home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
OS/2 Shareware BBS: Security
/
Security.zip
/
blowfish.zip
/
TODO
< prev
Wrap
Text File
|
1994-08-29
|
2KB
|
46 lines
Things I'd like to do but haven't got the time to do.
─── Password Validation ───────────────────────────────────────────────────────
Validate the password when encrypting by requesting it twice.
Perhaps also encrypt the password and store it with the file. But if there is
a CRC error the password may still be incorrect. Hence two CRCs would be
required. The first to CRC the encrypted file, the second to validate that the
file was correctly decrypted. The password would preferably be encrypted using
the UNIX one-way password encryption Algorithm.
─── Protection against DosKill ────────────────────────────────────────────────
Write to a temporary file, delete the source, and then rename the temporary
file to the destination name (which may be the same as the source name) rather
than simply writing to destination file. Currently the original may be deleted
with no encrypted file being created when the executable is interrupted while
writing the encrypted file replacing the original.
─── Use in-house Subkeys───────────────────────────────────────────────────────
The subkeys are to well known for my liking. I'd like to generate my own.
This could snowball to allow for the specification of different subkeys for
each file. So not only must the correct key be supplied, but also the correct
set of subkeys. The subkeys could
1. default to those in-house subkeys I talked about earlier, with
2. an overriding set of private subkeys stored in the extended attributes
of the executable, overridden by
3. the specification of a file containing the file's subkeys using
environment variables, overridden by
4. the specification of a file via an application parameter that contains
the file's subkeys.
This means there must be some sort of support application that either
(a) takes the subkeys from the keyboard, or (b) reads some sort of ASCII file
and generates the corresponding subkey file.
─── Elevate it to PM ──────────────────────────────────────────────────────────
Is this really a good idea? It'll snowball into some wonderful archiver that
basically does the same as PMZip.
───────────────────────────────────────────────────────────────────────────────