home *** CD-ROM | disk | FTP | other *** search
-
- ## ## ###
- ## ## ##
- ## ## #### ## ### #### ## ## ## #### #####
- ###### ## ## ### ## ## ## ## ## ## ## ## ##
- ## ## ###### ## ## ## ## ## ## ###### ####
- ## ## ## ## ## ## ## ## ## ## ##
- ## ## #### #### #### ### ## #### #### ##### ver. 1.6
-
-
- -=============================================================================-
- REMEMBER: " When you work with cryptography and you don't know what you do, you
- always get in to troubles. "
- B. Schneier
- -=============================================================================-
-
- So, please, take few seconds to read this file, I've try to make this READ.ME
- simple and short.
-
-
- ----------------
- HERCULES PURPOSE
- ----------------
-
- Hide your secrets (images, documents ...)
- Usefull when you make CD and want to store your data in the safe way.
-
- ----------------------------------
- HARDWARE AND SOFTWARE REQUIREMENTS
- ----------------------------------
-
- Program has been tested and works under :
-
- * DOS 6.22
- * Os/2 3.0 (Warp) (os2 and dos suite)
-
- Any PC from 386sx it'ok, of course on Pentium the performances
- are great.
-
- Other Operative System:
-
- * NT : well I've used Watcom to compile Hercules so I've made also
- an NT executable, I don't use NT so Hercules has not been
- tested under this SO. If you notice problems, just follow
- instruction in "BUG(s) AND HINTS" section.
-
- * W95: I'm sorry, my Watcom 10.0a can't compile for W95, I've not
- money enough to buy Watcom 10.5 and build a native W95 version
- of Hercules.
-
- * Unix/Linux: Well I've plan Hercules to work, also under Unix (SunOs and
- Solaris) and Linux, but not now. I must know if Hercules will
- be usefull to comunity.
-
- --------------
- HERCULES USAGE
- --------------
-
- ERCOLE written by MiV, 1996
- Ver 1.5ß Rel:262.1088 Ser: (none)
-
- Usage: ercole <option> <files> <dir>
- <option>:
- -l: list directory.
- -e,-d: encrypt, decrypt.
- -v[2|3|4]: destroy a file with method 2,3 or 4.
- -e3,-d3: triple encription, triple decryption (*).
- -ev: encrypt and ethernally destroy plain files.
- -e3v: triple encrypt and destroy original (*).
- <files>:
- files you want to crypt or decrypt (wildcards are ok).
- <dir>:
- destination directory.
- (*): not yet implemented.
-
-
-
- Examples:
- ercole -l . (list current directory)
- ercole -e *.* . (encrypt all file in the current directory)
- ercole -d *.* . (decrypt all file in the current directory)
- ercole -v *.* (light delete all file in the currend directory)
- ercole -v4 *.* (ethernally delete all file in the current directory)
-
-
- -----------------
- HERCULES FEATURES
- -----------------
-
- * CBC IDEA ENCRYPTION
-
- A lot of people know IDEA, but only somebody know what CBC
- means. CBC stands for Cipher Block Chaining.
- Chaining adds a feedback mechanism to a block cipher, in other
- words: each block is used to modify the encryption of the next
- block. Again: it's a tecnique to improve security by
- introducing a feedback while encrypting.
- With CBC two file with the same CRC are encrypted to different
- chiper texts.
-
- * 4096 Kbytes MAXIMUM PASSWORD LENGTH (MD5 Password hashing)
-
- To be able to insert your favourite pass phrase, don't worry
- about letters coincidence of you language, your phrase will
- be hashed, so you won't be able to produce weak passwords.
-
- * 0 Bytes FILES RANDOMIZER
-
- 0 bytes file will be encrypted in completly random file (in
- size and contents), but will be decrypted correctly of course.
- Nobody can say : "It was a zero bytes file", without specifing
- the correct password.
-
- * ENCRYPTED FILENAME RANDOMIZER
-
- File name could avoid a plain text attack, so the will be
- randomized.
- There will be no relation between the plain text file name,
- and the cipher text one.
-
- * ETHERNAL FILE DESTRUCTOR
-
- There are some cases in which you want to encrypt data and
- destroy your original plain text.
- Believe me, when you destroy your file with Hercules your data
- will be really destroyed and ethernally lost.
-
- * DIRECTORY LISTER
-
- Because of your file name are randomized, you must have a way
- to understand the relation with the chiper text and the plain
- text without decrypting all the chiper text.
-
-
- -----------------
- HERCULES WEAKNESS
- -----------------
-
- If IDEA will be dechipered will Hercules be deleted ?
-
- Yes, I've yet considered this opportunity, this will be solved as soon
- as possible by using triple (or more) encryption schemes, or let user
- to choose between a variety of algorithms or better let the user
- write his own algorithm by compiling it in a .DLL in some standard
- way, so it can be linked at run time by Hercules.
-
- -----------------
- AUTHOR TO DO LIST
- -----------------
-
- - Triple Encryption
-
- - More encryption technique (Blowfish and more)
-
- - Uuencoder
-
- - Algorithm specification by .DLL
-
- - File Compression before encryption
-
- ---------------
- BUG(s), HINTS ?
- ---------------
-
- - E-mail to vignali@CE.UniPR.IT, remember to include how to
- reproduce the bug, otherwise: no answer.
-
- - Hints are appreciated, use the same e-mail.
-
- ----------------------
- HERCULES NEW VERSION ?
- ----------------------
-
- http://www.ce.unipr.it/people/students/vignali/hercules.html
-
- -------
- LICENSE
- -------
- If you think to use Hercules just send me a post card from your
- country.
-
- Hercules is COPYRIGHTED but it's FREE, that means YOU CANNOT use
- it for any kind of commercial purpose, and in any commercial
- environment.
- Author cannot be held responsable of any damage physical or
- moral which Hercules could cause, I've make my best efford to
- write a bug free code, but couldn't be enough.
-
- IDEA is patented in U.S. and Europe.
-
-