home *** CD-ROM | disk | FTP | other *** search
-
- ___________________________________________________
- / ______ ______________ ______ _______ (__()
- / / ___/ \ / / ___/ __ \ \/ / __ \/_ __/ /
- / / ___/ , \/ / /__/ _ _/\ / ____/ / / /
- / (____/_/ \__/ ___/_/ \_\ /__/_/ /__/ /_
- (_______________________________________________(__()
-
-
- Encrypt - Encryption software for Acorn computers
- =================================================
-
-
- -oOo-
-
- Overview
- Introduction
- Processing files
- Directories
- Options
- Key-shortcuts
- Distribution
-
- -oOo-
-
- Overview
- ========
-
- * Protect your private data
- * Keep files safe from prying eyes
- * Send encrypted e-mail attachments
- * Easy to use
- * Fast
- * Virtually unbreakable encryption
- * No backdoor uncoding methods (PGP)
- * Upto 256 character pass-phrases (2048 bits)
- * Use on any Risc OS 3+ computer and StrongARM compatible
- * Encryption module can be used in other programs
- * Processes entire directories in one simple operation
- * Acorn Interactive-help compliant
-
- Introduction
- ============
-
- Encrypt is a file encryption system that allows you to protect your
- private information and keep it safe from prying eyes. Whether it be
- sensitive business information, personal data, or that game that isn't
- suitable for the kids, Encrypt will allow it to be kept safe.
-
- Encrypt can process both single files and entire directories in one easy
- option and you have the option to choose from two world-renowned encryption
- methods to encrypt your data. Encrypt supports application-to-application
- transfers so you can drag data directly between Encrypt and most
- applications.
-
- Encrypt is designed to be as easy as possible to use, and no knowledge of
- encryption is needed. All you need is a pass-phrase with which Encrypt will
- process the file. You will need this pass-phrase to decode the file - it is
- very nearly impossible to decode the file without it.
-
- Encrypt displays messages through the Acorn Help application, so just
- open this up to get information on any icon, and how to use Encrypt.
-
-
- Processing Files
- ================
-
- To encrypt a file, drag it onto the Encrypt icon on the icon bar, or into
- the main Encrypt window. Enter a pass-phrase, then press return or click
- on the Enter button. You now need to re-enter the same pass-phrase to
- ensure it is correct. Upon typing the correct pass-phrase, Encrypt will
- ungrey the process button and the output icon, allowing you to save. To
- save, drag the output icon wherever you wish to save the file, or press
- the process button, or press return. To alter the saved file's name, use
- the writable icon under the save icon. The process button will save the
- file with the filename in this icon, as will pressing return in either
- icon. If you simply wish to overwrite the original file with the encrypted
- one, just enter the pass-phrase twice and press return.
-
- To decrypt a file, load the encrypted file as above, or double-click the
- file in a filer window. Encrypt will automatically realise that this file
- is to be decrypted and will check which method the file has been encrypted
- with. Enter the pass-phrase just once for decryption and save as above.
- Encrypt will check that the correct pass-phrase has been used. If so, the
- file will be decrypted. If a wrong pass-phrase has been used, you will
- be told, and the file will not be decrypted.
-
-
- Directories
- ===========
-
- Drag the directory whose contents are to be processed to the Encrypt
- window or icon, and select whether you want to encrypt or decrypt the
- directory contents using the radio icons at the right hand side of the
- window Enter a pass-phrase and save exactly as you would a file. Encrypt
- will process the files in the directory with the given pass-phrase.
-
- You can also add individually encryted files to directories full of
- encrypted data, and you can have a directory whose contents are a mixture
- of encrypted files and normal files. The process for these directories is
- explained below.
-
- When encrypting a directory, Encrypt will encrypt all non-encrypted files,
- therefore it is very important that you use the same pass-phrase for all
- files in a directory. If you use a different pass-phrase then the file
- will not decode if you decrypt the directory as a whole, but can
- still be removed individually. As Encrypt now checks pass-phrases on
- decryption, entering the wrong pass-phrase will not garble any files
- inside the directory.
-
- When decrypting a directory, Encrypt will decrypt all previously encrypted
- files, and leave non-encrypted files alone. It is advisable that all the
- encrypted files in a directory have been encrypted with the same
- pass-phrase, so that a single decryption will decrypt them all.
-
-
- Options
- =======
-
- Encrypt has a few configurable options to tailor its behaviour to your
- choices. To access these options click on the Setup button on the right
- hand side of the main window.
-
- All the below icons act immediately. To save the choices you have made,
- click on the save button. To reset the choices to those in the saved file,
- click the reset button.
-
- Hide: Setting this icon replaces the normal text in the pass-phrase box
- with *'s, meaning that no-one can see the pass-phrase you are entering.
- This would be useful in a busy environment, as otherwise someone could
- read the pass-phrase off the screen as you enter it. This option can be
- toggled by pressing <Ctrl-P> whilst the caret is in the pass-phrase
- icon.
-
- Directory warnings: Setting this icon means that Encrypt will warn you
- when processing directories, asking if you really wish to process the
- files in question. Unsetting this icon means that no warnings will be
- produced when you process a directory, and Encrypt will also not warn you
- if you are about to overwrite an original file.
-
- Verify passphrase: Setting this icon means you have to enter the
- passphrase twice when encrypting, so that typing mistakes will not
- result in a wrong passphrase and an irretrievable file. It is
- advised you keep this option switched on.
-
- Encrypt with:
-
- These radio icons allow you to select the encryption protocol that Encrypt
- will use to encrypt files. At present there are two options.
-
- Blowfish: This is the standard method, which combines safe encryption with
- quick operation. You should use this for all but the most sensitive files..
-
- PGP: A more advanced method, with greater overheads. This method produces
- virtually unbreakable files when used with a long pass-phrase, but takes
- longer to process and requires the Acorn version of PGP, available from
- here. <http://web.bham.ac.uk/N.M.Queen/pgp/acorn.html> If you do not
- have PGP, or the filer has not located it, then this icon will be greyed
- out.
-
-
- Key-shortcuts
- =============
-
- Ctrl-S - Toggle hiding of the pass-phrase
- Ctrl-D - Set the Decrypt icon on
- Ctrl-E - Set the Encrypt icon on
- Ctrl-P - Select PGP for encryption
- Ctrl-B - Selects Blowfish for encryption
- Return - Does the same as clicking the process button
-
-
- Distribution and Disclaimer
- ===========================
-
- Encrypt is freely available for use. I cannot be held responsible for any
- loss, damage or otherwise incurred through the use of Encrypt by any
- parties. I retain copyright over the application and its contents, apart
- from the Blowfish module, whose disribution conditions are listed below.
- Encrypt may be distributed by PD libraries, BBS, websites, FTP etc,
- The following points apply to anyone using Encrypt.
-
- 1) Anyone using Encrypt is free to view and alter the source so long
- as it is for their own personal use. Under no circumstances can modified
- versions be released, either under the name Encrypt or another name.
- People may integrate certain routines from the program into their own
- programs. However my permission must be seeked before any program that
- contains any snippets code originating from Encrypt is released.
-
- 2) I must be credited as the author where appropriate, and a link to my
- webpage and e-mail address would appreciated. Any magazine, web-site or
- other point of distribution must under no circumstances imply or give the
- impression that Encrypt is their own product or work.
-
- 3) If being placed on a website, BBS, magazine disk, ftp site, my
- permission should be asked. I'll almost definitely say yes, but I want to
- know how it's being distributed, so I can provide updated copies etc.
- No files are to be deleted, changed, added or renamed, with the single
- exception being a short text file about the BBS/PD library/website from
- where Encrypt was obtained.
-
- 4) The Blowfish module contained in this application was written by
- Gareth McCaughan, contactable via e-mail to gjm11@dpmms.cam.ac.uk or snail
- mail to Peterhouse, Cambridge. Gareth owns the copyright on the Blowfish
- module. You may use this module yourself for any purpose. You may
- distribute the module unaltered providing you do not make money from it.
- You may distribute altered versions provided they (1) still contain
- Gareth's copyright messages, and (2) are clearly indicated as being altered
- versions. You may do anything at all if you have Gareth's permission.
- You may do nothing else with it.
-
- "The algorithm is Bruce Schneier’s. I (Gareth) am unsure what moral and
- legal rights he has, or how many of them he has waived. I (Gareth) do know
- that free availability was one of his primary concerns in
- producing Blowfish. In any case, I (Gareth) request that if you distribute
- this module in any form you credit Schneier with the design of the
- algorithm."
-
- I hold absolute discretion over the interpretation of any of the
- above points.
-
- Don't let these legalities put you off using Encrypt. I am never likely to take
- legal action against anyone about Encrypt, but will do in extreme circumstances.
-
- * Anyone who wishes to be kept informed of updates to Encrypt, please
- mail me.
-
-
- Finally
- =======
-
- * Thanks to:
-
- Mike Enderby of Integrated Systems Technologies (Directory routines)
- <http://www.interpages.co.uk>
- Wonderworks (original Blowfish module)
- <http://www.wonderworks.co.uk>
- Gareth McCaughan (PGP port and newer Blowfish module) - available from:
- <http://web.bham.ac.uk/N.M.Queen/pgp/acorn.html>
- David McCormack (URI-handlers)
- <http://www.atlantic.oaktree.co.uk>
- Alan Gray (Misc. suggestions/snippets)
- <http://www.argonet.co.uk/users/alan.gray>
-
- Also everyone else who gave suggestions and feedback :)
-
- I will be continuously updating Encrypt so send me your suggestions,
- comments or bug-reports and I'll get updating :)
- ______________________________________________________________________________
-
-
- Stephen Sloan
- 169 Southport Road
- Leyland
- Lancashire
- PR5 3LN
- Tel (01257) 451091
- mailto:ssloan@argonet.co.uk
- http://www.argonet.co.uk/users/hsloan
-
- PS: I cannot be held liable for any loss or otherwise caused by using this program - you use it at your own risk.