home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-01-15 | 42.4 KB | 1,133 lines |
-
-
-
-
-
-
-
-
-
- CryptoAnalyzer Version 1.0
-
- Copyright (c) 1993
- All Rights Reserved
-
- by
-
- William Ned Miller
-
- 7504 Saffron Court
- Hanover MD 21076
- (410) 766-2365
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Section Page
-
- 1.0 Introduction ............................................... 1
- 1.1 Document Layout ......................................... 2
-
- 2.0 System Requirements ........................................ 3
- 2.1 Hardware Requirements ................................... 3
- 2.2 Video Adapters .......................................... 3
- 2.3 Operating System Limitations ............................ 3
-
- 3.0 Installation ............................................... 4
-
- 4.0 Program Options ............................................ 5
- 4.1 Substitution Helper ..................................... 5
- 4.2 Substitution ............................................ 7
- 4.2.1 Encipher ........................................... 8
- 4.2.2 Encipher with Keyword .............................. 10
- 4.2.3 Decipher with Keyword .............................. 11
- 4.3 Railfence ............................................... 12
- 4.3.1 Encipher ........................................... 13
- 4.3.2 Decipher ........................................... 15
- 4.3.3 Decipher Helper .................................... 15
-
- 5.0 Licensing .................................................. 16
-
- 6.0 Disclaimer ................................................. 17
-
- 7.0 Where CryptoAnalyzer Can Be Found .......................... 18
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- - i -
- 1.0 Introduction
-
- CryptoAnalyzer, CRY, is a program to aid the user in the solving of
- cryptograms. Not only is CRY an aid but it will also allow the user to
- easily create their own cryptograms. This version of the program will aid
- the user in solving substitution and railfence type cryptograms but future
- release of the program will contain additional methods. There are many
- features to CryptoAnalyzer the following lists a few:
-
- 1) Text entered under one option will be carried over to another.
- This way the user will not have to re-enter data when going
- from one method to another.
-
- 2) Text listed in the lower window, when the F1 key has been
- pressed, can be dump to a user defined file.
-
- 3) The simple substitution helper will save the user a lot of
- erasers and rubbed out paper when this type of cryptogram
- is being solved.
-
- The following display will be presented to the user when CRY is
- executed.
-
- +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
- | |
- | 1. Substitution Helper |
- | 2. Substitution |
- | 3. Railfence |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- +-------------------------------------------------------------------------+
- | F10=Exit|
- |----------------$8.50 Shareware Contribution Requested-------------------+
-
- Pressing the "1" key will enter the "Substitution Helper", "2" will
- enter "Substitution" and "3" will enter "Railfence" encipher and decipher
- options. Pressing the F10 function from this window will exit CryptoAnalyzer
- and leave the user at the point where CRY was executed.
-
- CryptoAnalyzer was developed in the programming language Ada.
-
-
- - 1 -
- 1.1 Document Layout
-
- The remainder of this document is as follows:
-
- Chapter 2 - System Requirements
-
- Chapter 3 - Installation Procedures
-
- Chapter 4 - Program Options
-
- Chapter 5 - Licensing
-
- Chapter 6 - Disclaimer
-
- Chapter 7 - Where CryptoAnalyzer Can Be Found
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- - 2 -
- 2.0 System Requirements
-
- This chapter describes system requirements necessary to execute
- CryptoAnalyzer
-
-
- 2.1 Hardware Requirements
-
- CryptoAnalyzer is compatible with the XT, AT, PS2 models and other 100%
- compatible systems.
-
-
- 2.2 Video Adapters
-
- CryptoAnalyzer will operate with all type of video adapters. It has
- been designed and tested with Monochrome, EGA, CGA and VGA adapters.
-
-
- 2.3 Operating System Limitations
-
- CryptoAnalyzer has been designed to execute on systems with DOS versions
- 3.00 through 5.00.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- - 3 -
- 3.0 Installation Procedures
-
- The following procedures allow new users to easily install
- CryptoAnalyzer on their system. The following procedures make the assumption
- that you have a hard disk as drive "c", boot from that drive and will be
- using "CRY" as the directory for the program.
-
- 1. Make a subdirectory "CRY" under the "C:\" (root) directory.
- mkdir cry
-
- 2. Copy all CRY files to this new "C:\CRY" directory.
- copy *.* c:\cry
-
- 3. Type "cry" at the DOS prompt
- cd dry
- cry
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- - 4 -
- 4.0 Program Options
-
- This chapter will explain each of the options available with the
- CryptoAnalyzer program.
-
- 4.1 Substitution Helper
-
- Choosing this option from the main menu will aid the user in solving
- substitution cryptograms. Upon selection the following will be presented to
- the user:
-
-
- +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
- | |
- | |
- | Enter Cipher Text |
- | +---------------------------------------------------------------------+ |
- | |Now is the time | |
- | |for all good | |
- | |men to come | |
- | |to the | |
- | |aid | |
- | |of their country. | |
- | +---------------------------------------------------------------------+ |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- +-------------------------------------------------------------------------+
- | F10=Stop Editing|
- +-------------------------------------------------------------------------+
-
-
- At this point, the user enter in the cipher text that is to be
- deciphered. Once all of the text has been entered, press the F10 function
- key to stop the editing process and enter the substitution helper. The
- following will be displayed:
-
-
- NOTE
-
- Plain or cipher text entered on one screen will be retained and be
- accessible on another.
-
-
- - 5 -
-
- +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
- | |
- | Cipher=ABCDEFGHIJKLMNOPQRSTUVWXYZ Cipher Letter _ |
- | Enter Plain Text Plain =-------------------------- Plain Letter |
- | +---------------------------------------------------------------------+ |
- | |Now is the time | |
- | |for all good | |
- | |men to come | |
- | |to the | |
- | |aid | |
- | |of their country. | |
- | +---------------------------------------------------------------------+ |
- | |
- | --- -- --- ---- |
- | --- --- ---- |
- | --- -- ---- |
- | -- --- |
- | --- |
- | -- ----- -------. |
- | |
- | |
- |A= 2 C= 2 E= 6 G= 1 I= 4 K= M= 3 O= 9 Q= S= 2 U= 1 W= Y= 1|
- |B= D= 2 F= 2 H= 3 J= L= 2 N= 3 P= R= 3 T= 7 V= X= Z= 1|
- +-------------------------------------------------------------------------+
- | F10=Exit|
- +-------------------------------------------------------------------------+
-
- This window will be all that is needed to solve a cryptogram that uses
- simple substitution. The window contains a number of fields that will aid
- the user in solving a cryptogram.
-
- 1) The top part of the window contains the mapping from cipher text to
- plain text.
-
- 2) The bottom of the window will contain a frequency count of each
- letter in the cryptogram. This may aid the user in determining the
- more frequent letters used in the english language.
-
- 3) Just under the cipher text will be where the plain text will be
- displayed. At first, the plain text will be displayed as '-'. As
- a cipher letter is mapped to a plain letter the mapping will be
- displayed.
-
- 4) At the top right will be the user's input fields that are used to
- enter a cipher letter and a plain text letter. When these two
- fields are filled in, a mapping from cipher to plain text will be
- performed and the various portions of the window will be updated
- to reflect the users input. The following are a few examples that
- may be entered:
-
-
-
- - 6 -
- Cipher Letter: A
- Plain Letter: B
-
- In this example the program will map the letter "A" to the letter "B".
- In the plain text area the letter "B" will be displayed corresponding to the
- letter "A" that is in the cipher text area. The cipher to plain mapping at
- the top of the window will be updated to reflect the input.
-
- Cipher Letter: A
- Plain Letter: -
-
- In this example the program will erase the mapping of the letter "A" to
- the letter "B". This will be reflected in the cipher to plain text mapping
- and also in the plain text area.
-
-
- 4.2 Substitution
-
- Choosing this option from the main menu will aid the user in enciphering
- and deciphering substitution cryptograms. Upon selection the following will
- be presented to the user:
-
-
- +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
- | |
- | |
- | 1. Encipher |
- | 2. Encipher With Keyword |
- | 3. Decipher With Keyword |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- +-------------------------------------------------------------------------+
- | F10=Main Menu|
- +-------------------------------------------------------------------------+
-
-
-
-
-
-
- - 7 -
- 4.2.1 Encipher
-
- Choosing the "Encipher" option from the main menu will aid the user in
- enciphering substitution cryptograms. Upon selection, the following will be
- presented to the user:
-
-
- +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
- | |
- | |
- | Enter Plain Text |
- | +---------------------------------------------------------------------+ |
- | |Now is the time | |
- | |for all good | |
- | |men to come | |
- | |to the | |
- | |aid | |
- | |of their country. | |
- | +---------------------------------------------------------------------+ |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- +-------------------------------------------------------------------------+
- | F10=Stop Editing|
- +-------------------------------------------------------------------------+
-
-
- At this point, the user enters in the plain text that is to be
- enciphered. Once all of the text has been entered, press the F10 function
- key to stop the editing process and enter the enciphering process. The
- following will be displayed:
-
-
-
-
-
-
-
-
-
-
-
-
-
- - 8 -
- +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
- | |
- | Enter Plain Text |
- | +---------------------------------------------------------------------+ |
- | |Now is the time | |
- | |for all good | |
- | |men to come | |
- | |to the | |
- | |aid | |
- | |of their country. | |
- | +---------------------------------------------------------------------+ |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- +-------------------------------------------------------------------------+
- |F1=Process F2=Cipher F9=File F10=Exit|
- +-------------------------------------------------------------------------+
-
- At this point there are two options. The "Cipher" options, by pressing
- F2, will allow the user to create a cryptogram by choosing their own
- substitution letters. The following will be presented to the user:
-
- +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
- | |
- | Enter Plain Text |
- | +---------------------------------------------------------------------+ |
- | |Now is the time | |
- | |for all good | |
- | |men to come | |
- | |to the | |
- | |aid | |
- | |of their country. | |
- | +---------------------------------------------------------------------+ |
- | |
- | Plain =ABCDEFGHIJKLMNOPQRSTUVWXYZ |
- | Cipher =-------------------------- |
- | |
- | Plain _ |
- | Cipher |
- | |
- | |
- | |
- +-------------------------------------------------------------------------+
- |F1=Process F2=Cipher F10=Exit|
- +-------------------------------------------------------------------------+
-
-
- - 9 -
- The user can choose their own substitution letter by letter. First a
- plain text letter and then a cipher letter. As the letters are entered, the
- mapping will be displayed above the user entry fields. Once all of the
- letters have been mapped, choosing the "Process" option, F1, the ciphered
- text will be generated and displayed.
-
- After the F1 key has been pressed and the cryptogram created, the F9
- function key can be used to dump the text to a file. The user will be given
- the chance to choose their own output file or the default 'crypto.txt' can be
- used. Once the file name has been chosen pressing the enter will cause the
- file to be created in the current directory. Pressing the 'ESC' key will
- cancel the file output option.
-
-
- 4.2.2 Encipher with Keyword
-
- Choosing the "Encipher with Keyword" option from the substitution menu
- will aid the user in enciphering substitution cryptograms. The user will be
- presented with a window in which to enter the plain text. Once the plain
- text has been entered and the F10 key pressed, the user is ready to create
- the cipher text. The following will be displayed for the user:
-
-
- +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
- | |
- | Shift: _ |
- | Enter Plain Text Keyword: |
- | +---------------------------------------------------------------------+ |
- | |Now is the time | |
- | |for all good | |
- | |men to come | |
- | |to come to | |
- | |aid | |
- | |of their country. | |
- | +---------------------------------------------------------------------+ |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- +-------------------------------------------------------------------------+
- |F1=Process F2=Shift F3=Keyword F10=Exit|
- +-------------------------------------------------------------------------+
-
-
-
- - 10 -
- Enciphering a substitution with this option requires the user to enter
- a keyword and a shift value. If no keyword or shift values are provided then
- the ciphered text will be the same as the plain text.
-
- 1) Keyword - Pressing the F3 function key will place the cursor on this
- field. The key must contain the letters "A-Z". This is
- usually a common word.
-
- 2) Shift - Pressing the F2 function key will place the cursor on this
- field. This is an integer value between 0 and 26. This
- indicate how much to shift the keyword and the rest of
- the alphabet to create the cipher map. A value of zero
- indicates that the alphabet is NOT to be shifted.
-
- The following is a few examples using a keyword and a shift value:
-
- 1) Keyword = MILLER
- Shift = 0
-
- Plain =ABCDEFGHIJKLMNOPQRSTUVWXYZ
- Cipher=MILERABCDFGHJKNOPQSTUVWXYZ
-
- In this example not much substitution will take place just where the
- keyword is enter into the equation. The shift value of '0' did not
- cause a shift in the cipher alphabet.
-
- 2) Keyword = MILLER
- Shift = 25
-
- Plain =ABCDEFGHIJKLMNOPQRSTUVWXYZ
- Cipher=ZMILERABCDFGHJKNOPQSTUVWXY
-
- In this example 25 out of 26 letter letters were substituted. The
- letter "e" happens to map back to the letter "e". If the shift had
- been another value no letter would map back onto itself. Notice how
- the second 'L' in 'MILLER' has been remove from the keyword.
-
- Once the cipher alphabet has been created, pressing the F1 function key
- will create the cryptogram from this alphabet. It will be display in the
- lower half of the window.
-
- 4.2.3 Decipher with Keyword
-
- Choosing the "Decipher with Keyword" option from the substitution menu
- will aid the user in deciphering substitution cryptograms. The user will be
- presented with a window in which to enter the cipher text. Once the cipher
- text has been entered and the F10 key pressed, the user is ready to recreate
- the plain text. The procedures to recreate the plain text are the same as
- described in the previous section. Remember the user must know the keyword
- and shift value in order for the plain text to be reconstructed. If these
- values are not known then using the "substitution helper" will aid in the
- reconstruction.
-
- - 11 -
- 4.3 Railfence
-
- Choosing this option from the main menu will aid the user in enciphering
- and deciphering railfence cryptograms. Upon selection, the following will be
- presented to the user:
-
-
- +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
- | |
- | |
- | 1. Encipher |
- | 2. Decipher |
- | 3. Decipher Helper |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- +-------------------------------------------------------------------------+
- | F10=Main Menu|
- +-------------------------------------------------------------------------+
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- - 12 -
- 4.3.1 Encipher
-
- Choosing the "Encipher" option from the Railfence menu will aid the user
- in enciphering railfence cryptograms. Upon selection the following will be
- presented to the user:
-
-
- +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
- | |
- | |
- | Enter Plain Text |
- | +---------------------------------------------------------------------+ |
- | |Now is the time | |
- | |for all good | |
- | |men to come | |
- | |to the | |
- | |aid | |
- | |of their country. | |
- | +---------------------------------------------------------------------+ |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- +-------------------------------------------------------------------------+
- | F10=Stop Editing|
- +-------------------------------------------------------------------------+
-
-
- At this point the user enters in the plain text that is to be enciphered.
- Once all of the text has been entered, press the F10 function key to stop the
- editing process and enter the enciphering process. The following will be
- displayed:
-
-
-
-
-
-
-
-
-
-
-
-
-
- - 13 -
- +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
- | |
- | Enter Plain Text Height = |
- | +---------------------------------------------------------------------+ |
- | |Now is the time | |
- | |for all good | |
- | |men to come | |
- | |to the | |
- | |aid | |
- | |of their country. | |
- | +---------------------------------------------------------------------+ |
- | |
- | |
- | |
- | |
- | |
- | |
- | |
- +-------------------------------------------------------------------------+
- |F1=Process F2=Height F9=File F10=Exit|
- +-------------------------------------------------------------------------+
-
- At this point there are two options. The "Height" options, by pressing
- F2, will allow the user to choose a height for their rails. After entering
- a height, press the F1 function key to produce the cryptogram. The following
- will be presented to the user:
-
- +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
- | |
- | Enter Plain Text Height = 5 |
- | +---------------------------------------------------------------------+ |
- | |Now is the time | |
- | |for all good | |
- | |men to come | |
- | |to the | |
- | |aid | |
- | |of their country. | |
- | +---------------------------------------------------------------------+ |
- | |
- | +---------------------------------------------------------------------+ |
- | |NTLNO FUOEI ALETT TOTON WHMRG MOEHD HCTIT EOODC MEIER RSFOO AIY | |
- | | | |
- | | | |
- | | | |
- | | | |
- | | | |
- | +---------------------------------------------------------------------+ |
- | |
- +-------------------------------------------------------------------------+
- |F1=Process F2=Height F9=File F10=Exit|
- +-------------------------------------------------------------------------+
-
-
- - 14 -
- 4.3.2 Decipher
-
- Choosing the "Decipher" option from the main menu will aid the user in
- deciphering railfence cryptograms. The processing and parameters are the
- same as in enciphering a railfence cryptogram.
-
-
- 4.3.3 Decipher Helper
-
- Choosing the "Decipher Helper" option from the main menu will aid the
- user in deciphering railfence cryptograms. Once the text has been entered
- and the F1 function key has been pressed, the following will be presented to
- the user:
-
-
- +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
- | Up: ^ |
- | Enter Plain Text Down: v Height: 5 |
- | +---------------------------------------------------------------------+ |
- | |Now is the time | |
- | |for all good | |
- | |men to come | |
- | |to the | |
- | |aid | |
- | |of their country. | |
- | +---------------------------------------------------------------------+ |
- | |
- | +---------------------------------------------------------------------+ |
- | |NTLNO FUOEI ALETT TOTON WHMRG MOEHD HCTIT EOODC MEIER RSFOO AIY | |
- | | | |
- | | | |
- | | | |
- | | | |
- | | | |
- | +---------------------------------------------------------------------+ |
- | |
- +-------------------------------------------------------------------------+
- |F1=Process F9=File F10=Exit|
- +-------------------------------------------------------------------------+
-
- Using the up and down arrow keys, the user will be able to go through
- heights ranging from 3 to 20. The plain text will be displayed in the lower
- window.
-
-
-
-
-
-
-
-
-
-
- - 15 -
- 5.0 Licensing
-
- * A $8.50 shareware contribution is requested for using the
- program.
- * The author retains the sole right to sell the program.
- * The author grants users the right to copy and distribute
- the program within the following constraints:
- - All program files remain unaltered and are distributed
- together.
- - No attempt is made to sell the program, or to make
- money from it or any modified version of it.
- - The program is not bundled with any other hardware or
- software transactions without the author's permission.
- - Only the original "non-cloned" version of the program
- with the startup time delay is distributed.
- - Recognized user groups may charge a maximum $7
- duplication or distribution fee.
- * Continued use of the program (more than 3 weeks) by any
- individual, corporation or institution without a single
- user or site license is prohibited.
- * Single user licenses are obtained by sending in the $8.50
- shareware contribution.
- * User that send in the requested contribution will receive
- instructions on how to remove the shareware request and
- insert their own name and registration number.
- * Once CryptoAnalyzer has been registered the registration
- follows the program for all future releases of the
- program.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- - 16 -
- 6.0 Disclaimer
-
- The author disclaims all warranties expressed or implied as to the
- quality or performance of this program. The author will not be held liable
- for any lost profits, lost savings or any other direct, indirect,
- incidental or consequential damages resulting from the use of this program.
- Your use of this program constitutes your agreement to this disclaimer and
- your release of the author from any form of liability or litigation.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- - 17 -
- 7.0 Where CryptoAnalyzer Can Be Found
-
- The latest version of CryptoAnalyzer and other products developed by
- this author can be found on the following BBS:
-
- The Programmer's Corner
- Columbia Maryland
-
- 301-596-7692 through 7697
- 301-995-6873 through 6877
- 301-621-3424 and 3436
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- - 18 -
- CryptoAnalyzer Version 1.0
- Copyright (c) 1993
- All Rights Reserved
-
- William Ned Miller
- 7504 Saffron Court
- Hanover MD 21076
- (410) 766-2365
-
-
- Registration Form
-
- Registration Provides:
-
- 1) Notification of the next release of CryptoAnalyzer.
- 2) Instructions on how to remove the shareware contribution request
- and insert the users name and registration number. Registration
- follows all future release of the program.
-
- To register your copy of CryptoAnalyzer please fill in the following
- information and send it along with $8.50 (US) to:
-
- William Ned Miller { Please only send }
- 7504 Saffron Court { checks drawn on }
- Hanover MD 21076 { U.S. banks or }
- { postal money }
- { orders. }
-
- Name: ____________________________________________________________
-
-
- Address: _________________________________________________________
-
- __________________________________________________________________
-
-
- Phone: (Optional) ( )______-__________________________________
-
-
- Where Did You Get CryptoAnalyzer _________________________________
-
- __________________________________________________________________
-
- Comments: ________________________________________________________
-
- __________________________________________________________________
-
- __________________________________________________________________
-
- __________________________________________________________________
-
- __________________________________________________________________