes of the
space you didn't have). (ie: file is 260k, you have 259k free, you lose 1k.)
The program will also check itself (simply) to make sure the program wasn't
changed by an "outside force." If it was, you will be notified that the
program was changed, and where to get another copy of it (via modem).
For operational parameters, please run the program with no commandline
parameters. It is self-explanitory from there.
LAWYER TYPE TECHNICAL STUFF -
Neither Nor'Easter Software or any member of Nor'Easter Software is to
be held accountable for any damage created by this program. Users download
files at their OWN discretion, and by reading this documentation agree to the
terms within the archive. All Nor'Easter Software programs are tested for
safety before they are released, but we can't test every possible situation.
TIME RATING:
On a 486dx/50: Text file with file size 729,118 bytes took 24 seconds.
WHATSNEW:
Version 1.0:
Never actually released. Used the same algorithms, but had another
8 digit CRC code that was also needed to decrypt the file.
Version 2.0: 12/27/93
Updated on trip to New York. Stripped over 10k of code from the
program. It's down to about 14k now. The routine has taken out
about 300 bytes from the encrypted file (removed most false information
to confuse hackers). New "psuedo-cache" routine reads in 32,000 bytes
into memory before en/decrypting.