home *** CD-ROM | disk | FTP | other *** search
-
- ~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^
- 12/10/92 1.20 RELEASE
-
- ~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^
- ### |~| ### ### |~| ####~\. #####~\. ### /~| #####~\. #####
- ### | | ### #### | | ### |_| ### | | ###_/ / ### | | ######
- ### | | ### ##### | | ### ### | | ###_/ ### | | ###
- ### | | ### ###### | | ### ##### < ### #####_/ ###
- ###| | ### ### ###| | ### ### | | ### ### ###
- ### | ### ### ### | ### ### | | ### ### ###
- ###| ### ### ###| ### |~| ### | | ### ### ###
- ### ### ### ### ######' ### |_| ### ### ###
-
- ~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^
- What GOD's own son Christ would have written, had he been evil.
-
- ~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^
-
- PROGRAM HISTORY
- ~~~~~~~~~~~~~~~
- DATE VER DESC
- -------- ---- -------------------------------------------------
- 09/11/92 0.10 Began work of original version
- 09/23/92 0.25 First working version, would work only on ASCII
- 10/06/92 0.32 Modified DES routines to allow 255 charset
- 10/19/92 0.59 Implemented RSA public-key routines
- 10/28/92 0.70 Implemented Compression routines
- 11/27/92 0.83 First working version with compression/encryption
- 11/28/92 0.90 Delta release testing begins at selected sites
- 12/01/92 0.99 Gamma release w/ VinLynx/Key modes testing
- 12/04/92 1.05 Implemented Multiple file option (all modes)
- 12/05/92 1.06 Optimized source
- 12/06/92 1.07 Found bug with EISA machines, Improved 'M' mode
- 12/09/92 1.10 Fixes EISA machine bug
- 12/10/92 1.14 Key mode fully implemented
- 12/12/92 1.20 Lock mode fully implemented for drives A and B
- -------- ---- -------------------------------------------------
-
- WHAT IS VINCRYPT
- ~~~~~~~~~~~~~~~~
- Well, basically what Vincrypt is, and was designed to do is keep sensitive
- information protected. There have been many other programs that are out that
- do along the same thing as Vincrypt, but not to the same degree. Vincrypt
- incorporates a modified DES routine, RSA public-key, MPJ encryption, and a
- modified PKware zip based routine. The most signifigant factor about this
- program is the fact that it is a relatively 'dumb' program. Aside from
- identifying whether or not the source file was generated with the program, it
- simply processes the files without any headers of pointers. The reason for
- this is to make it even more difficult to break the routine and bypass the
- encryption due to file common information (such as how all government letters
- say TO: FROM: DEPT:, etc).
- Unlike other programs which use GOVERNMENT APPROVED algorhythms, Vincrypt
- strives to break all laws concerning government regulated security, and is
- not NSA approved. The main point here is that the NSA approved DES and RSA
- for use in the public, but chose not to use the routines for their own
- internal security. What does that tell you? There has been alot of talk
- about what's safe and what's not, and no one is quite sure, so I took it upon
- myself to write this utility.
-
-
- WHO SHOULD USE VC
- ~~~~~~~~~~~~~~~~~
- Everybody. In this day and age where G. Orwell's 1984 looks more like it
- will be 1994, where a democrat can become president, and gun controls just
- lurking around the corner, you must take any and all steps to secure vital
- information against prying eyes. Commercially available security utils are
- a joke, and the public domain ones aren't even worth laughing at, since they
- look at security more as something that stops Joe, your neighbor, from going
- into your dos directory, or maybe from using the format command. I don't
- really care if it is used for evil purposes, although I would prefer it.
-
-
- WHAT VC HAS BEEN TESTED ON
- ~~~~~~~~~~~~~~~~~~~~~~~~~~
- VINCRYPT has undergone extensive testing on the following platforms:
-
- 486-50 DX ISA 32 MEGS SCSI TYPE DRIVE
- 486-33 DX EISA 8 MEGS SCSI TYPE-2 DRIVE
- 486-33 DX LB 8 MEGS LOCAL BUS IDE
- 486-33 DX ISA 4 MEGS IDE
- 386-40 DX ISA 8 MEGS IDE
- 386-16 SX ISA 2 MEGS IDE (Wren)
- 286-25 DX ISA 2 MEGS IDE
- 8088 DX ISA 640 k ST-506
-
- VC was even tested on an HP 95LX, although it was slow, it worked!
-
-
- FILES SUPPORTED
- ~~~~~~~~~~~~~~~
- Unlike MUTATi0N and SecureCrypt, Vincrypt will encrypt ANY file... .EXE, .COM
- .TXT, whatever. Where the others either tag crap on the end, or can't process
- non-ascii input, VC excels. Although the compression routine in VC is not
- as good as newer versions of zip, it is a small price to pay for security.
- And since PKware will unzip your password protected .zip files, in case you
- forget your password, I wouldn't recommend relying on it.
-
-
- THE PASSWORD
- ~~~~~~~~~~~~
- VC supports a password of up to 30 chars, which can be numbers, letters,
- symbols, whatever. VC also IS case sensitive, so 'Password' differs from
- 'paSsword', or 'PAssword'. This version does not currently support spaces in
- the password, but if demand is enough, later versions will.
- Realize that the password you choose is the key to the security of this
- program. The longer the password, the better; so try to choose a phrase or
- combination of words. Unlike the other 1:1 encryption routines, redundancy in
- the file and a small password are not as damaging. This is due in part to the
- compression and public-key routines.
-
-
- ENCRYPTION METHODS
- ~~~~~~~~~~~~~~~~~~
- VC currently supports two different encryption methods. The primary method
- is called VINCRYPTION, and can be used on any type of file (from .EXE to .TXT).
- It incorporates the VC encryption, with a more advanced compression routine
- and non-ASCII character handling.
- The second mode is 'VINLYNX'. VinLynx mode is exclusively for use with
- text files and ASCII files, and uses a less complex method of compression, but
- with larger savings in space. VinLynx will abort if it detects any non-ASCII
- characters in the input file.
- Both encryption modes are equally secure, and can be used with any of the
- other functions VC allows (such as Lock or Key modes (described below)).
-
-
- MODES OF OPERATION
- ~~~~~~~~~~~~~~~~~~
- VC supports several different modes of encryption in this version. You can
- get a list of commands by typing either 'VC' or 'VC /?'.
- First (and probably the most commonly used) is the primary mode (option
- either 'e' or 'd'). This is the basic encryption/compression routines, with
- one vertical and horizontal 'fold'. To use this option you would use the
- following string:
-
- C:\> VC e work.txt work.vin defaultpasswd s
-
- This tells VC to encrypt work.txt into the file work.vin, with the password of
- 'defaultpasswd', and to show the statistics at the end. The 's' is optional
- and does not impair performance.
- The second and more secure mode is called 'Chained' mode. What this does is
- encrypt the file the same as above, then add duplicate strings in specific
- parts encrypted with a different password (apart from the two you choose).
- The string it duplicates on the other routine is usually a common word such
- as 'the' or 'is'. This is to defeat a brute force attempt using common word
- searches. The file is the encrypted a second time with your other password,
- thus masking everything across the file. To use this feature you would enter:
-
- C:\> VC ec work.txt work.vin default passwd sc
-
- Like the above example, the in/out files are the same, and 's' is optional.
- In this mode, however, 'c' was also selected. This tells VC to clear the
- screen before encryption or decryption begins, thus hiding the password from
- someone watching. 'default' is the primary password, and 'passwd' is the
- secondary. One note, you can use two 30 char passwords, since it is actually
- encrypting the file twice.
- The third mode is called 'Locked' mode, and is only available when using a
- floppy drive (either A or B). What this does is encrypt the file by your
- password, which is combined with information from the fat table and directory.
- Due to the combination, the password is limited to 25 chars in this mode,
- although the 10 chars of information the program gathers is based off letters
- in the password. So an example is:
-
- secretword -> sXe5!cFr0t-w12obr.d
- Secretword -> YSeR@cretx/wom,:r3d
-
- Remember that the file CANNOT be decrypted in any way unless you have the EXACT
- floppy it was encrypted on in the drive. This feature is especially nice when
- you want to store sensitive information in a fairly accessible location. You can
- encrypt and decrypt the files on the HD for faster access, but you must always
- use a key disk in A or B. Each keydisk can be used for as many of few files as
- you would like, you can even turn a normal program disk into a key disk and it
- will not look any different. Note that this mode is much like Chained mode, and
- creates duplicate word files between the password and lock encryption sessions.
- The fourth mode is referred to as 'Key' mode. This is based off of the MPJ
- encryption routine, which realized with DES each letter is really only worth
- 100 possiblites (36 alphabet lower/36 alphabet upper, 10 numbers, 18 misc
- symbols). This means a four letter password in DES is worth in reality 100^4,
- nothing like 256^4. The numbers which are entered in are then converted to
- their ANSI respective chars, and used as a key, much like Chain mode. Key
- mode still requires a password to be entered, so if you use a four char pass
- and a six numberset key, your possibilies are (100^4) * (256^6). This is
- currently the most secure mode VC offers. When using this mode, the command
- line looks like this:
-
- C:\> VC ek work.txt work.vin password scl
-
- Then the program responds with this:
-
- Numbers must be between 000-255.
- ###
- Enter Key :
-
- At this point you would enter the key. Remember to always use ALL THREE spaces,
- so don't enter 0 or 45, use this 000 or 045. If you have the screen clear
- option selected (as the above example does), the screen will then clear once
- the key has been entered. For the best possible security, try to use numbers
- above 127, and jump around as much as possible, since these are not used as
- frequently. When you hit enter it will display it's ANSI representation in a
- small box, and prompt for the next. When you've entered all you want, type END.
- The key may be up to 10 numbersets long, so a maximum possible number of 256^10.
- The fifth mode is not really a different mode, but a different session,
- where the program will search a drive and ask if you want files to be encrypted.
- I recommend ending all of your VC'd files with .VIN To use this option type
- this:
-
- C:\> VC em *.* password c
- C:\> VC dm password c
-
- The [L] toggles are not available in this mode. Also, when decrypting, all
- files must use the same password, and end with a .VIN or the program will
- not list them. Another nice point about the multiple mode, is that it is
- compatible with all the other modes, so you could enter 'emc' for Encrypt
- Multiple files using Chained mode; or 'dmk' for Decrypt Multiple files using
- the Key option. The program prompts with the filename, and asks if you wish
- to encrypt it; at this point you can enter either [Y]es, [N]o, or [Q]uit.
- If you respond no, it will go on to the next file; If yes, it will ask if you
- would like to use VinLynx mode, and then the output filename. The '*.*' is
- the filespec for the directory search, so if you just wanted textfiles, you'd
- enter '*.TXT'. All standard dos flags (like * or ?) are supported. When
- decrypting, do not use the filespec flag.
- Also note that the command line uses the flag 'L' for VINLYNX mode (for use
- with ASCII files). VC defaults to VINCRYPTION. The last command field can
- be entered in any sequence, so 'cl' will work just as well as 'lc' or 'lsc'.
- The program in not case sensitive EXCEPT in the password fields.
-
-
- STATISTICS DISPLAY
- ~~~~~~~~~~~~~~~~~~
- The statistics option really doesn't have any useful application, except in
- debugging, but I left it in anyways. It tells you a general overview of the
- VC session. Here's a sample of what it outputs:
-
- VINCRYPT VERSION 1.00 STATISTICS
-
- Input Name [triad.1]
- Input Size [19378]
- Output Name [triad.vin]
- Output Size [12476]
- Encryption Type [VINCRYPTION]
- Compression [0.464]
- Completion Time [3.000000]
- Password1 Length [8]
- Password2 Length [0]
- Public-Key [343]
- Fold Horizontal [180]
- Fold Vertical [212]
- Average Block [6205]
-
- Everything is pretty self explanatory. The vertical and horizontal folds
- represent the string length based off of the average output block. The public
- key is the RSA routine checksum. Currently VINCRYPTION and VINLYNX are the
- only modes available, although upcoming versions will have more improved
- routines. The stat display in multiple file modes is stripped down and split
- into two locations on the screen. Some information is also left out.
-
-
- KNOWN BUGS
- ~~~~~~~~~~
- VinLynx mode does not always detect and abort a non-ascii file, but simple
- processes it through. The easiest way around this (without slowing the code
- down signifigantly is just don't use it on non-test files.
-
-
- PROGRAMS FOR THE FUTURE
- ~~~~~~~~~~~~~~~~~~~~~~~
- Here's some of the programs to be watching for, from me, in the future:
-
- ACTCHK Checks CBI accounts against their algorhythm and verifies
- format validity and extra information.
- [AVAILABLE EARLY 1993]
- CBIDBS A database that sorts and displays all of your credit
- reports. Implements the VC routines real time for
- maximum security. Allows searching for any field, comment
- fields, and ARDT directory.
- [AVAILABLE SUMMER 1993]
-
-
- CONCLUSION
- ~~~~~~~~~~
- If you have any questions, comments, or problems, please report them to me
- on any of the boards listed below or in the program. The greets go out to:
-
- DIGITAL HITLER MAXIMUM OVERDRIVE THE WHITE RIDER
- EREKOSE MR. DRUNKFUX GRANDMASTER RATTE'
- BOOTLEGGER CAPT ZAP
-
- And always remember...
-
- 96% of all SS agents who have tried women prefer camels...
- ...the other 4% prefer men.
- =============================================================================
- Church/Theives [IBM H/P system running with MNP ] 96 619-789-2235
- Demon Roach [PW: THRASH - NUP: FEAR - cDc - Nuff said ] 24 806-794-4362
- The Stash [My European Connection... Lots of files ] 96 46-498-222113
- The Works [Tons of Files cDc Board Give it a call ] 24 617-861-8976
- =============================================================================
- This concludes another wonderful file by Video Vindicator (C)opyright 1992
- =============================================================================
-
-
-