home *** CD-ROM | disk | FTP | other *** search
/ Night Owl 9 / Night Owl CD-ROM (NOPV9) (Night Owl Publisher) (1993).ISO / 025a / cry_v11.zip / CRY.DOC next >
Text File  |  1993-02-05  |  59KB  |  1,457 lines

  1.  
  2.  
  3.  
  4.  
  5.  
  6.  
  7.  
  8.  
  9.  
  10.                          CryptoAnalyzer Version 1.1
  11.  
  12.                             Copyright (c) 1993
  13.                             All Rights Reserved
  14.  
  15.                                     by
  16.  
  17.                              William Ned Miller
  18.  
  19.                              7504 Saffron Court
  20.                               Hanover MD 21076
  21.                                (410) 766-2365
  22.  
  23.  
  24.  
  25.  
  26.  
  27.  
  28.  
  29.  
  30.  
  31.  
  32.  
  33.  
  34.  
  35.  
  36.  
  37.  
  38.  
  39.  
  40.  
  41.  
  42.  
  43.  
  44.  
  45.  
  46.  
  47.  
  48.  
  49.  
  50.  
  51.  
  52.  
  53.  
  54.  
  55. Section                                                         Page
  56.  
  57. 1.0 Introduction ...............................................  1
  58.    1.1 Document Layout .........................................  2
  59.  
  60. 2.0 System Requirements ........................................  2
  61.    2.1 Hardware Requirements ...................................  2
  62.    2.2 Video Adapters ..........................................  2
  63.    2.3 Operating System Limitations ............................  2
  64.  
  65. 3.0 Installation ...............................................  3
  66.  
  67. 4.0 Program Options ............................................  4
  68.    4.1 Substitution Helper .....................................  4
  69.    4.2 Substitution ............................................  6
  70.       4.2.1 Encipher ...........................................  7
  71.       4.2.2 Encipher with Keyword ..............................  9
  72.       4.2.3 Decipher with Keyword .............................. 10
  73.    4.3 Railfence ............................................... 11
  74.       4.3.1 Encipher ........................................... 11
  75.       4.3.2 Decipher ........................................... 13
  76.       4.3.3 Decipher Helper .................................... 13
  77.    4.4 Playfair ................................................ 14
  78.       4.4.1 Encipher ........................................... 15
  79.       4.4.2 Decipher ........................................... 17
  80.       4.4.3 Helper ............................................. 17
  81.    4.5 Polyalphabetic .......................................... 18
  82.       4.5.1 Encipher ........................................... 19
  83.       4.5.2 Decipher ........................................... 20
  84.       4.5.3 Helper ............................................. 21
  85.  
  86. 5.0 Licensing .................................................. 22
  87.  
  88. 6.0 Disclaimer ................................................. 23
  89.  
  90. 7.0 Where CryptoAnalyzer Can Be Found .......................... 24
  91.  
  92.  
  93.  
  94.  
  95.  
  96.  
  97.  
  98.  
  99.  
  100.  
  101.  
  102.  
  103.  
  104.  
  105.  
  106.  
  107.  
  108.                                - i -
  109. 1.0 Introduction
  110.  
  111.      CryptoAnalyzer, CRY, is a program to aid the user in the solving of
  112. cryptograms.  Not only is CRY an aid but it will also allow the user to
  113. easily create their own cryptograms.  This version of the program will aid
  114. the user in solving substitution, railfence, playfair and polyalphabetic type
  115. cryptograms but future release of the program will contain additional
  116. methods.  There are many features to CryptoAnalyzer the following lists a
  117. few:
  118.  
  119.      1) Text entered under one option will be carried over to another.
  120.         This way the user will not have to re-enter data when going
  121.         from one method to another.
  122.  
  123.      2) Text listed in the lower window, when the F1 key has been
  124.         pressed, can be dump to a user defined file.
  125.  
  126.      3) The simple substitution helper will save the user a lot of
  127.         erasers and rubbed out paper when this type of cryptogram
  128.         is being solved.
  129.  
  130.      The following display will be presented to the user when CRY is
  131. executed.
  132.  
  133. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  134. |                                                                         |
  135. | 1. Substitution Helper                                                  |
  136. | 2. Substitution                                                         |
  137. | 3. Railfence                                                            |
  138. | 4. Playfair                                                             |
  139. | 5. Polyalphabetic                                                       |
  140. |                                                                         |
  141. |                                                                         |
  142. |                                                                         |
  143. |                                                                         |
  144. |                                                                         |
  145. |                                                                         |
  146. |                                                                         |
  147. |                                                                         |
  148. |                                                                         |
  149. +-------------------------------------------------------------------------+
  150. |                                                                 F10=Exit|
  151. |----------------$8.50 Shareware Contribution Requested-------------------+
  152.  
  153.      Pressing the "1" key will enter the "Substitution Helper", "2" will
  154. enter "Substitution" and "3" will enter "Railfence", "4" will enter
  155. "Playfair" and "5" will enter "Polyalphabetic.  Pressing the F10 function
  156. from this window will exit CryptoAnalyzer and leave the user at the point
  157. where CRY was executed.
  158.  
  159.      CryptoAnalyzer was developed in the programming language Ada.
  160.  
  161.  
  162.                                - 1 -
  163. 1.1 Document Layout
  164.  
  165.      The remainder of this document is as follows:
  166.  
  167.      Chapter 2 - System Requirements
  168.  
  169.      Chapter 3 - Installation Procedures
  170.  
  171.      Chapter 4 - Program Options
  172.  
  173.      Chapter 5 - Licensing
  174.  
  175.      Chapter 6 - Disclaimer
  176.  
  177.      Chapter 7 - Where CryptoAnalyzer Can Be Found
  178.  
  179.  
  180. 2.0 System Requirements
  181.  
  182.      This chapter describes system requirements necessary to execute
  183. CryptoAnalyzer.
  184.  
  185.  
  186. 2.1 Hardware Requirements
  187.  
  188.      CryptoAnalyzer is compatible with the XT, AT, PS2 models and other 100%
  189. compatible systems.
  190.  
  191.  
  192. 2.2 Video Adapters
  193.  
  194.      CryptoAnalyzer will operate with all type of video adapters.  It has
  195. been designed and tested with Monochrome, EGA, CGA and VGA adapters.
  196.  
  197.  
  198. 2.3 Operating System Limitations
  199.  
  200.      CryptoAnalyzer has been designed to execute on systems with DOS versions
  201. 3.00 through 5.00.
  202.  
  203.  
  204.  
  205.  
  206.  
  207.  
  208.  
  209.  
  210.  
  211.  
  212.  
  213.  
  214.  
  215.  
  216.                                - 2 -
  217. 3.0 Installation Procedures
  218.  
  219.      The following procedures allow new users to easily install
  220. CryptoAnalyzer on their system.  The following procedures make the assumption
  221. that you have a hard disk as drive "c", boot from that drive and will be
  222. using "CRY" as the directory for the program.
  223.  
  224.      1. Make a subdirectory "CRY" under the "C:\" (root) directory.
  225.         mkdir cry
  226.  
  227.      2. Copy all CRY files to this new "C:\CRY" directory.
  228.         copy *.* c:\cry
  229.  
  230.      3. Type "cry" at the DOS prompt
  231.         cd cry
  232.         cry
  233.  
  234.  
  235.  
  236.  
  237.  
  238.  
  239.  
  240.  
  241.  
  242.  
  243.  
  244.  
  245.  
  246.  
  247.  
  248.  
  249.  
  250.  
  251.  
  252.  
  253.  
  254.  
  255.  
  256.  
  257.  
  258.  
  259.  
  260.  
  261.  
  262.  
  263.  
  264.  
  265.  
  266.  
  267.  
  268.  
  269.  
  270.                                - 3 -
  271. 4.0 Program Options
  272.  
  273.      This chapter will explain each of the options available with the
  274. CryptoAnalyzer program.
  275.  
  276. 4.1 Substitution Helper
  277.  
  278.      Choosing this option from the main menu will aid the user in solving
  279. simple substitution cryptograms.  Upon selection the following will be
  280. presented to the user:
  281.  
  282.  
  283. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  284. |                                                                         |
  285. |                                                                         |
  286. | +Enter Cipher Text----------------------------------------------------+ |
  287. | |Now is the time                                                      | |
  288. | |for all good                                                         | |
  289. | |men to come                                                          | |
  290. | |to the                                                               | |
  291. | |aid                                                                  | |
  292. | |of their country.                                                    | |
  293. | +---------------------------------------------------------------------+ |
  294. |                                                                         |
  295. |                                                                         |
  296. |                                                                         |
  297. |                                                                         |
  298. |                                                                         |
  299. |                                                                         |
  300. |                                                                         |
  301. |                                                                         |
  302. |                                                                         |
  303. +-------------------------------------------------------------------------+
  304. |                                                         F10=Stop Editing|
  305. +-------------------------------------------------------------------------+
  306.  
  307.     At this point, the user enters in the cipher text that is to be
  308. deciphered.  Once all of the text has been entered, press the F10 function
  309. key to stop the editing process and enter the substitution helper.  The
  310. following will be displayed:
  311.  
  312.  
  313.  
  314.  
  315.                                    NOTE
  316.  
  317.  
  318.      Plain or cipher text entered on one screen will be retained and be
  319. accessible on another.
  320.  
  321.  
  322.  
  323.  
  324.                                - 4 -
  325. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  326. |                                                                         |
  327. |                      Cipher=ABCDEFGHIJKLMNOPQRSTUVWXYZ Cipher Letter _  |
  328. |  Enter Plain Text    Plain =-------------------------- Plain  Letter    |
  329. | +---------------------------------------------------------------------+ |
  330. | |Now is the time                                                      | |
  331. | |for all good                                                         | |
  332. | |men to come                                                          | |
  333. | |to the                                                               | |
  334. | |aid                                                                  | |
  335. | |of their country.                                                    | |
  336. | +---------------------------------------------------------------------+ |
  337. |                                                                         |
  338. |  --- -- --- ----                                                        |
  339. |  --- --- ----                                                           |
  340. |  --- -- ----                                                            |
  341. |  -- ---                                                                 |
  342. |  ---                                                                    |
  343. |  -- ----- -------.                                                      |
  344. |                                                                         |
  345. |                                                                         |
  346. |A= 2  C= 2  E= 6  G= 1 I= 4  K=    M= 3  O= 9  Q=   S= 2 U= 1  W=    Y= 1|
  347. |B=    D= 2  F= 2  H= 3 J=    L= 2  N= 3  P=    R= 3 T= 7 V=    X=    Z= 1|
  348. +-------------------------------------------------------------------------+
  349. |                                                                 F10=Exit|
  350. +-------------------------------------------------------------------------+
  351.  
  352.      This window will be all that is needed to solve a cryptogram that uses
  353. simple substitution.  The window contains a number of fields that will aid
  354. the user in solving the cryptogram.
  355.  
  356.      1) The top part of the window contains the mapping from cipher text to
  357.         plain text.
  358.  
  359.      2) The bottom of the window will contain a frequency count of each
  360.         letter in the cryptogram.  This may aid the user in determining the
  361.         more frequent letters used in the english language.
  362.  
  363.      3) Just under the cipher text will be where the plain text will be
  364.         displayed.  At first, the plain text will be displayed as '-'.  As
  365.         a cipher letter is mapped to a plain letter the mapping will be
  366.         displayed.
  367.  
  368.      4) At the top right will be the user's input fields that are used to
  369.         enter a cipher letter and a plain text letter.  When these two
  370.         fields are filled in, a mapping from cipher to plain text will be
  371.         performed and the various portions of the window will be updated
  372.         to reflect the users input.  The following are a few examples that
  373.         may be entered:
  374.  
  375.  
  376.  
  377.  
  378.                                - 5 -
  379.          Cipher Letter: A
  380.          Plain Letter:  B
  381.  
  382.      In this example the program will map the letter "A" to the letter "B".
  383. In the plain text area the letter "B" will be displayed corresponding to the
  384. letter "A" that is in the cipher text area.  The cipher to plain mapping at
  385. the top of the window will be updated to reflect the input.
  386.  
  387.         Cipher Letter: A
  388.         Plain Letter:  -
  389.  
  390.      In this example the program will erase the mapping of the letter "A" to
  391. the letter "B".  This will be reflected in the cipher to plain text mapping
  392. and also in the plain text area.
  393.  
  394.  
  395. 4.2 Substitution
  396.  
  397.      Choosing this option from the main menu will aid the user in enciphering
  398. and deciphering substitution cryptograms.  Upon selection the following will
  399. be presented to the user:
  400.  
  401.  
  402. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  403. |                                                                         |
  404. |                                                                         |
  405. | 1. Encipher                                                             |
  406. | 2. Encipher With Keyword                                                |
  407. | 3. Decipher With Keyword                                                |
  408. |                                                                         |
  409. |                                                                         |
  410. |                                                                         |
  411. |                                                                         |
  412. |                                                                         |
  413. |                                                                         |
  414. |                                                                         |
  415. |                                                                         |
  416. |                                                                         |
  417. |                                                                         |
  418. |                                                                         |
  419. |                                                                         |
  420. |                                                                         |
  421. |                                                                         |
  422. |                                                                         |
  423. +-------------------------------------------------------------------------+
  424. |                                                            F10=Main Menu|
  425. +-------------------------------------------------------------------------+
  426.  
  427.  
  428.  
  429.  
  430.  
  431.  
  432.                                - 6 -
  433. 4.2.1 Encipher
  434.  
  435.      Choosing the "Encipher" option from the main menu will aid the user in
  436. enciphering substitution cryptograms.  Upon selection, the following will be
  437. presented to the user:
  438.  
  439.  
  440. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  441. |                                                                         |
  442. |                                                                         |
  443. |                                                                         |
  444. | +Enter Plain Text-----------------------------------------------------+ |
  445. | |Now is the time                                                      | |
  446. | |for all good                                                         | |
  447. | |men to come                                                          | |
  448. | |to the                                                               | |
  449. | |aid                                                                  | |
  450. | |of their country.                                                    | |
  451. | +---------------------------------------------------------------------+ |
  452. |                                                                         |
  453.                                   .
  454.                                   .
  455.                                   .
  456. |                                                                         |
  457. +-------------------------------------------------------------------------+
  458. |                                                         F10=Stop Editing|
  459. +-------------------------------------------------------------------------+
  460.  
  461.     At this point, the user enters in the plain text that is to be
  462. enciphered.  Once all of the text has been entered, press the F10 function
  463. key to stop the editing process and enter the enciphering process.  The
  464. following will be displayed:
  465.  
  466. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  467. |                                                                         |
  468. |                                                                         |
  469. | +Enter Plain Text-----------------------------------------------------+ |
  470. | |Now is the time                                                      | |
  471. | |for all good                                                         | |
  472. | |men to come                                                          | |
  473. | |to the                                                               | |
  474. | |aid                                                                  | |
  475. | |of their country.                                                    | |
  476. | +---------------------------------------------------------------------+ |
  477. |                                                                         |
  478.                                  .
  479.                                  .
  480.                                  .
  481. |                                                                         |
  482. +-------------------------------------------------------------------------+
  483. |F1=Process F2=Cipher                                     F9=File F10=Exit|
  484. +-------------------------------------------------------------------------+
  485.  
  486.                                - 7 -
  487.      At this point there are two options.  The "Cipher" options, by pressing
  488. F2, will allow the user to create a cryptogram by choosing their own
  489. substitution letters.  The following will be presented to the user:
  490.  
  491. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  492. |                                                                         |
  493. | +Enter Plain Text-----------------------------------------------------+ |
  494. | |Now is the time                                                      | |
  495. | |for all good                                                         | |
  496. | |men to come                                                          | |
  497. | |to the                                                               | |
  498. | |aid                                                                  | |
  499. | |of their country.                                                    | |
  500. | +---------------------------------------------------------------------+ |
  501. |                                                                         |
  502. |  Plain  =ABCDEFGHIJKLMNOPQRSTUVWXYZ                                     |
  503. |  Cipher =--------------------------                                     |
  504. |                                                                         |
  505. |  Plain  _                                                               |
  506. |  Cipher                                                                 |
  507. |                                                                         |
  508. |                                                                         |
  509. |                                                                         |
  510. +-------------------------------------------------------------------------+
  511. |F1=Process F2=Cipher                                             F10=Exit|
  512. +-------------------------------------------------------------------------+
  513.  
  514.      The user can choose their own substitution letter by letter.  First a
  515. plain text letter and then a cipher letter.  As the letters are entered, the
  516. mapping will be displayed above the user entry fields.  Once all of the
  517. letters have been mapped, choosing the "Process" option, F1, the ciphered
  518. text will be generated and displayed.
  519.  
  520.      After the F1 key has been pressed and the cryptogram created, the F9
  521. function key can be used to dump the text to a file.  The user will be given
  522. the chance to choose their own output file or the default 'crypto.txt' can be
  523. used.  Once the file name has been chosen pressing the enter will cause the
  524. file to be created in the current directory.  Pressing the 'ESC' key will
  525. cancel the file output option.
  526.  
  527.  
  528.  
  529.  
  530.  
  531.  
  532.  
  533.  
  534.  
  535.  
  536.  
  537.  
  538.  
  539.  
  540.                                - 8 -
  541. 4.2.2 Encipher with Keyword
  542.  
  543.      Choosing the "Encipher with Keyword" option from the substitution menu
  544. will aid the user in enciphering substitution cryptograms.  The user will be
  545. presented with a window in which to enter the plain text.   Once the plain
  546. text has been entered and the F10 key pressed, the user is ready to create
  547. the cipher text.  The following will be displayed for the user:
  548.  
  549.  
  550. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  551. |                                                                         |
  552. |                                                      Shift:   _         |
  553. |                                                      Keyword:           |
  554. | +Enter Plain Text-----------------------------------------------------+ |
  555. | |Now is the time                                                      | |
  556. | |for all good                                                         | |
  557. | |men to come                                                          | |
  558. | |to come to                                                           | |
  559. | |aid                                                                  | |
  560. | |of their country.                                                    | |
  561. | +---------------------------------------------------------------------+ |
  562. |                                                                         |
  563.                                   .
  564.                                   .
  565.                                   .
  566. |                                                                         |
  567. +-------------------------------------------------------------------------+
  568. |F1=Process F2=Shift F3=Keyword                                   F10=Exit|
  569. +-------------------------------------------------------------------------+
  570.  
  571.      Enciphering a substitution with this option requires the user to enter
  572. a keyword and a shift value.  If no keyword or shift values are provided then
  573. the ciphered text will be the same as the plain text.
  574.  
  575.      1) Keyword - Pressing the F3 function key will place the cursor on this
  576.                   field.  The key must contain the letters "A-Z".  This is
  577.                   usually a common word.  The whole word can be entered
  578.                   CryptoAnalyzer will remove any duplication.
  579.  
  580.      2) Shift   - Pressing the F2 function key will place the cursor on this
  581.                   field.  This is an integer value between 0 and 26.  This
  582.                   indicate how much to shift the keyword and the rest of
  583.                   the alphabet to create the cipher map.  A value of zero
  584.                   indicates that the alphabet is NOT to be shifted.  This
  585.                   is the default value if no value is entered.
  586.  
  587.  
  588.  
  589.  
  590.  
  591.  
  592.  
  593.  
  594.                                - 9 -
  595.      The following is a few examples using a keyword and a shift value:
  596.  
  597.      1) Keyword = MILLER (will be inserted as 'MILER')
  598.         Shift   = 0
  599.  
  600.         Plain =ABCDEFGHIJKLMNOPQRSTUVWXYZ
  601.         Cipher=MILERABCDFGHJKNOPQSTUVWXYZ
  602.  
  603.         In this example not much substitution will take place just where the
  604.         keyword is enter into the equation.  The shift value of '0' did not
  605.         cause a shift in the cipher alphabet.
  606.  
  607.      2) Keyword = MILLER
  608.         Shift   = 25
  609.  
  610.         Plain =ABCDEFGHIJKLMNOPQRSTUVWXYZ
  611.         Cipher=ZMILERABCDFGHJKNOPQSTUVWXY
  612.  
  613.         In this example 25 out of 26 letter letters were substituted.  The
  614.         letter "e" happens to map back to the letter "e".  If the shift had
  615.         been another value no letter would map back onto itself.  Notice how
  616.         the second 'L' in 'MILLER' has been remove from the keyword.
  617.  
  618.      Once the cipher alphabet has been created, pressing the F1 function key
  619. will create the cryptogram from this alphabet.  It will be display in the
  620. lower half of the window.  Again the F9 key can be used to dump the text to
  621. an output file.
  622.  
  623. 4.2.3 Decipher with Keyword
  624.  
  625.      Choosing the "Decipher with Keyword" option from the substitution menu
  626. will aid the user in deciphering substitution cryptograms.  The user will be
  627. presented with a window in which to enter the cipher text.   Once the cipher
  628. text has been entered and the F10 key pressed, the user is ready to recreate
  629. the plain text.  The procedures to recreate the plain text are the same as
  630. described in the previous section.  Remember the user must know the keyword
  631. and shift value in order for the plain text to be reconstructed.  If these
  632. values are not known then using the "substitution helper" will aid in the
  633. reconstruction.
  634.  
  635.  
  636.  
  637.  
  638.  
  639.  
  640.  
  641.  
  642.  
  643.  
  644.  
  645.  
  646.  
  647.  
  648.                                - 10 -
  649. 4.3 Railfence
  650.  
  651.      Choosing this option from the main menu will aid the user in enciphering
  652. and deciphering railfence cryptograms.  Upon selection, the following will be
  653. presented to the user:
  654.  
  655.  
  656. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  657. |                                                                         |
  658. | 1. Encipher                                                             |
  659. | 2. Decipher                                                             |
  660. | 3. Decipher Helper                                                      |
  661. |                                                                         |
  662. |                                                                         |
  663.                                  .
  664.                                  .
  665.                                  .
  666. |                                                                         |
  667. |                                                                         |
  668. +-------------------------------------------------------------------------+
  669. |                                                            F10=Main Menu|
  670. +-------------------------------------------------------------------------+
  671.  
  672.  
  673. 4.3.1 Encipher
  674.  
  675.      Choosing the "Encipher" option from the Railfence menu will aid the user
  676. in enciphering railfence cryptograms.  Upon selection the following will be
  677. presented to the user:
  678.  
  679.  
  680. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  681. |                                                                         |
  682. |                                                                         |
  683. | +Enter Plain Text-----------------------------------------------------+ |
  684. | |Now is the time                                                      | |
  685. | |for all good                                                         | |
  686. | |men to come                                                          | |
  687. | |to the                                                               | |
  688. | |aid                                                                  | |
  689. | |of their country.                                                    | |
  690. | +---------------------------------------------------------------------+ |
  691. |                                                                         |
  692.                                  .
  693.                                  .
  694.                                  .
  695. |                                                                         |
  696. |                                                                         |
  697. +-------------------------------------------------------------------------+
  698. |                                                         F10=Stop Editing|
  699. +-------------------------------------------------------------------------+
  700.  
  701.  
  702.                                - 11 -
  703.     At this point the user enters in the plain text that is to be enciphered.
  704. Once all of the text has been entered, press the F10 function key to stop the
  705. editing process and enter the enciphering process.  The following will be
  706. displayed:
  707.  
  708.  
  709. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  710. |                                                                         |
  711. |                                                          Height =       |
  712. | +Enter Plain Text-----------------------------------------------------+ |
  713. | |Now is the time                                                      | |
  714. | |for all good                                                         | |
  715. | |men to come                                                          | |
  716. | |to the                                                               | |
  717. | |aid                                                                  | |
  718. | |of their country.                                                    | |
  719. | +---------------------------------------------------------------------+ |
  720. |                                                                         |
  721.                                 .
  722.                                 .
  723.                                 .
  724. |                                                                         |
  725. |                                                                         |
  726. +-------------------------------------------------------------------------+
  727. |F1=Process F2=Height                                     F9=File F10=Exit|
  728. +-------------------------------------------------------------------------+
  729.  
  730.      At this point there are two options.  The "Height" options, by pressing
  731. F2, will allow the user to choose a height for their rails.  After entering
  732. a height, press the F1 function key to produce the cryptogram.  The following
  733. will be presented to the user:
  734.  
  735.  
  736.  
  737.  
  738.  
  739.  
  740.  
  741.  
  742.  
  743.  
  744.  
  745.  
  746.  
  747.  
  748.  
  749.  
  750.  
  751.  
  752.  
  753.  
  754.  
  755.  
  756.                                - 12 -
  757. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  758. |                                                                         |
  759. |                                                          Height = 5     |
  760. | +Enter Plain Text-----------------------------------------------------+ |
  761. | |Now is the time                                                      | |
  762. | |for all good                                                         | |
  763. | |men to come                                                          | |
  764. | |to the                                                               | |
  765. | |aid                                                                  | |
  766. | |of their country.                                                    | |
  767. | +---------------------------------------------------------------------+ |
  768. |                                                                         |
  769. | +---------------------------------------------------------------------+ |
  770. | |NTLNO FUOEI ALETT TOTON WHMRG MOEHD HCTIT EOODC MEIER RSFOO AIY      | |
  771. | |                                                                     | |
  772. | |                                                                     | |
  773. | |                                                                     | |
  774. | |                                                                     | |
  775. | |                                                                     | |
  776. | +---------------------------------------------------------------------+ |
  777. |                                                                         |
  778. +-------------------------------------------------------------------------+
  779. |F1=Process F2=Height                                     F9=File F10=Exit|
  780. +-------------------------------------------------------------------------+
  781.  
  782.  
  783. 4.3.2 Decipher
  784.  
  785.      Choosing the "Decipher" option from the main menu will aid the user in
  786. deciphering railfence cryptograms.  The processing and parameters are the
  787. same as in enciphering a railfence cryptogram.
  788.  
  789.  
  790. 4.3.3 Decipher Helper
  791.  
  792.      Choosing the "Decipher Helper" option from the main menu will aid the
  793. user in deciphering railfence cryptograms.  Once the text has been entered
  794. and the F1 function key has been pressed, the following will be presented to
  795. the user:
  796.  
  797.  
  798.  
  799.  
  800.  
  801.  
  802.  
  803.  
  804.  
  805.  
  806.  
  807.  
  808.  
  809.  
  810.                                - 13 -
  811. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  812. |                                            Up:   ^                      |
  813. |                                            Down: v         Height:  3   |
  814. | +Enter Plain Text-----------------------------------------------------+ |
  815. | |Now is the time                                                      | |
  816. | |for all good                                                         | |
  817. | |men to come                                                          | |
  818. | |to the                                                               | |
  819. | |aid                                                                  | |
  820. | |of their country.                                                    | |
  821. | +---------------------------------------------------------------------+ |
  822. |                                                                         |
  823. | +---------------------------------------------------------------------+ |
  824. | |NTLNO FUOEI ALETT TOTON WHMRG MOEHD HCTIT EOODC MEIER RSFOO AIY      | |
  825. | |                                                                     | |
  826. | |                                                                     | |
  827. | |                                                                     | |
  828. | |                                                                     | |
  829. | |                                                                     | |
  830. | +---------------------------------------------------------------------+ |
  831. |                                                                         |
  832. +-------------------------------------------------------------------------+
  833. |F1=Process                                               F9=File F10=Exit|
  834. +-------------------------------------------------------------------------+
  835.  
  836.      Using the up and down arrow keys, the user will be able to go through
  837. heights ranging from 3 to 20.  The plain text will be displayed in the lower
  838. window.  Once the correct rail has been reached, the plain text will just pop
  839. out in the lower window.
  840.  
  841.  
  842. 4.4 Playfair
  843.  
  844.      Choosing this option from the main menu will aid the user in enciphering
  845. and deciphering playfair cryptograms.  Upon selection, the following will be
  846. presented to the user:
  847.  
  848.  
  849. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  850. |                                                                         |
  851. |                                                                         |
  852. | 1. Encipher                                                             |
  853. | 2. Decipher                                                             |
  854. | 3. Helper                                                               |
  855. |                                                                         |
  856.                                    .
  857.                                    .
  858.                                    .
  859. |                                                                         |
  860. +-------------------------------------------------------------------------+
  861. |                                                            F10=Main Menu|
  862. +-------------------------------------------------------------------------+
  863.  
  864.                                - 14 -
  865. 4.4.1 Encipher
  866.  
  867.      Choosing the "Encipher" option from the Playfair menu will aid the user
  868. in enciphering Playfair cryptograms.  Upon selection, the following will be
  869. presented to the user:
  870.  
  871.  
  872. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  873. |                                                                         |
  874. |                                                   Keyword:              |
  875. | +Enter Plain Text-----------------------------------------------------+ |
  876. | |Now is the time                                                      | |
  877. | |for all good                                                         | |
  878. | |men to come                                                          | |
  879. | |to the                                                               | |
  880. | |aid                                                                  | |
  881. | |of their country.                                                    | |
  882. | +---------------------------------------------------------------------+ |
  883. |                                                                         |
  884. |                                                                         |
  885.                                    .
  886.                                    .
  887.                                    .
  888. |                                                                         |
  889. +-------------------------------------------------------------------------+
  890. |                                                         F10=Stop Editing|
  891. +-------------------------------------------------------------------------+
  892.  
  893.     At this point the user enters in the plain text that is to be enciphered.
  894. Once all of the text has been entered, press the F10 function key to stop the
  895. editing process and enter the enciphering process.  The following will be
  896. displayed:
  897.  
  898. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  899. |                                                                         |
  900. |                                                   Keyword:              |
  901. | +Enter Plain Text-----------------------------------------------------+ |
  902. | |Now is the time                                                      | |
  903. | |for all good                                                         | |
  904. | |men to come                                                          | |
  905. | |to the                                                               | |
  906. | |aid                                                                  | |
  907. | |of their country.                                                    | |
  908. | +---------------------------------------------------------------------+ |
  909. |                                                                         |
  910.                                    .
  911.                                    .
  912.                                    .
  913. |                                                                         |
  914. +-------------------------------------------------------------------------+
  915. |F1=Process F2=Keyword                                    F9=File F10=Exit|
  916. +-------------------------------------------------------------------------+
  917.  
  918.                                - 15 -
  919.      At this point there are two options.  The "Keyword" options, by pressing
  920. F2, will allow the user to choose their keyword.  After entering a keyword,
  921. press the F1 function key to produce the cryptogram.  The following will be
  922. presented to the user:
  923.  
  924. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  925. |                                                                         |
  926. |  Enter Plain Text                                 Keyword: THEKEY       |
  927. | +---------------------------------------------------------------------+ |
  928. | |Now is the time                                                      | |
  929. | |for all good                                                         | |
  930. | |men to come                                                          | |
  931. | |to the                                                               | |
  932. | |aid                                                                  | |
  933. | |of their country.                                                    | |
  934. | +---------------------------------------------------------------------+ |
  935. |                                                                         |
  936. | +---------------------------------------------------------------------+ |
  937. | |NTLNO FUOEI ALETT TOTON WHMRG MOEHD HCTIT EOODC MEIER RSFOO AIY      | |
  938. | |                                                                     | |
  939. | |                                                                     | |
  940. | |                                                                     | |
  941. | +---------------------------------------------------------------------+ |
  942. |                                                                         |
  943. +-------------------------------------------------------------------------+
  944. |F1=Process F2=Keyword                                    F9=File F10=Exit|
  945. +-------------------------------------------------------------------------+
  946.  
  947.      The following method is applied when enciphering with the playfair
  948. method:
  949.  
  950.      1) It uses a 5x5 matrix in which the letters of the alphabet
  951.         are entered.  This program will assume that 'i' and 'j'
  952.         occupy the same location.  The assignment of the letters
  953.         will be according to the keyword.  Once the square has
  954.         been defined, the following three instruction are used
  955.         to create the cipher text from the plain text.
  956.  
  957.      a) If the next pair of letters are in the same row, then the
  958.         letters to the right are taken.
  959.  
  960.      b) If the next pair of letters are in the same column, then the
  961.         letters below are taken.
  962.  
  963.      c) If the two letters are in different rows and columns, then
  964.         the letters opposite in the rectangle are taken.
  965.  
  966.  
  967.  
  968.  
  969.  
  970.  
  971.  
  972.                                - 16 -
  973. 4.4.2 Decipher
  974.  
  975.      Choosing the "Decipher" option from the "Playfair" menu will aid the
  976. user in deciphering playfair cryptograms.  The processing and parameters are
  977. the same as in enciphering a playfair cryptogram.
  978.  
  979.      The following method is applied when deciphering with the playfair
  980. method:
  981.  
  982.      1) Deciphering requires a 5x5 matrix created by a keyword.
  983.         Once the square has been defined, the following three instruction
  984.         are used to create the plain text from the cipher text.
  985.  
  986.      a) If the next pair of letters are in the same row, then the
  987.         letters to the left are taken.
  988.  
  989.      b) If the next pair of letters are in the same column, then the
  990.         letters above are taken.
  991.  
  992.      c) If the two letters are in different rows and columns, then
  993.         the letters opposite in the rectangle are taken.
  994.  
  995.  
  996. 4.4.3 Helper
  997.  
  998.      Choosing the "Helper" option from the "Playfair menu will aid the user
  999. in analyzing playfair cryptograms.  Once the text has been entered the
  1000. following will be displayed:
  1001.  
  1002.  
  1003. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  1004. |                                                                         |
  1005. |                                                                         |
  1006. | +Enter Cipher Text----------------------------------------------------+ |
  1007. | |NTLNO FUOEI ALETT TOTON WHMRG MOEHD HCTIT EOODC MEIER RSFOO AIY      | |
  1008. | |                                                                     | |
  1009. | |                                                                     | |
  1010. | |                                                                     | |
  1011. | |                                                                     | |
  1012. | |                                                                     | |
  1013. | +---------------------------------------------------------------------+ |
  1014. |                                                                         |
  1015.                                   .
  1016.                                   .
  1017.                                   .
  1018. |                                                                         |
  1019. +-------------------------------------------------------------------------+
  1020. |F1=Translate F2=Square F3=Keyword                        F9=File F10=Exit|
  1021. +-------------------------------------------------------------------------+
  1022.  
  1023.  
  1024.  
  1025.  
  1026.                                - 17 -
  1027.      The Keyword option, F3, will allow the user to enter their guess for the
  1028. keyword.  Once the keyword has been entered, the Square option, F3, can be
  1029. used to view the 5x5 square that will be used in the decipherment.  The
  1030. Translate options, F1, will allow the user to perform the translation to
  1031. plain text.  Constant editing of the Square may be required to obtain the
  1032. correct solution.
  1033.  
  1034.  
  1035. 4.5 Polyalphabetic
  1036.  
  1037.      Choosing this option from the main menu will aid the user in enciphering
  1038. and deciphering polyalphabetic cryptograms.  Upon selection, the following
  1039. will be presented to the user:
  1040.  
  1041. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  1042. |                                                                         |
  1043. |                                                                         |
  1044. | 1. Encipher                                                             |
  1045. | 2. Decipher                                                             |
  1046. | 3. Helper                                                               |
  1047. |                                                                         |
  1048.                                    .
  1049.                                    .
  1050.                                    .
  1051. |                                                                         |
  1052. +-------------------------------------------------------------------------+
  1053. |                                                            F10=Main Menu|
  1054. +-------------------------------------------------------------------------+
  1055.  
  1056.  
  1057.  
  1058.  
  1059.  
  1060.  
  1061.  
  1062.  
  1063.  
  1064.  
  1065.  
  1066.  
  1067.  
  1068.  
  1069.  
  1070.  
  1071.  
  1072.  
  1073.  
  1074.  
  1075.  
  1076.  
  1077.  
  1078.  
  1079.  
  1080.                                - 18 -
  1081. 4.5.1 Encipher
  1082.  
  1083.      Choosing the "Encipher" option from the polyalphabetic menu will aid the
  1084. user in enciphering polyalphabetic cryptograms. At this point, the user
  1085. enters in the plain text that is to be enciphered.  Once all of the text has
  1086. been entered, press the F10 function key to stop the editing process and
  1087. enter the enciphering process.  The following will be displayed:
  1088.  
  1089.  
  1090. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  1091. |                                                                         |
  1092. |                                                    Keyword:             |
  1093. | +Enter Plain Text-----------------------------------------------------+ |
  1094. | |Now is the time                                                      | |
  1095. | |for all good                                                         | |
  1096. | |men to come                                                          | |
  1097. | |to the                                                               | |
  1098. | |aid                                                                  | |
  1099. | |of their country.                                                    | |
  1100. | +---------------------------------------------------------------------+ |
  1101. |                                                                         |
  1102.                                    .
  1103.                                    .
  1104.                                    .
  1105. |                                                                         |
  1106. +-------------------------------------------------------------------------+
  1107. |F1=Process F2=Keyword                                    F9=File F10=Exit|
  1108. +-------------------------------------------------------------------------+
  1109.  
  1110.      At this point there are two options.  The "Keyword" options, by pressing
  1111. F2, will allow the user to choose their keyword.  After entering a keyword,
  1112. press the F1 function key to produce the cryptogram.  The following will be
  1113. presented to the user:
  1114.  
  1115.  
  1116.  
  1117.  
  1118.  
  1119.  
  1120.  
  1121.  
  1122.  
  1123.  
  1124.  
  1125.  
  1126.  
  1127.  
  1128.  
  1129.  
  1130.  
  1131.  
  1132.  
  1133.  
  1134.                                - 19 -
  1135. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  1136. |                                                                         |
  1137. |                                                                         |
  1138. | +Enter Plain Text-----------------------------------------------------+ |
  1139. | |Now is the time                                                      | |
  1140. | |for all good                                                         | |
  1141. | |men to come                                                          | |
  1142. | |to the                                                               | |
  1143. | |aid                                                                  | |
  1144. | |of their country.                                                    | |
  1145. | +---------------------------------------------------------------------+ |
  1146. |                                                                         |
  1147. | +---------------------------------------------------------------------+ |
  1148. | |NTLNO FUOEI ALETT TOTON WHMRG MOEHD HCTIT EOODC MEIER RSFOO AIY      | |
  1149. | |                                                                     | |
  1150. | |                                                                     | |
  1151. | |                                                                     | |
  1152. | +---------------------------------------------------------------------+ |
  1153. |                                                                         |
  1154. +-------------------------------------------------------------------------+
  1155. |F1=Process F2=Keyword                                    F9=File F10=Exit|
  1156. +-------------------------------------------------------------------------+
  1157.  
  1158.      The following method is applied when enciphering with the Polyalphabetic
  1159. method:
  1160.  
  1161.      1) Using the keyword, write it over the plain text.  The following
  1162.         illustrate the process: (Assume keyword is 'MILLER')
  1163.  
  1164.         MILER MILER MILER MILER MILER
  1165.         NOWIS THETI MEFOR ALLGO ODMEN
  1166.  
  1167.      2) Generate a table that has the following format:
  1168.  
  1169.                      Keyletter
  1170.             ABCDEFGHIJKLMNOPQRSTUVWXYZ
  1171.        P   +--------------------------
  1172.        l  A|ABCDFEF...
  1173.        a  B|BCDEFGH...
  1174.        i  C|CDEFGHI...
  1175.        n  D|DEFGHIJ...
  1176.        L  E|EFGHIJK...
  1177.        e  F|FGHIJKL...
  1178.        t  G|GHIJKLM...
  1179.        t  .|.......
  1180.        e  .|.......
  1181.        r  .|.......
  1182.  
  1183.      3) To encipher take the intersection of the key letter column and
  1184.         the plain text row.
  1185.  
  1186.  
  1187.  
  1188.                                - 20 -
  1189. 4.5.2 Decipher
  1190.  
  1191.      Choosing the "Decipher" option from the "Polyalphabetic the user in
  1192. deciphering polyalphabetic cryptograms.  The processing and parameters are
  1193. the same as in enciphering with the following exception.
  1194.  
  1195.      1) To decipher find the letter on the Keyletter row that is in the
  1196.         keyword scan down to the cipher letter and then associate the
  1197.         plain text letter.
  1198.  
  1199.  
  1200. 4.5.3 Helper
  1201.  
  1202.      Choosing the "Helper" option from the "Polyalphabetic" menu will allow
  1203. the user in analyzing polyalphabetic cryptograms.  Once the text has been
  1204. entered the following will be displayed:
  1205.  
  1206. +-----------------CryptoAnalyzer V1.1 by William Ned Miller---------------+
  1207. |  Enter Best Key Length:                                                 |
  1208. |  Enter Keyword:                                                         |
  1209. | +Enter Cipher Text----------------------------------------------------+ |
  1210. | |NTLNO FUOEI ALETT TOTON WHMRG MOEHD HCTIT EOODC MEIER RSFOO AIY      | |
  1211. | |                                                                     | |
  1212. | |                                                                     | |
  1213. | |                                                                     | |
  1214. | |                                                                     | |
  1215. | |                                                                     | |
  1216. | +---------------------------------------------------------------------+ |
  1217. |                                                                         |
  1218.                                   .
  1219.                                   .
  1220.                                   .
  1221. |                                                                         |
  1222. +-------------------------------------------------------------------------+
  1223. |F1=KeyLength F2=Keyword                                  F9=File F10=Exit|
  1224. +-------------------------------------------------------------------------+
  1225.  
  1226.      Using this option will require the user to play with the 'Key Length'
  1227. and 'Keyword'.  When the 'Best Key Length' is entered CryptoAnalyzer will
  1228. attempt to calculate the keyword.  This does depend on the 'Best Key Length'
  1229. being correct, so several attempts may be necessary.  The calculate keyword
  1230. will not always be correct and will require editing the keyword to make it
  1231. correct.
  1232.  
  1233.  
  1234.  
  1235.  
  1236.  
  1237.  
  1238.  
  1239.  
  1240.  
  1241.  
  1242.                                - 21 -
  1243. 5.0 Licensing
  1244.  
  1245.      *  A $8.50 shareware contribution is requested for using the
  1246.         program.
  1247.      *  The author retains the sole right to sell the program.
  1248.      *  The author grants users the right to copy and distribute
  1249.         the program within the following constraints:
  1250.         - All program files remain unaltered and are distributed
  1251.           together.
  1252.         - No attempt is made to sell the program, or to make
  1253.           money from it or any modified version of it.
  1254.         - The program is not bundled with any other hardware or
  1255.           software transactions without the author's permission.
  1256.         - Only the original "non-cloned" version of the program
  1257.           with the startup time delay is distributed.
  1258.         - Recognized user groups may charge a maximum $7
  1259.           duplication or distribution fee.
  1260.      *  Continued use of the program (more than 3 weeks) by any
  1261.         individual, corporation or institution without a single
  1262.         user or site license is prohibited.
  1263.      *  Single user licenses are obtained by sending in the $8.50
  1264.         shareware contribution.
  1265.      *  User that send in the requested contribution will receive
  1266.         instructions on how to remove the shareware request and
  1267.         insert their own name and registration number.
  1268.      *  Once CryptoAnalyzer has been registered the registration
  1269.         follows the program for all future releases of the
  1270.         program.
  1271.  
  1272.  
  1273.  
  1274.  
  1275.  
  1276.  
  1277.  
  1278.  
  1279.  
  1280.  
  1281.  
  1282.  
  1283.  
  1284.  
  1285.  
  1286.  
  1287.  
  1288.  
  1289.  
  1290.  
  1291.  
  1292.  
  1293.  
  1294.  
  1295.  
  1296.                                - 22 -
  1297. 6.0 Disclaimer
  1298.  
  1299.      The author disclaims all warranties expressed or implied as to the
  1300. quality or performance of this program.  The author will not be held liable
  1301. for any lost profits, lost savings or any other direct, indirect,
  1302. incidental or consequential damages resulting from the use of this program.
  1303. Your use of this program constitutes your agreement to this disclaimer and
  1304. your release of the author from any form of liability or litigation.
  1305.  
  1306.  
  1307.  
  1308.  
  1309.  
  1310.  
  1311.  
  1312.  
  1313.  
  1314.  
  1315.  
  1316.  
  1317.  
  1318.  
  1319.  
  1320.  
  1321.  
  1322.  
  1323.  
  1324.  
  1325.  
  1326.  
  1327.  
  1328.  
  1329.  
  1330.  
  1331.  
  1332.  
  1333.  
  1334.  
  1335.  
  1336.  
  1337.  
  1338.  
  1339.  
  1340.  
  1341.  
  1342.  
  1343.  
  1344.  
  1345.  
  1346.  
  1347.  
  1348.  
  1349.  
  1350.                                - 23 -
  1351. 7.0 Where CryptoAnalyzer Can Be Found
  1352.  
  1353.      The latest version of CryptoAnalyzer and other products developed by
  1354. this author can be found on the following BBS:
  1355.  
  1356.                        The Programmer's Corner
  1357.                           Columbia Maryland
  1358.  
  1359.                       301-596-7692 through 7697
  1360.                       301-995-6873 through 6877
  1361.                       301-621-3424   and   3436
  1362.  
  1363.  
  1364.  
  1365.  
  1366.  
  1367.  
  1368.  
  1369.  
  1370.  
  1371.  
  1372.  
  1373.  
  1374.  
  1375.  
  1376.  
  1377.  
  1378.  
  1379.  
  1380.  
  1381.  
  1382.  
  1383.  
  1384.  
  1385.  
  1386.  
  1387.  
  1388.  
  1389.  
  1390.  
  1391.  
  1392.  
  1393.  
  1394.  
  1395.  
  1396.  
  1397.  
  1398.  
  1399.  
  1400.  
  1401.  
  1402.  
  1403.  
  1404.                                - 24 -
  1405.                           CryptoAnalyzer Version 1.1
  1406.                               Copyright (c) 1993
  1407.                               All Rights Reserved
  1408.  
  1409.                               William Ned Miller
  1410.                               7504 Saffron Court
  1411.                                Hanover MD 21076
  1412.                                 (410) 766-2365
  1413.  
  1414.  
  1415.   Registration Form
  1416.  
  1417.   Registration Provides:
  1418.  
  1419.   1) Notification of the next release of CryptoAnalyzer.
  1420.   2) Instructions on how to remove the shareware contribution request
  1421.      and insert the users name and registration number.  Registration
  1422.      follows all future release of the program.
  1423.  
  1424.   To register your copy of CryptoAnalyzer please fill in the following
  1425.   information and send it along with $8.50 (US) to:
  1426.  
  1427.   William Ned Miller                     { Please only send }
  1428.   7504 Saffron Court                     { checks drawn on  }
  1429.   Hanover MD 21076                       { U.S. banks or    }
  1430.                                          { postal money     }
  1431.                                          { orders.          }
  1432.  
  1433.   Name: ____________________________________________________________
  1434.  
  1435.  
  1436.   Address: _________________________________________________________
  1437.  
  1438.   __________________________________________________________________
  1439.  
  1440.  
  1441.   Phone: (Optional) (     )______-__________________________________
  1442.  
  1443.  
  1444.   Where Did You Get CryptoAnalyzer _________________________________
  1445.  
  1446.   __________________________________________________________________
  1447.  
  1448.   Comments: ________________________________________________________
  1449.  
  1450.   __________________________________________________________________
  1451.  
  1452.   __________________________________________________________________
  1453.  
  1454.   __________________________________________________________________
  1455.  
  1456.   __________________________________________________________________
  1457.