home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
SuperHack
/
SuperHack CD.bin
/
Hack
/
UTILS
/
GLOBALS.ZIP
/
GS.DOC
< prev
next >
Wrap
Text File
|
1995-02-24
|
187KB
|
4,044 lines
Global Security 16
A Data Security Program!
TAN$TAAFL(TM) Software Company
Version 3.10 ■■ 24 February 1995
A Shareware Distributed Program!
CUSTOMER SERVICE Page 2
---------------------------------------------------------------
If you experience any problems with
this program, please write to:
MacGregor K. Phillips
TAN$TAAFL(TM) Software Company
Sto. Nino
Palauig, Zambales 2211
Philippines
(C) Copyright 1994, 1995
TAN$TAAFL(TM) Software Company
All Rights Reserved
Program and manual written by MacGregor K. Phillips
Trademark Acknowledgements
Epson is a registered trademark of Epson America, Inc.
IBM and PS/2 are registered trademarks of International
Business Machines Corporation
Intel is a registered trademark of Intel Corporation
Windows is a trademark of Microsoft Corporation
WordPerfect is a registered trademark of WordPerfect Corporation
PGP and "Pretty Good Privacy" are trademarks of Philip R.
Zimmermann.
ABOUT THE AUTHOR
MacGregor K. Phillips was born in South Bend, Ind. USA in 1944.
Retiring after 22 years of service in the US military he now
does what he loves best, writing computer software. He lives
with his wife and daughter in the Philippines.
For D.P. and S.S. - Prediction Number 18 has come true.
TABLE OF CONTENTS Page 3
---------------------------------------------------------------
Features.....................................................4
Association of Shareware Professionals.......................5
ASP Ombudsman................................................5
Available by the same Author/Pass it Along...................6
Licensing....................................................6
Preface......................................................7
Welcome to Global Security...................................8
Four Ways to Use Global Security.............................9
Computer Requirements........................................9
Installing Global Security..................................11
Executing Global Security...................................12
What You Need to Know to Use Global Security................14
Using Global Security.......................................24
Build A Prime Number File...............................25
Create A Default Parameter File.........................28
Scramble A Prime Number File............................29
Generate a Key File.....................................30
Pack/UnPack File(s).....................................32
Encipher/Decipher a File................................35
Transform File for E-Mail...............................39
Make a One Time Pad.....................................43
Wipe/Delete File(s).....................................45
Frequency Distribution Tests............................48
Tips on Using Global Security in the Real World.............52
Using a One Time Pad........................................55
Appendix A - Why Encipher Data..............................59
Appendix B - Why Global Security............................63
Appendix C - Startup/Termination Errors.....................68
Program Errors.................................69
Critical Errors................................74
Printer Errors.................................76
Appendix D - Program Limitations............................77
Appendix E - Terminology....................................78
Appendix F - PGP on PGP.....................................80
Index.......................................................81
FEATURES Page 4
---------------------------------------------------------------
The Global Security software contains many features. Here are
just a few of them.
Unbreakable, in theory and practice, encryption algorithms
using the "One Time Pad System". (See Appendix B)
Transform any file for transmission by E-Mail using the High
RADIX 64 File Format.
Create One Time Pads to use for secure hand written messages.
File Selection Screen allows you to navigate through your
drives, directories, and files with ease. Select multiple
files for use with the pack/unpack and wipe/delete file
routines.
Sort files in ascending or descending order by name, date,
extension, time, or size.
Compress up to 2,048 files into one file for enciphering
or storage on disk.
Select up to 2,048 files to wipe or delete in one operation.
Uses government procedures IAW DoD 5220.22-M to wipe files
on your disk.
Easy to understand Critical Error Reporting System, Printer
Error Reporting System, and Extended Error Reporting System.
Includes VGA brighten, dim, blank, and reset color routines,
context sensitive Help, mouse support, and Hot Keys.
Command Line Parameters to force a black and white screen,
force a pause after each printed page, disable confirmation
of all files before wiping or deleting, and disable the VGA
color routines.
Save screen images to GLOBAL.PRN file for printing at a
later time.
When you exit Global Security the buffers used to encipher
and decipher data are wiped so sensitive data cannot be
recovered from memory before another program is run.
No limit on file sizes except the size of you disk drives.
Test you own enciphered files to see how random they really
are.
ASSOCIATION OF SHAREWARE PROFESSIONALS Page 5
---------------------------------------------------------------
This software is produced by MacGregor K. Phillips who is a
member of the Association of Shareware Professionals (ASP).
ASP wants to make sure that the shareware principle works for
you. If you are unable to resolve a shareware-related problem
with an ASP member by contacting the member directly, ASP may
be able to help.
The ASP Ombudsman can help you resolve a dispute or problem
with an ASP member, but does not provide technical support
for members' products. Please write to the ASP Ombudsman at
545 Grover Road, Muskegon, MI 49442 or send a CompuServe message
via CompuServe Mail to ASP Ombudsman 70007,3536."
_______
____|__ | (R) Global Security 16
--| | |------------------- is distributed as
| ____|__ | Association of Shareware. This
| | |_| Shareware allows you to try
|__| o | Professionals it out for a
-----| | |--------------------- reasonable period
|___|___| MEMBER of time before you
register it. Please
refer to the TRIAL USE LICENSE section of the VENDINFO.DIZ File.
If you continue to use Global Security regularly you are expected
to register the program. You can use the instant order form in
file ORDER.DOC. Just print it out on your printer, fill it out,
and mail it. If you are not familiar with the Shareware concept
please read the file SHR_WARE.DOC. The registration fee is
$35.00, plus $10.00 shipping and handling. For complete details
on registration see the ORDER.DOC file.
Registration Incentives
---------------------------------------------------------------
Receive the latest registered version of Global Security 16 and
Global Security 32, which is optimized for 32 bit registers and
is for 80386 and up computers. It runs one heck of lot faster
than the 16 bit version of Global Security. New features in the
registered versions currently include a Disk Security Section to
wipe all unused areas on a disk, and an Options Menu which
includes printer selection and startup commands, and options for
the government wipe procedure. The registration reminder screen
has also been removed. Plus receive two small utilities. One is
NEWCLS.COM, a replacement for the DOS CLS command which allows
you to set any valid combination of screen colors whenever you
clear the screen. The second is GUARDIAN.SYS which guards your
computer against any attack through DOS's backdoor.
Once you have registered any version of Global Security you will
be notified of any major upgrades by the TAN$TAAFL(TM) Software
Company and the only cost to you for a new version will be the
cost of a disk from the TAN$TAAFL(TM) Software Company and a
small postage and handling fee.
Page 6
---------------------------------------------------------------
Program support by mail will also be provided for 90 days after
registration.
I am currently living overseas in the Philippines and do not
have access to a telephone, fax, or CompuServe. If it seems to
take a long time for me to answer your letters please remember
the slow pace of mail between foreign countries. If your
registration form or letter gets returned because of a change
of address please contact ASP for my current address. This will
be greatly appreciated by all.
All registrations will be acknowledged.
Site Licenses are provided for companies, offices, workgroups,
government agencies, etc. who need to register and use more
than one copy of Global Security. See the "SITELICE.DOC" file
for more information.
AVAILABLE FROM TAN$TAAFL Software Company
---------------------------------------------------------------
StopWatch. It has Up Timers, Down Timers, Lap Timers, Game
Timers and Split Timers. Date, Calendar and Holiday information
too. Three levels of precision. The highest depends on your
computer. Time events with accuracy to millionths of a second
on most computers above 16Mhz. 16 and 32 bit registered
versions available. Includes Holiday Editor, Speed Calculations
for Up and Lap Timers, and Printer Options menu.
PASS IT ALONG
---------------------------------------------------------------
BBS SYSOPs, Vendors, Computer Clubs, and Shareware Distributors
please refer to the VENDINFO.DIZ File for information. Individuals
who wish to distribute the "Global Security" package to friends or
associates may do so in accordance with the restrictions outlined
in the LICENSE section of the VENDINFO.DIZ File.
All the files listed in the PACKING.LST section of the
VENDINFO.DIZ File, plus the VENDINFO.DIZ file, must be included
when distributing this program. If you archive the program for
distribution through BBS's, please use the name GLBSEC31.EXE
(or .ZIP, .LZH, .PAX, etc. as appropriate).
LICENSING: Any company, corporation or government that wants to
license the algorithms used by Global Security, to incorporate
them into their own programs, please contact the TAN$TAAFL(TM)
Software Company at the above address. The high speed of the
algorithms make them ideal for use in online real time data
transmissions that require the highest possible degree of
security.
DISTRIBUTORS WANTED
---------------------------------------------------------------
Distributors wanted for the registered versions of all programs
published by TAN$TAAFL(TM) Softeware Company. Must be able to
accept credit cards.
PREFACE Page 7
---------------------------------------------------------------
News Flash
---------------------------------------------------------------
CLINTON'S WHITE HOUSE MAY BAN USE OF ALL ENCRYPTION DEVICES AND
SOFTWARE THAT IS NOT CRACKABLE BY THE NATIONAL SECURITY AGENCY
(NSA).
REP. EDWARD J. MARKEY (D-MASS.) CHAIRMAN OF THE HOUSE
TELECOMMUNICATIONS SUBCOMMITTEE, FEARS THE GOVERNMENT MAY
EVENTUALLY BAN ENCRYPTION. "IN A DIGITALLY LINKED WORLD, WHERE
ENCRYPTION IS THE KEY TO PRIVACY," HE SAID, "BANNING ENCRYPTION
MAY BE LIKE BANNING PRIVACY."
The above imformation is from the 30 May 1993 Business Section
of the Washington Post in an article entitled "Chipping Away at
Privacy? - Encryption Device Widens Debate Over Rights of U.S.
to Eavesdrop".
On 16 April 1993 the White House announced it was imposing a
new scheme for encrypting voice and data communications. The
system imploys a device called the "Clipper Chip" which leaves
a deciphering key in the federal governments pocket. In other
words, if you use this device the government can intercept your
encrypted phone calls or computer data transmissions and
decipher them at will. The government will stock up on phones
and computers equipped with the "Clipper Chip" and if you do
business with the government you will have to use the same
devices. The government is also drafting laws to require
telecommunications companies to grant law enforcement agencies
special access to U.S. communications networks.
The NSA is also promoting a chip called "Capstone" using a
formula called "Skipjack" to encrypt data. Of course the NSA and
the government retain master keys to these so they can decode
any data transmitted by them. Anyone crazy enough to buy
anything endorsed by the NSA deserves to have their secret data
read by anyone in government.
What it all boils down to is do you have the right to keep a
phone call or computer transmission private? The government says
no; I say yes. Global Security is designed to keep computer
transmissions private. It is uncrackable by the NSA or any
other agency in the world. Read the following documentation
and you will understand why.
For the latest developments in this area please read the article
in the Wednesday, March 2, 1994 business section of The
Washington Post titled "Chipping Away at a Fundamental Freedom?
- Computer Firms, Rights Groups Clash With White House Over
Encryption vs. Law Enforcement".
Page 8
---------------------------------------------------------------
Welcome to Global Security
---------------------------------------------------------------
Until now unbreakable encryption methods have been possessed
by only a few government agencies, such as the National Security
Agency and the Soviet KGB. With Global Security you now have
that ability. Privacy maintained by mathematical law is now a
reality. For detailed explanations of why you need to encrypt
data and why Global Security is unbreakable, in theory and
practice, please read Appendixes A and B.
The weak link in all computer transmissions is from the moment
the data enters the telephone system until it leaves the
telephone system at the other end. Global Security is designed
to eliminate that weak link. If you are an individual, a small
business man, a doctor, a lawyer, a scientist, an inventor, a
large corporation, or anyone with vital data to transmit across
town, across the nation, or around the world this program is for
you. Once you have enciphered your data with Global Security it
is safe even from the prying eyes and super computers of the
dreaded National Security Agency (NSA) of the United States
Government. Feel free to transmit your enciphered data anywhere
at anytime and know that if intercepted it cannot be deciphered.
Any size file, any type file, no matter what program it was
created with can be enciphered. Once transmitted it can be
deciphered with ease at the other end. All supporting files
required take only minutes to create with the 32 bit version of
Global Security or hours with the 16 bit version. The 32 and 16
bit versions are identical except that the 32 bit version
executes many times faster.
Now includes separate data compression/decompression routines
to compress up to 2,048 files into one file before enciphering,
preparation of text or binary files for transmission by any
Electronic Mail (E-Mail) Service, and separate wipe/delete file
routines to remove or wipe sensitive files.
For secure hand written correspondence between two people use
the One Time Pads that can be created. Ideal for short, secure
messages.
THE BILL OF RIGHTS TO THE U.S. CONSTITUTION - Amendment IV:
"The right of the people to be secure in their persons, houses,
papers, and effects, against unreasonable searches and seizures,
shall not be violated, and no warrants shall issue, but upon
probable cause, supported by oath or affirmation, and
particularly describing the place to be searched, and the
persons or things to be seized."
Global Security secures these rights for computer data.
Four Ways to Use Global Security Page 9
---------------------------------------------------------------
1) Encipher a file, transmit it or mail it on disk, and
decipher it on the other end. When this enciphering
method is used the resulting file can only be
transmitted as a binary file. Companies like CompuServe
and most BBS's allow you to upload and download binary
files. If the company you work for allows binary file
transmission between its different offices you can use
this method to transfer enciphered files back and forth.
2) Pack, encipher, and then Transform a file for E-Mail
transmission; then extract and reconstruct it at the
other end. E-Mail is now available to almost everyone
who has a computer. Individuals, companies, corpora-
tions, government agencies, etc. all use E-Mail to
send messages, data, and files across town or around
the world. Works on the Internet too.
3) Encipher files for storage on your hard disk and WIPE
the original file and all backup copies. This way
no one will be able to access the sensitive data in
the files except you. Not even your boss if you want
to keep secrets from him. If, at a later date, you
cannot for any reason decipher the files the data in
them will be lost.
4) Use the One Time Pads for short messages with anyone
that does not have a computer. The messages can be
sent by mail, telegram, messenger, or delivered by
phone conversation. Accuracy and attention to detail
are the key to using the One Time Pads effectively.
Any messages that are intercepted are safe from being
deciphered by anyone that does not have a copy of
the One Time Pad used to encipher it.
Computer Requirements
---------------------------------------------------------------
GS16.EXE - 16 Bit Version - 8086/88 and up computer.
GS32.EXE - 32 Bit Version - 80386 and up computer.
(Available as Registered Version Only)
Both Versions
---------------------------------------------------------------
DOS 3.0 and up.
Video Adapter CGA, EGA, VGA, MDA, HGC (MCGA and PGA may
work)
Disk Drives One hard and floppy disk recommended. Will
work with one floppy disk drive, but with
severe limitations.
Page 10
---------------------------------------------------------------
Printer Any printer that can accept CR, LF, and FF
control characters. If your printer accepts
the IBM line drawing characters they will
print out correctly.
Laser Printers All printouts from this program are designed
for printers with fan fold paper and may not
print correctly on laser printers. If you
still wish to try it on a laser printer make
sure it is setup for IBM or EPSON emulation
mode.
Mouse (optional) Any Microsoft or compatable mouse.
INSTALLING GLOBAL SECURITY Page 11
---------------------------------------------------------------
It is assumed that you are familiar with the operation of
your computer and content of your DOS manuals. If not, now
is the time to become familiar with your computer and DOS
manuals before you begin installing and using Global
Security.
The installation procedure for Global Security is very
simple. You will need at least 456K of free disk space to
store all of the programs and documentation files.
Use the INSTALL.EXE file to install the Global Security
files on any disk drive. At the DOS prompt type INSTALL
followed by a carriage return if you are logged onto the
drive and directory that INSTALL.EXE is in. Or if you are
on the C: drive and INSTALL.EXE is on the A: drive type
A:\INSTALL followed by a carriage return. You do not have
to be logged onto the drive and directory that INSTALL.EXE
is in. INSTALL.EXE will take over and guide you through the
installation process.
INSTALL.EXE checks itself and all of the programs in the
Global Security Package, except VENDINFO.DIZ, for signs of
alteration, tampering, or infection by a computer virus.
INSTALL.EXE allows you to select the files you wish to
install. It does not require you to install all the files
and then delete the ones you do not want.
INSTALL.EXE has very sophisticated error detection routines
that will tell you if anything goes wrong during the
installation process. While each file is being transferred
the data is verified by reading it back and comparing it
against the original data.
During the actual transfer process if any error is detected
you will be informed and installation will be stopped. This
will mean that you have a problem with the source or
destination disk that has to be taken care of before you
can continue the installation process.
EXECUTING GLOBAL SECURITY Page 12
---------------------------------------------------------------
Global Security may be executed from either a floppy or hard
disk drive. To minimize loading time it is recommended that
Global Security be run from a hard disk drive. Global
Security may be executed from a CD-ROM Disk but you cannot
create the GLOBAL.PRN File that saves screen images on a
CD-ROM Disk.
If you desire to execute Global Security from any directory,
the directory name that Global Security resides in must be
placed in the "PATH=" environment variable. Check your DOS
manual for more details. If the Directory is not in the
"PATH=" environment variable you will first have to log on
to the required directory with the following DOS Command:
"CD GLOBAL" assuming that "GLOBAL" is the directory name you
have the EXE file in.
Command Line Parameters
-----------------------------------------------------------
There are six command line parameters that can be entered
when you execute Global Security. They may be entered in
any order or combination, and in upper or lower case
letters.
1). /B - Forces a black and white display when Global
Security is executed. If you have a black and
white or monochrome monitor attached to a color
adapter and the screen colors do not appear
right use this command line parameter.
2). /P - forces a pause after printing each page. Use
this switch if your printer does not use fan
fold paper or have a paper tray. Has no effect
when using the Print Screen Key.
3). /T - Forces Global Security to use DOS Functions
to get the date and time instead of the Real
Time Clock. No effect on 8086/88 computers.
4). /V - Disables the VGA brighten, dim, blank, and
reset color routines. The code that performs
these functions may not be compatable with some
multitasking software.
5). /C - As a default setting, confirmation is asked
for each file that you wipe or delete. The /C
command line parameter disables this. As a
result confirmation will only be asked on files
with one or more of the Read-Only, Hidden, or
System attributes set.
Page 13
--------------------------------------------------------------
6). /I - As a default Global Security does a CRC_32
check on its EXE file everytime it is run. If
everything checks out O.K. the program
continues to run. If the CRC_32 value stored in
the EXE file does not match the one just
calculated Global Security will inform you that
it may be infected by a virus and then perform
a controlled exit. Since this feature may be
incompatable with some virus checking programs
that append check data to the end of an EXE
file you can turn this self-checking off with
the /I command line parameter.
From the DOS Prompt type in GS16 followed by the desired
command line parameters and press the Enter Key. Global
Security will load and be ready to run.
Examples
-----------------------------------------------------------
GS16 - Loads program with default settings.
GS16 /P - Forces a pause after printing each page.
GS16 /B /V - Forces a black and white display and turns
off the VGA routines.
GS16 /c /t /p - Turns off confirmation for all files,
forces DOS time and date functions, and
pause after printing each page.
WHAT YOU NEED TO KNOW TO USE GLOBAL SECURITY Page 14
---------------------------------------------------------------
Before doing anything with Global Security there are many
things about the program you need to know.
Windows 3.0 Compatability
-----------------------------------------------------------
Global Security runs full screen, in a window or in the
background. If you run Global Security under Windows it is
recommended that you run it full screen or in the back-
ground. When running in a window the mouse is not available
for use and some of the colors are not displayed correctly.
If you have a mouse the Mouse Pad will be displayed but you
will not be able to use it. Execution time within windows is
slowed down by a small percentage.
Windows 3.x, Windows NT, OS/2 2.x, etc.
-----------------------------------------------------------
Global Security has not been tested under these software
environments. If there are any problems try using command
line parameters /V and /T. If Global Security still does
not work correctly please inform TAN$TAAFL(TM) Software
Company so fixes can be made.
Functions of the "F" Keys
-----------------------------------------------------------
F1 Key - may be used at any time to pop up the current
Quick Help Reference System screen.
For VGA Only - (F2 - F5 Keys)
F2 Key - brightens the color intensity level.
F3_key - dims the color intensity level.
F4 Key - resets color intensity levels to their
original settings.
F5 Key - blanks the screen. Sets all color intensity
levels to 0.
F6 Key - appends the current screen image to the end
of a disk file called GLOBAL.PRN. If is does
not exist it will be created. The only screen
images you cannot save to disk are the
Critical Error Reporting System Screen and any
screen image while viewing an Enciphered File.
This file is created in the Global Security
directory and is compatable with any text
editor that can read ASCII files.
Page 15
---------------------------------------------------------------
F7 Key - is used to print the GLOBAL.PRN disk file.
When all the screen images have been success-
fully printed the file will be deleted. The F7
Key will only function from one of the main
menus. While you are creating files or
enciphering a file, etc, the F7 Key is
disabled.
F9 Key - cycles through five different mouse cursors.
F10 Key - used to toggle between the computers default
cursor and a full size block cursor. For
those hard to see cursors on laptops or within
Windows.
Other Keys
-----------------------------------------------------------
ESC Key - always backs you out of the program the way
you came in, all the way to DOS. Can be used at any time
except when a Critical Error Reporting System screen
or Printer Error Reporting System screen is active.
Print Screen Key - allows you to print the current
screen at any time while the program is running. Two
screens can be printed per page of paper. After two
screens have been printed the paper will have advanced
so the next two screens will appear on the next page.
There is room at the top to use a two hole punch and
save the screen shots in a folder.
Ctrl C and Ctrl Break Keys - are trapped by the program
and have no function.
The Pause Key - will pause the program. To start it up
again press any other key.
The Mouse
-----------------------------------------------------------
A menu item or command bar is selected by using the left
mouse button. Selection is made on the release of the
left button and not the press of the left button.
Right Mouse Button - Toggles between hiding and showing
the mouse pointer on screen.
The Mouse Pad is a replica of a numeric keypad and is
only displayed if your system has a mouse installed.
Clicking on a number enters that number into the
computer the same as using the keyboard.
The Chime Page 16
-----------------------------------------------------------
A chime will sound at the top of the hour, when an
invalid key is pressed during keyboard entry, and when
other procedures are completed. When any file has been
saved to disk or a procedure has been completed and no
action is taken a chime will sound 5 times at 2 minute
intervals to remind you that your computer is sitting
idle. If no action is taken within this time the chime
will stop. It will assume you are on an extended coffee
break.
HOT Keys
-----------------------------------------------------------
Most menu items and Command Bars have a Hot Key that may
be pressed to select the indicated menu item or Command
Bar. For monochrome or black and white monitors the Hot
Key is the first letter of the menu item or Command Bar.
Command Bars that indicate a keyboard key such as Home,
End, PgUp, etc. do not have a Hot Key. For computers
with a Mouse clicking on any menu item or Command Bar
mimics the behavior of the indicated Hot Key or keyboard
key.
Command Bars
-----------------------------------------------------------
Command Bars such as Help, Quit, Escape to Quit, etc.
are shadowed bars that appear throughout the program.
They indicate the available commands for use. They may
be selected by their Hot Keys or by clicking on them
with the left mouse button. When the mouse pointer is on
a Command Bar and you press the left mouse button the
shadow will change from black to grey. When you release
the left mouse button it will change back to black and
the command will be carried out. If you move the mouse
pointer off of the Command Bar before releasing the left
mouse button the shadow will change back to black but
the command will not be executed.
Command Bars such as Up, Down, Left, Right, PgUp, PgDn,
etc. indicate the keyboard keys that may be used. The
mouse may also be used on these Command Bars. Clicking
the left mouse button on one of these Command Bars
performs the same function as using the keyboard key.
Pressing and holding the left mouse button on one of
these Command Bars is the same as pressing and holding
the keyboard key down. Repeated commands are issued but
not as fast as from the keyboard.
Menus Page 17
-----------------------------------------------------------
Menus indicate the major functions the program performs.
They may be selected by using the indicated Hot Key or by
clicking on them with the left mouse button. When you
click the left mouse button on a menu the menu item will
be highlighted and when you release the left mouse button
the menu item will be selected. If you move the mouse
pointer off the menu item before you release the left
mouse button the menu item will be unhighlighted and not
selected.
File Selection Screen
-----------------------------------------------------------
The File Selection Screen is central to all parts of
Global Security. Every time you need to create or select
a file to use the File Selection Screen comes into play.
The File Selection Screen is in three parts: The Drive
Panel, the Directory Panel, and the File Panel. There is
a row of Command Bars below the panels and an Instruction
Line below the Command Bars.
The following are examples of the different sections
of the File Selection Screen taken from screen shots
on my computer. (They look better in full color.)
The Drive Panel
-------------------------------------------------------
╔═════════════════════════════════════════════
║ Global Security ■ 32 V3.00
║ TOP SECRET UMBRA/HANDLE VIA CO
╠═════════════════════════════════════════════
║ A: ▄ B: ▄ C: ▄ D: ▄
║ ▀▀▀▀ ▀▀▀▀ ▀▀▀▀ ▀▀▀▀
╟────────────────────────────────────────┬────
The Directory Panel
-------------------------------------------------------
╟────────────────────────
║ │ ├─HOMEBASE
║ │ ├─MAJESTIC
║ │ ├─SRC16
║ │ └─SRC32
║ ├─VIRUS
║ │ ├─FLU_SHOT
║ │ └─SCAN
║ ├─WEP
║ └─WINDOWS
║ ├─ICON
║ ├─MICROAPP
║ └─SYSTEM
The File Panel Page 18
-------------------------------------------------------
┬──────────────────────────────────
│ CLK32SRC ZIP 04-19-94 10:34:06 A
│ CRC32 ASM 04-21-94 16:06:56 A
│ DEFAULT ASM 08-17-94 10:26:54 A
│ ENC_DEC ASM 08-17-94 10:27:30 A
│ ERROR ASM 08-13-94 15:33:20 A
│ E_MAIL ASM 08-17-94 10:28:10 A
│ GS INC 08-07-94 10:42:10 A
│ GS32 MAK 08-17-94 10:22:52 A
│ GS32 STS 08-17-94 10:33:38 A
│ GS32SRC ZIP 08-17-94 10:33:58 A
│ H_D_T ASM 08-17-94 10:28:32 A
│ IO_PROC ASM 08-13-94 10:34:36 A
Command Bars
-------------------------------------------------------
╟────────────────────────────────────────┴
║ Up ▄ Down ▄ PgUp ▄ PgDn ▄ Home
║ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀
║ Mark ▄ UnMk ▄ AltM ▄ AltU ▄ ┌─────
║ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ │ Sele
╚═══════════════════════════════════╧═════
Instruction Panel
-------------------------------------------------------
──────┴─────────────────────────────────────╢
Home ▄ End ▄ ──┘ ▄ Quit ▄ Sort ▄ ║
▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ║
┌──────────────────────────────────────────╢
│ Select file(s) to Pack. ║
═╧══════════════════════════════════════════╝
Use the TAB Key to move from one panel to the next or
click the left mouse button anywhere within a panel to
select that panel. As a panel becomes selected, or
active, the drive boxes or lettering in a directory or
file panel changes from light white to bright white. The
lettering in the drive boxes or the highlighted selection
bar in the directory and file panels changes from blue to
red. This way if there is only one directory and one file
you can tell which panel is active by the color of the
lettering in the highlighted selection bar.
Page 19
---------------------------------------------------------------
The Drive Panel: The drive panel lists all disk drives
available to the system. Make the drive panel active and
highlight whichever drive you want by using the left and
right arrow keys or clicking the left mouse button on the
left and right arrow Command Bars below the panels. Then
press the enter key or click the left mouse button on
the " <──┘ " Command Bar to make that drive active. When
the new drive becomes active the Directory and File Panels
will be updated with information from the new drive.
Substituted Drives: Substituted drives for directory
names will produce an Extended Error Reporting System
Screen which tells you to use drives that have not been
substituted. If you try to execute Global Security
from a substituted drive the program will display an
Extended Error Reporting System Screen and then abort
the program. This applies to Assigned Drives also.
The Directory and File Panels: Select whichever one you
want to be active and use the Up, Down, PgUp, PgDn, Home,
or End keys to move through the different directories or
files. Clicking the left mouse button on the appropriate
Command Bar does the same. Pressing and holding down the
keyboard key or left mouse button on a Command Bar will
quickly move you in the desired direction within the
active panel. You can also use the Ctrl Key plus the
first letter of a directory or file name as a Hot Key to
quickly move to a known directory or file. Once you have
the correct drive, directory, and file highlighed use
the enter key or click the left mouse button on the
" <──┘ " Command Bar to send the drive, directory, and
file name back to the calling program as a fully
formated ASCIIZ file specification.
New to Global Security V3.00 is the addition of the Mark,
UnMk, AltM, and AltU Command Bars which allow you to
mark, unmark, mark all, or unmark all files for
selection. These Command Bars only appear when you use
the Pack/UnPack Files or the Wipe/Delete Files routines.
They allow the selection of multiple files for processing
by these routines. If no files are marked the file under
the highlighted selection bar is marked and returned
for processing.
Below the first line of Command Bars is a place for a
full line or half a line of instructions telling you
what type of file(s) to select depending on what function
the program is performing.
New also is the replacement of the Help Command Bar with
the Sort Command Bar. (The Help Screen can still be
accessed with the F1 Key.) The Sort Command Bar is only
active when the File Panel is active. It allows you to
sort files in ascending or descending order by file name,
file extension, date, time, or size.
Page 20
---------------------------------------------------------------
┌────────────────────────┐
│ File Sort Criteria │ Use the indicated Hot
│ │ Keys or the mouse to
│ Sort Files By: │ select the way you want
│ [ ] Name │ to sort the files. The
│ [√] Extension │ File Sort Criteria Screen
│ [ ] Date │ will stay displayed until
│ [ ] Time │ you get them sorted the
│ [ ] File Size │ way you want and then
│ │ select the Quit Command
│ Sort Order: │ to return you to the File
│ [√] (A..B..C...Z) │ Selection Screen. Each
│ [ ] (Z..Y..X...A) │ time you sort the files
│ │ the results are displayed
│ Sort ▄ Quit ▄ │ in the File Panel.
│ ▀▀▀▀▀▀ ▀▀▀▀▀▀ │
└────────────────────────┘
The Critical Error Reporting System
-----------------------------------------------------------
The Critical Error Reporting System reports on all
critical errors generated by DOS. When a critical error
is encountered a dialog box will appear with the critical
error information displayed. Below is an example for
trying to create a file on a write protected disk.
Disk Drive: A:
Disk Operation: Write
Disk Area Affected: Directory
Error Code: 00H
Error Message: Disk Write Protected
Below this information will be displayed four Command
Bars: Retry, Cancel, Abort, Help.
If you can correct the criticial error select Retry and
DOS will try to perform the operation again. In the above
example remove the write protection from the disk and
select Retry to allow DOS to perform the disk operation
again.
If you cannot or do not want to correct the error select
Cancel. DOS will cancel the operation and the program
will return you to an appropriate menu in the program.
If the error is severe enough select Abort and the
program will try to perform a controlled exit and return
the computer to a stable condition. 99.999% of the time
the program will be able to do so.
If for some reason the computer has locked up your only
recourse is to reset or reboot the computer.
Page 21
---------------------------------------------------------------
If you have a hard or floppy disk that is constantly
giving you critical error messages other than Disk Write
Protected or Drive Not Ready you can pretty much tell
which area of the disk is going bad and take steps to
preserve the data on the disk.
The Print Screen Key functions within the Critical Error
Reporting System, but the F6 and F7 Keys do not because
disk access is not allowed during critical error
processing.
The Extended Error Reporting System
-----------------------------------------------------------
The Extended Error Reporting System is used to report
DOS errors and program errors. It incorporates all known
DOS errors plus errors that pertain to the program. Since
the inclusion of the File Selection Screen in the program
it is hard to generate a DOS error because you cannot
enter a bad path or file name. I have included program
errors in this reporting system to present a common format
for reporting errors. In the example below the error is
generated because you have tried to finish a Prime Number
File that is already complete.
┌─────────────────────────────────────────────────────────
│ Extended Error Reporting System
│
│ DOS/BIOS Function: 3FH - Read File
│ File Name: TEST.PRM
│ Error Locus: Block Device
│ Error Class: Complete
│ Error Message: File is Already Complete
│ Recommended Action: Enter Correct Data
│
│
│ Ok ▄ Help ▄
│ ▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀
└─────────────────────────────────────────────────────────
There are two Command Bars displayed that you can use
at this point. One is "Ok" and the other is "Help".
Help calls up the Quick Help Reference Screen and Ok
returns you to an appropriate menu in the program.
All program generated errors are listed and explained
in the Errors Appendix of the documentation. To get a
listing of all DOS errors you will have to purchase a
book on DOS. At the present time there are close to 100
different errors that can be reported by DOS. Most are
self-explanatory.
The Printer Error Reporting System Page 22
-----------------------------------------------------------
The Printer Error Reporting System will report on any
errors encountered while printing. See the Errors
Appendix for complete details on all printer errors.
The following screen was generated because the printer
was not turned on.
┌──────────────────────────────────────┐
│ Printer Error Reporting System │
│ │
│ Printer [LPT1] Status │
│ │
│ NOT SELECTED │
│ │
│ │
│ Retry ▄ Cancel ▄ Help ▄ │
│ ▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀ │
└──────────────────────────────────────┘
At this point you could turn the printer on and select
Retry. Or you could select cancel and be returned to
an appropriate menu in the program.
Using a Printer
-----------------------------------------------------------
All printing is designed for printers using fanfold
paper. They may or may not print correctly on printers
that print on only a single sheet at a time or have
paper trays that feed single sheets of paper.
Printer Setup: All printers should be setup for 80
columns by 66 rows. Use the font of your choice. All
laser printers will have to be set for IBM or EPSON
emulation mode prior to printing with the program.
Commom Setup Problems:
1. Printer prints double spaces between lines:
printer is setup for an automatic line feed after
a cariage return. Consult your printer manual on
how to turn this off.
2. Printer does not print the extended ASCIIZ
character set. Consult your printer manual on how
to turn this feature on.
Page Pause: If you use the command line switch /P to
pause printing after each page a dialog box will pop
up at the end of each page that says "Printing Paused".
When you have the next page ready to go click the left
mouse button on Continue or press the "C" Hot Key.
The Mouse Pad Page 23
-----------------------------------------------------------
┌─┤ Mouse Pad ├─┐ The Mouse Pad allows easy entry of
│ │ numbers with the mouse for those lazy
│ 7 ▄ 8 ▄ 9 ▄ │ people who do not use a keyboard when
│ ▀▀▀ ▀▀▀ ▀▀▀ │ they do not have to. Use the Mouse
│ 4 ▄ 5 ▄ 6 ▄ │ Pad the same as you would a keyboard
│ ▀▀▀ ▀▀▀ ▀▀▀ │ numeric pad. When you press the left
│ 1 ▄ 2 ▄ 3 ▄ │ mouse button on a number the shadow
│ ▀▀▀ ▀▀▀ ▀▀▀ │ changes from black to grey and when
│ 0 ▄ ─ ▄ │ you release the left mouse button on a
│ ▀▀▀▀▀ ▀▀▀▀▀ │ number the shadow changes back to
│ Esc ▄ ─┘ ▄ │ black and the number is entered the
│ ▀▀▀▀▀ ▀▀▀▀▀ │ same as it would be from the keyboard.
└────────────────┘ The " ─ " pad is for backspacing,
erasing the last digit entered. The " Esc " pad needs no
explanation. The " ─┘ " pad is the enter key.
Differences Between 16 and 32 Bit Versions
-----------------------------------------------------------
All program features are supported in both versions of
Global Security. The only difference between the two
programs besides the different Intel microprocessors
they run on is speed of execution. The 32 bit version
has been optimized to use 32 bit registers for all math
computations. Because of this it runs considerably faster
than the 16 bit version. To build a file of 3,067 prime
numbers takes less than 20 minutes using GS32.EXE on a
80386DX 20 Mhz computer. Using GS16.EXE on the same
computer it takes anywhere from 2 to 4 hours. This is a
simple demonstration of the power of a 32 bit over a 16
bit computer.
USING GLOBAL SECURITY Page 24
---------------------------------------------------------------
When you first start Global Security the main menu at the
top of the screen looks like this.
╔════════════════════════════════════════════════════════════════════
║ Global Security ■ 32 V3.00 WEDNESDAY 17 AUG 1994 ■
║ TOP SECRET UMBRA/HANDLE VIA COMINT CHANNELS ONLY
╠════════════════════════════════════════════════════════════════════
║ Functions About Help Quit
╠═════════════════════════════════════╦═╦════════════════════════════
Selecting About displays a window with information about the
program and the Author.
Selecting Help displays the current Quick Help Reference System
screen.
Selecting Quit exits to DOS. This is the only one that does.
Selecting Functions displays the following screen.
══════════════════════════════════ These are the main
Functions About functions of Global
═════════════════════════════════╦ Security. Before
┌────────────────────────────────┐ you can Encipher
│ Build a Prime Number File │ or Decipher files,
│ Create a Default File │ Transform E-Mail
│ Scramble a Prime Number File │ Files, or Make One
│ Generate a Key File │ Time Pads you first
│ Pack/UnPack File(s) │ have to Build a Prime
│ Encipher/Decipher Files │ Number File, Create
│ Transform File for E-Mail │ a Default File,
│ Make a One Time Pad │ Scramble a Prime
│ Wipe/Delete File(s) │ Number File, and
│ Frequency Distribution Tests │ Generate a Key File.
├────────────────────────────────┤ These files are used
│ Quit │ by the pseudo random
└────────────────────────────────┘ number generators
in the enciphering and deciphering process. The Pack/UnPack
File(s) and Wipe/Delete File(s) Functions are stand alone
functions.
File Group
-----------------------------------------------------------
Now is a good time to introduce the concept of a File
Group. You must create four different types of files
before you can encipher or decipher files, and make One
Time Pads. The files are a Prime Number File with an
extension of 'PRM', a Default Parameter File with an
extension of 'DFT', a Scrambled Prime Number File with
an extension of 'SCM', and a Key File with an Extension
Page 25
---------------------------------------------------------------
of 'KEY'. A File Group would consist of 4 files with
the same name and the file extensions mentioned above
(e.g. YELLOW.PRM, YELLOW.DFT, YELLOW.SCM, and YELLOW.KEY).
When you encipher or decipher files, and make One Time
Pads you will be asked to select a KEY File which will
require a corresponding DFT File, and SCM File. You
could use the names of the people you frequently
exchange messages with. This way when you need to send
an enciphered message to TOM select TOM.KEY from the
File Selection Screen.
Build A Prime Number File
-----------------------------------------------------------
When you select Build a Prime Number File from the
Functions Menu the screen will change and the following
menu will be displayed:
TOP SECRET UMBRA/HANDLE VIA COMINT CHANNELS ONLY
═════════════════════════════════════════════════════════════════
Prime Number Files
Build Finish View Help Quit
──────────────────────────────┬─┬────────────────────────────────
Selecting Build
-------------------------------------------------------
┌────────────────────┐ When you select Build the File
│ Enter File Name: │ Selection Screen will appear
│ │ and you will be instructed to
│ ALPHA ▄ │ enter an eight character name
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │ for a Prime Number File. The
│ │ file extension of "PRM" will be
│ Escape to Quit ▄ │ added by the program. Once the
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │ name is entered you will be
└────────────────────┘ instructed to select a drive and
directory to place the file in.
Next you will be asked to enter a Search Factor and a
Starting Number for the prime number search.
┌──────────────────────────────────────────────────┐
│ Prime Number Search Paramenters │
│ │
│ Enter a Search Factor for the prime number │
│ search between 2 and 100,000. It must be an │
│ even number that ends with 0, 2, 4, 6, or 8. │
│ │
│ │
│ Enter Search Factor ── 42,968 ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │
│ │
│ │
└──────────────────────────────────────────────────┘
Page 26
---------------------------------------------------------------
┌──────────────────────────────────────────────────┐
│ Prime Number Search Paramenters │
│ │
│ Enter a Starting Number for the prime number │
│ search between 100,000,001 and 4,294,967,295. │
│ It must be an odd number that ends with 1, 3, │
│ 5, 7, or 9. │
│ │
│ Enter Starting Number ── 1,466,308,911 ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │
│ │
│ │
└──────────────────────────────────────────────────┘
Tests will be performed on these numbers to make sure they
are within the proper ranges and odd or even as required.
Another test is performed to make sure that the Search
Factor and Starting Number are not evenly divisible by a
common number. If they are you will be informed by the
Extended Error Reporting System and you will be asked to
enter another Starting Number.
The Search Factor determines which numbers after the Starting
Number will be tested for being prime. If the Search Factor
is 15 every 15th number will be tested. If it is 102 every
102nd number would be tested. If the test number exceeds
4,294,967,295 the test number will wrap around to a number
above 100,000,001. Once all tests are satisfactorily
completed the program will commence finding 3,067 prime
numbers.
Running stats are displayed while the program is testing and
finding prime numbers. The number found, the current test
number, and the last five prime numbers found are displayed
and updated as each test number is found to be prime or not.
In the Timer Box an elapsed timer informs you of how much
time it is taking.
In the Status Box the percent completed is displayed as a
numeric percent and as a bar graph.
In the Command Box you have the option of selecting Yes or
No to saving a partially completed Prime Number File. If
you select No the file will not be saved and it will be
deleted from the disk. If you select Yes all the prime
numbers found and all the data needed to restart and finish
the file will be saved to disk.
Once the program has found all 3,067 prime numbers they will
be saved to disk, a dialog box will pop up to inform you that
the file has been saved and a chime will sound.
Selecting Finish Page 27
-----------------------------------------------------------
When you select Finish the File Selection Screen will appear
and you will be asked to select the "PRM" File you wish to
finish. The file will be read and the search for prime numbers
will commence where it left off when the partially completed
file was saved to disk. If the file you select is already
complete the Extended Error Reporting System will inform you
and you will be asked to select another file or Quit.
Selecting View
-----------------------------------------------------------
When you select View the File Selection Screen will appear
and you will be asked to select the "PRM" File you wish to
view. When the file contents are displayed use the PgUp,
PgDn, Home, or End Keys to page back and forth through the
file or use the Mouse on the PgUp, PgDn, Home, and End
Command Bars to page back and forth through the file. This
applies to "SCM", "KEY", "ENC", and "EEM" files too.
Selecting Help
-----------------------------------------------------------
When you select Help the current Quick Help Reference System
Screen will pop up. This applies to all menus with Help in
them.
Selecting Quit
-----------------------------------------------------------
Select Quit to return to the Function Menu. This applies to
all program segments in the Function Menu.
Create A Default Parameter File Page 28
-----------------------------------------------------------
When you select Create a Default Parameter File the screen
will change and the following menu will be displayed:
TOP SECRET UMBRA/HANDLE VIA COMINT CHANNELS ONLY
══════════════════════════════════════════════════════════════
Default Parameter Files
Create View Help Quit
──────────────────────────────┬─┬─────────────────────────────
Selecting Create
-----------------------------------------------------------
When you select Create the File Selection Screen will appear
and you will be asked to select a "PRM" File to create a
"DFT" File for. If you have to change drives and/or
directories to find where the "PRM" Files are do so. When
you make your selection the new "DFT" File will be given
the same name as the "PRM" File with a file extension of
"DFT". If the file already exists the Extended Error
Reporting System will inform you and you will be returned
to the File Selection Screen to make another selection or
Quit.
You will then be asked to enter 7 numbers between 1 and
2,048. Duplicate numbers are not allowed. These 7 numbers
specify where the 7 password characters used to encipher
and decipher a file are placed in the header added to any
file that is enciphered. Use the keyboard or the Mouse Pad
if you have a mouse to enter the numbers.
Next you will be asked to enter a Random Factor Array Shift
between 16 and 24 used by the pseudo random number
generators. Once this is entered the numbers will be saved
to the specified file on disk.
Selecting View
-----------------------------------------------------------
When you select view the File Selection Screen will appear
and you will be asked to select the "DFT" File you want to
view. If you have to change drives and/or directories to
find the desired "DFT" File do so.
Scramble A Prime Number File Page 29
-----------------------------------------------------------
When you select Scramble A Prime Number File the screen will
change and the following menu will appear:
TOP SECRET UMBRA/HANDLE VIA COMINT CHANNELS ONLY
══════════════════════════════════════════════════════════
Scramble Prime Number Files
Scramble Rescramble View Help
───────────────────────────────┬─┬────────────────────────
Selecting Scramble
-----------------------------------------------------------
Selecting Scramble is for scrambling an original "PRM" File.
You can only do this one time. The File Selection Screen
will appear and you will be asked to select the "PRM" File
you wish to scramble. The associated "DFT" File must be
present also. If you have to change drives and/or directories
to find the desired "PRM" File do so. If the selected "PRM"
File has already been scrambled the Extended Error Reporting
System will inform you and return you to the File Selection
Screen to select another "PRM" File or Quit.
You will then be asked to enter 5 seed numbers to scramble
the "PRM" File 5 times. The first time through the "PRM"
File acts as the base file for scrambling. The 2nd time
through the new scrambled file acts as the base file and
this file is scrambled into a new file. Each time through
the new scrambled file acts as the next base file. Once it
is scrambled 5 times the file is saved to disk with the
same name as the "PRM" File but a file extension of "SCM".
The "PRM" File remains on disk unchanged.
Selecting Rescramble
-----------------------------------------------------------
Rescramble is for scrambling a "SCM" File. You can and
should do this as many times as possible. The more times
you scramble and rescramble a "SCM" File the harder it will
be for anyone to duplicate your efforts. Select the "SCM"
File to rescramble from the File Selection Screen. The
associated "DFT" File must be present also. If you have to
change drives and/or directories to find the desired "SCM"
File do so. You will then be asked to enter 5 seed numbers.
Once the "SCM" File has been scrambled 5 times the new "SCM"
File will replace the old "SCM" File on disk.
Selecting View
-----------------------------------------------------------
When you select view the File Selection Screen will appear
and you will be asked to select the "SCM" File you want to
view. If you have to change drives and/or directories to
find the desired "SCM" File do so.
Generate A Key file Page 30
-----------------------------------------------------------
When you select Generate a Key File the screen will change
and the following menu will be displayed:
TOP SECRET UMBRA/HANDLE VIA COMINT CHANNELS ONLY
══════════════════════════════════════════════════════════════
Key Files
Generate Scramble View Help Quit
──────────────────────────────┬─┬─────────────────────────────
Selecting Generate
-----------------------------------------------------------
Selecting Generate allows you to create a "KEY" File. The
File Selection Screen will appear and you will be asked to
select a "SCM" File to generate a "KEY" File for. The
associated "DFT" File must be present also. If you have to
change drives and/or directories to find the desired "SCM"
File do so. If a "KEY" File already exists for the "SCM"
File the Extended Error Reporting System will inform you
and you will be returned to the File Selection Screen to
select another or Quit.
You will then be asked to enter a seed number in the range
between 100,000,001 and 4,294,967,295. Once the "KEY" File
is generated it is saved to disk with the same name as the
"SCM" File but a file extension of "KEY".
This is the largest file created by Global Security. It is
172,800 bytes long and holds 43,200 randomly generated
numbers between 100,000,001 and 4,294,967,295.
Selecting Scramble
-----------------------------------------------------------
Selecting Scramble allows you to scramble a "KEY" File.
Select the "KEY" File you wish to scramble from the File
Selection Screen. The associated "SCM" and "DFT" Files must
be present also. If you have to change drives and/or
directories to find the desired "KEY" File do so. Then enter
the seed number and the file will be scrambled. The new
scrambled "KEY" File will replace the old "KEY" File on disk.
This should be done as often as possible.
Selecting View
-----------------------------------------------------------
Select the KEY File you wish to view from the File Selection
Screen.
Page 31
---------------------------------------------------------------
Now you have a complete File Group. A PRM, SCM, DFT, and a
KEY File. The person you will be exchanging enciphered
messages with will need a copy of these files. The only
other requirement is a Password List (optional). If you want
to use a different password for each message, or each day,
or each week, or each month is up to you. A list will have to
be maintained, and it must be kept in a safe secure place
along with the Group Files. If you do not use a password the
program will select a default password. Anyone trying to put
the message through the program with a different set of Group
Files will always get invalid password when he tries to
decipher it.
SPECIAL NOTE
-----------------------------------------------------------
"Any repetition of any kind in the keys of cryptograms under
analysis imperils them and perhaps dooms them to solution.
It does not matter whether the repetitions lie within a
single message or among several, arise from the interaction
of repeating primary keys or from the simple repeating of
a single long key. Repetitions in the key cannot be
permitted." "The Codebreakers" page 398 by David Kahn.
A set of Group Files contains only 43,200 sets of keys. If
one set of Group Files were to be used to encipher and
transmit hundreds or thousands of files/messages there is
a chance that one or more would be enciphered by the same
set of keys. These messages enciphered with the same set
of keys would then be open to analysis and possible
deciphering. A set of Group Files should therefore be used
to transmit only 10 to 25 files/messages and then they
should be changed.
Pack/UnPack File(s) Page 32
-----------------------------------------------------------
New to Global Security V3.00 is the separate Pack/UnPack
File(s) Function. When selected the following menu will be
displayed:
TOP SECRET UMBRA/HANDLE VIA COMINT CHANNELS ONLY
═════════════════════════════════════════════════════════════
Pack/UnPack Files
Pack UnPack Help Quit
─────────────────────────────┬─┬─────────────────────────────
Selecting Pack
-----------------------------------------------------------
┬───────────────────────────────── When you select Pack
│ CRC32 ASM 04-21-94 16:06:56 A the File Selection
│DEFAULT ASM 08-17-94 10:26:54 A Screen will appear
│ENC_DEC ASM 08-17-94 10:27:30 A and you can select
│ERROR ASM 08-13-94 15:33:20 A the file(s) to Pack
│E_MAIL ASM 08-17-94 10:28:10 A into one file. You
│H_D_T ASM 08-17-94 10:28:32 A may use the Mark
│ IO_PROC ASM 08-13-94 10:34:36 A Hot Key, the + Key,
or the mouse in the
Mark Command Bar to select files to pack. The UnMark Hot
Key, the - Key, or the mouse in the UnMark Command Bar may
be use to unmark a selection. The Alt Key with the "M" Key
will mark all the files, and the Alt Key with the "U" Key
will unmark all the files. Prior to selecting the files to
pack you can sort the files in any order to make selection
easier.
Once the files are selected you have to enter a file name
for the packed files. A file extension of "PKD" will be added
by Global Security. Then select the drive and directory for
the packed file. While the files are being packed the
following will be displayed:
┌────────────────────────────────────────────────────────────┐
│ Pack File(s) │
│ │
│ Creating : EXPD32.PKD ▄ ┌─┤ Packing........ ├─┐ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │ 4 E_MAIL.ASM │ │
│ File(s) to Pack: 5 ▄ │ 3 ERROR.ASM │ │
│ ▀▀▀▀▀▀▀ │ 2 ENC_DEC.ASM │ │
│ Size of File(s): 283,815 ▄ │ 1 DEFAULT.ASM │ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │ │ │
│ ┌────────┤ STATUS ├────────┐ └─────────────────────┘ │
│ │ 40% Complete │ │
│ │ 63% Compression │ │
│ │ 28,800 Codes Used │ 00:00:14 ▄ │
│ │ 70,901 Bytes Saved │ ▀▀▀▀▀▀▀▀▀▀ │
│ └────────────────────────────┘ Quit ▄ │
│ ▀▀▀▀▀▀▀▀▀▀ │
└────────────────────────────────────────────────────────────┘
Page 33
---------------------------------------------------------------
Once all the files are packed the following will be
displayed:
┌────────────────────────────────────────┐
│ Procedure Complete │
│ Packed File Status │
│ │
│ EXPD32.PKD ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │
│ % Compression Bytes Saved │
│ 64% ▄ 179,794 ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │
│ Original Size Packed Size │
│ 283,815 ▄ 104,021 ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │
│ Ok ▄ │
│ ▀▀▀▀▀▀▀▀▀▀ │
└────────────────────────────────────────┘
LIMPEL-ZIV-WELCH Algorithm
-----------------------------------------------------------
The data compression/decompression routines used by Global
Security are highly modified Lempel-Ziv-Welch algorithms.
They use a 9 to 14 bit code which is reset to the lowest
code size as each 16,384 element code table is filled. I
have achieved data compression rates as high as 68% on some
text files. The data compression rates achieved on your
files will depend on the type of files and their content.
A CRC_32, 32 bit Cyclic Redundancy Check, value is computed
for each file that is compressed or stored in the packed
file. When the file is decompressed or extracted the value
is computed again and compared against the one stored in
the file header.
If a file cannot be compressed to a smaller size it will be
stored in the packed file in its original form.
Selecting UnPack Page 34
-----------------------------------------------------------
When you select UnPack the File Selection Screen will be
displayed and you can select the file to unpack. Then select
the drive and directory to place the unpacked files into.
While the files are being unpacked, or extracted, the
following will be displayed:
┌────────────────────────────────────────────────────────────┐
│ UnPack A File │
│ │
│ UnPacking: EXPD32.PKD ▄ ┌─┤ UnPacking...... ├─┐ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │ 4 E_MAIL.001 │ │
│ File(s) to UnPack: 5 ▄ │ 3 ERROR.001 √ │ │
│ ▀▀▀▀▀▀▀ │ 2 ENC_DEC.001 √ │ │
│ Size of File(s): 283,815 ▄ │ 1 DEFAULT.001 √ │ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │ │ │
│ ┌────────┤ STATUS ├────────┐ └─────────────────────┘ │
│ │ 44% Complete. │ │
│ │ 32,600 Codes Used │ │
│ │ 45,765 In Count │ 00:00:06 ▄ │
│ │ 120,757 Out Count │ ▀▀▀▀▀▀▀▀▀▀ │
│ └────────────────────────────┘ Quit ▄ │
│ ▀▀▀▀▀▀▀▀▀▀ │
└────────────────────────────────────────────────────────────┘
The "√" after each file name after it has been decompressed
or extracted means that the files CRC_32 Data Integrity
Check is O.K.
┌──────────────────────────┐
│ Procedure Complete │
│ File(s) UnPacked │ After all the files have
│ │ been decompressed or
│ 5 ▄ │ extracted this will be
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │ displayed. It informs
│ FILE CRC_32 DATA │ you of the final status
│ INTEGRITY CHECKS │ of the CRC_32 Data
│ [ 5] O.K. │ Integrity Checks on the
│ [ ] Failed! │ files.
│ │
│ Ok ▄ │
│ ▀▀▀▀▀▀▀▀▀▀ │
└──────────────────────────┘
Encipher/Decipher a File Page 35
-----------------------------------------------------------
When you select Encipher/Decipher a File the following menu
will be displayed:
══════════════════════════════════════════════════════════════
Encipher/Decipher a File
Encipher View Decipher Help Quit
──────────────────────────────┬─┬─────────────────────────────
Selecting Encipher
-----------------------------------------------------------
When you select Encipher the File Selection Screen will
appear and you will be asked to select the file you wish to
encipher. If you have to change drives and/or directories to
find the desired file do so. You will then be asked to
select a destination drive and directory to place the
enciphered file into. If the file is already enciphered the
Extended Error Reporting System will inform you and return
you to the File Selection Screen to select another file or
Quit. Next you will be asked to select a KEY File to use
to encipher the file. The associated SCM and DFT files must
be present also. If you have to change drives and/or
directories to find the desired KEY File do so. After you
have selected the KEY File to use you will be asked to enter
up to a 7 character password.
┌──────────────────────────────────────────────────┐
│ Encipher/Decipher a File │
│ │
│ Enter a 7 character Password to use to │
│ Encipher your file. It can be any character │
│ you can enter from the keyboard including │
│ those entered with the CTRL or ALT Keys. │
│ │
│ Enter Password ── 1234567 ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀ │
│ Escape to Quit ▄ Insert ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀ │
└──────────────────────────────────────────────────┘
SPECIAL NOTE
-----------------------------------------------------------
"Any repetition of any kind in the keys of cryptograms under
analysis imperils them and perhaps dooms them to solution.
It does not matter whether the repetitions lie within a
single message or among several, arise from the interaction
of repeating primary keys or from the simple repeating of
a single long key. Repetitions in the key cannot be
permitted." "The Codebreakers" page 398 by David Kahn.
A set of Group Files contains only 43,200 sets of keys. If
one set of Group Files were to be used to encipher and
transmit hundreds or thousands of files/messages there is
a chance that one or more would be enciphered by the same
set of keys. These messages enciphered with the same set
of keys would then be open to analysis and possible
deciphering. A set of Group Files should therefore be used
to transmit only 10 to 25 files/messages and then they
should be changed.
Page 36
-------------------------------------------------------------------
Next you will be asked to enter any Special Instructions
for whoever will decipher the file. These instructions will
be displayed before the file is deciphered. The Special
Instruction section may also be used to pass authentication
phrases so the person receiving the file knows it is genuine
and not sent under duress. The absence or presence of a word
or phrase can indicate if the enciphered file is genuine
or not.
┌────────────────────────────────────────────────────────
│ Encipher a File
│
│ Enter Special Instructions to follow when deciphering t
│ If there are None press the Enter Key to continue.
│
│ Pass this deciphered file on to Jim in accounting.
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
│ Escape to Quit ▄ Insert ▄
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀
└────────────────────────────────────────────────────────
While the file is being enciphered the follow will be
displayed:
┌────────────────────────────────────────────────────────────┐
│ Encipher/Decipher a File │
│ │
│ Enciphering File: EXPD32.PKD ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │
│ Enciphered File will be called: EXPD32.ENC ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │
│ ┌─────────────────────────────────┐ │
│ │ File Group Used ─»» ALPHA │ │
│ │ Password Used ───»» 1234567 │ │
│ │ Date Used ───────»» 08-17-94 │ 00:00:02 ▄ │
│ │ Time Used ───────»» 11:08:16 │ ▀▀▀▀▀▀▀▀▀▀ │
│ └─────────────────────────────────┘ Quit ▄ │
│ ▀▀▀▀▀▀▀▀▀▀ │
└────────────────────────────────────────────────────────────┘
A CRC_32, 32 bit Cyclic Redundancy Check, value is computed
for the enciphered file. When the file is deciphered the
value is computed again and compared against the one stored
in the file header.
Selecting View
-----------------------------------------------------------
If you wish to see what an enciphered file looks like select
view. The File Selection Screen will appear and ask you to
select the "ENC" File you wish to view. If you have to change
drives and/or directories to find the desired file do so. The
file will then appear and you can page through it the same way
as viewing any of the other files. The largest "ENC" File you
can view is 5,952,000 bytes long. You can encipher and decipher
files of any length allowed by DOS so do not worry about this
limitation. The Print Screen Key and the F6 Key are disabled
while viewing an enciphered file.
Selecting Decipher Page 37
-----------------------------------------------------------
When you select decipher the File Selection Screen will
appear and you will be asked to select the File you wish to
decipher. If you have to change drives and/or directories to
find the desired file do so. You will then be asked to select
the destination drive and path to place the deciphered file
into. The file to decipher will then be opened, the name of
the "KEY" File and the Date/Time Stamp of the original file
will be read from the file header, and then the file will be
closed. If any Special Instructions are stored in the file
header they will be displayed at this time. You will be given
the option of continuing or quiting the deciphering process.
You will then be asked to select the "KEY" File whose name
is shown that is required to decipher the file. If you have
to change drives and/or directories to find the designated
"KEY" File do so. The associated "SCM" and "DFT" Files must
be present also. These files will be opened and read into
memory.
You will then be asked to enter the password required to
decipher the file. It must be exactly the same as the one
used to encipher the file or you will constantly get invalid
password reported by the Extended Error Reporting System. If
you make a mistake in entering the password you will have as
many tries as you like to get it correct. Once the password
checks out the file will be deciphered and saved to disk
with the same name as the original file. The file will be
the same size as the original with the same DOS Date/Time
Stamp, attributes, and the same name. If a file with the
same name already exists in the directory the file will be
given an extension of "001", "002", etc., all the way up to
"999" if required.
As the file is being deciphered the following will be
displayed:
┌────────────────────────────────────────────────────────────┐
│ Encipher/Decipher a File │
│ │
│ Deciphering File: EXPD32.ENC ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │
│ Deciphered File will be called: EXPD32.PKD ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │
│ ┌─────────────────────────────────┐ │
│ │ File Group Used ─»» DON_GREG │ │
│ │ Password Used ───»» 1234567 │ │
│ │ Date Used ───────»» 08-17-94 │ 00:00:03 ▄ │
│ │ Time Used ───────»» 11:08:16 │ ▀▀▀▀▀▀▀▀▀▀ │
│ └─────────────────────────────────┘ Quit ▄ │
│ ▀▀▀▀▀▀▀▀▀▀ │
└────────────────────────────────────────────────────────────┘
Page 38
---------------------------------------------------------------
The following will be displayed once the file is deciphered:
┌────────────────────────────┐
│ Procedure Complete │ You will be informed
│ File on Disk │ if the CRC_32 Data
│ │ Integrity Check is Ok
│ EXPD32.PKD ▄ │ or if it failed. You
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │ will also be informed
│ CRC_32 INTEGRITY CHECK │ if the file needs to
│ [√] O.K. [ ] FAILED! │ be decompressed and
│ │ by whom. This is not
│ Decompression Required By: │ an all inclusive list.
│ [ ] N/A │ If the file needs to
│ [√] Global Security │ be decompressed with
│ [ ] PKUNZIP │ a different program
│ [ ] LHA │ this information can
│ │ be passed in the
│ Ok ▄ │ Special Instructions.
│ ▀▀▀▀▀▀▀▀▀▀ │
└────────────────────────────┘
Transform File for E-Mail Page 39
-----------------------------------------------------------
When you select Transform File for E-Mail the screen will
change and display the following menu:
═══════════════════════════════════════════════════════════════
Transform File for E-Mail
Transform Extract Reconstruct Help Quit
───────────────────────────────┬─┬─────────────────────────────
What is Electronic Mail (E-Mail)?
-----------------------------------------------------------
Most E-Mail Services like MCI only accept character codes
32 to 127, the carriage return, line feed, and tab codes.
All other character codes, like the line drawing codes above
127, are ignored. For this reason a file to be transmitted
by an E-Mail Service must be handled differently.
Global Security will transform any text or binary file for
transmission by any E-Mail Service. Once received it will
extract and reconstruct it. The transformation process uses
the High RADIX 64 file format. This format takes three bytes
of data, 24 bits, and converts it into 4 bytes of data six
bits at a time. Each 6 bits is converted to a +, a /, a
number between 0 and 9, or a capital or small letter between
A and Z. This range of characters should be acceptable by
any E-Mail service in the world, including a MIME mail
system because there will be no conflict over the use of the
'=' character which is not used by the High RADIX 64 file
format. A carriage return and line feed characters are
inserted after every 64 bytes of data. This results in a
file that is approximately 33 to 36 percent larger than the
original. Because of this it is always best to compress the
file before it is enciphered and then transformed for
transmission by E-Mail.
Most people download their E-Mail only once or twice a day
and it gets placed into one file. Because it is possible to
have more than one High RADIX 64 message in this file Global
Security scans the file and will find and extract each
message in the file and place it into a seperate file in the
selected directory.
As you can see, with the addition of routines for E-Mail,
Global Security is a much more powerful program than before.
Most large businesses, corporations, governments, etc. use
E-Mail every day to transmit messages across town or around
the world. Now the messages can be transmitted without fear
of anyone being able to decipher and read them. If the home
office in Washington D.C. needs a legal brief from a branch
office in Japan within the next few hours the only way to
get it there that fast may be by E-Mail. If the brief will
have a major impact on Wall Street if intercepted by the
wrong people, it must be enciphered before it is transmitted.
Global Security is the only program available that can do
the job and not even the National Security Agency (NSA) of
the United States Government will be able to decipher the
message.
Selecting Transform Page 40
-----------------------------------------------------------
When transform is selected you will be asked to select the
file to transform from the File Selection Screen, and the
destination drive and directory to place the transformed
file into. Once the selection is made the following screen
will pop up and you can select to break up the file into
smaller files or retain its original size.
┌───────────────────────────────────────┐ Many E-Mail
│ Transform File for E-Mail │ services, like
│ │ the Internet,
│ TREE.ASM = 132,957 Bytes ▄ │ only accept
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │ files that are
│ Break File into Files of: │ under a certain
│ [√] Original Size │ length. Global
│ [ ] 10 KB │ Security lets
│ [ ] 20 KB │ you break up a
│ [ ] 30 KB │ large file into
│ [ ] 40 KB │ many smaller
│ [ ] 50 KB │ ones that are
│ [ ] 60 KB │ acceptable to
│ │ the E-Mail
│ ──┘ ▄ Quit ▄ │ service you are
│ ▀▀▀▀▀▀ ▀▀▀▀▀▀ │ using. If you
└───────────────────────────────────────┘ select Original
Size the file will not be broken up into smaller ones. If
you select 20 KB the file will be broken up into files that
are 20 KB (plus CR, LF's added) long. The size of the last
file will vary. Each file will be given a file extension
of 001, 002, etc., up to 999. All the information needed
to reconstruct these files back into the original file is
passed in the header for the Reconstruct routine.
The file is then transformed into one or many files in the
High RADIX 64 file format and placed in the selected
directory. It is now ready for transmission by any E-Mail
service in the world.
Selecting Extract
-----------------------------------------------------------
When you download your E-Mail for the day you may have one
or more messages in the High RADIX 64 format in the E-Mail
file. Extract will extract each message and place it in a
file of its own. Any header or trailer added by the E-Mail
service will be discarded. If the E-Mail file is all one
message you still have to use the Extract routine to remove
any headers and trailers added by the E-Mail service. The
Reconstruct routine expects a file's High RADIX 64 format ID
to be at the beginning of the file it will reconstruct.
All information between the High RADIX 64 format ID and the
High RADIX 64 end ID is placed in the file.
Select the file to extract messages from from the File
Selection Screen. Then select the drive and directory to
place them into.
Page 41
-----------------------------------------------------------
┌──────────────────────────────────┐ A screen will pop up
│ Separate High RADIX 64 File(s) │ displaying the status
│ │ of the files as they
│ From: BONUS.EEE ▄ │ are being extracted.
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │ A "√" is placed after
│ ┌─┤ Extracted..... ├─┐ │ each file as its
│ │ 3 TREE.003 √│ │ extraction is complete.
│ │ 2 TREE.002 √│ │ If a file is encountered
│ │ 1 TREE.001 √│ │ that does not have
│ │ │ │ an end ID you will
│ │ │ │ get a message informing
│ └────────────────────┘ │ you that end of file
│ │ was reached before
│ │ end of extraction.
│ Ok ▄ │ The procedure will
│ ▀▀▀▀▀▀▀▀▀▀ │ then be cancelled.
└──────────────────────────────────┘
Selecting Reconstruct
-----------------------------------------------------------
First select the drive and directory to place the
reconstructed file into. Then select the file or files to
reconstruct. If you have three or four files that need to
be reconstructed into one file they all have to be selected.
If you select too many or not enough you will be informed
and asked to select the proper number of files again. The
file extensions should be numbered 001, 002, etc. If you
used the extraction routine after you received the file via
E-Mail this will be the case since the extraction routine
gets the correct file name and extension out of the header.
┌────────────────────────────┐ As each file is being
│ File Reconstruction Data │ processed its data is being
│ │ checked for integrity. A
│ FILE CRC_32 DATA │ CRC 32 value is calculated
│ INTEGRITY CHECKS │ for the file and checked
│ [ 4] O.K. │ against the one stored in
│ [ ] Failed! │ the header. When the file,
│ Decryption Required? │ or files, are reconstructed
│ [√] Yes [ ] No │ a dialog box will pop up
│ Decomp. Required by: │ to give you the results of
│ [√] N/A │ the file reconstruction.
│ [ ] Global Security │ The number of files that
│ [ ] PKUNZIP │ passed or failed their
│ [ ] LHA │ integrity checks will be
│ │ displayed. You will be
│ Ok ▄ │ informed if the file needs
│ ▀▀▀▀▀▀▀▀▀▀ │ to be deciphered or not.
└────────────────────────────┘ If not, you will be informed
if the file needs to be decompressed by Global Security or
one of the popular data compression programs.
Page 42
-----------------------------------------------------------
If a file is transmitted by E-Mail to different countries
and through many different E-Mail systems or gateways there
is a chance that because of different formats the data may
get changed along the way. Using the High RADIX 64 file
format helps to prevent these errors. Since the file
consists only of the most common ASCII characters, carriage
returns, and line feeds it should make it through most
E-Mail Systems without being changed.
The characters that are most likely to be changed are the
carriage returns and line feeds at the end of each line.
This is because some systems use only carriage returns to
end a line and throw out the line feed or vise versa. Global
Security takes this into account during the extraction and
reconstruction routines. The extraction routine depends on
the start and end ID strings. Any data between the two is
considered part of the message. The reconstruction routine
discards all carriage returns, lines feeds, and data that
is not a valid High RADIX 64 character. It relies on
information in the header for the number of bytes to process
during reconstruction. The only time an error will occur
is if one or more bytes of good data are removed, added or
changed in the file between the start and end ID's.
Make a One Time Pad Page 43
-----------------------------------------------------------
When you select Make a One time Pad the screen will change
and the following menu will be displayed:
═══════════════════════════════════════════════════════════════
Make a One Time Pad
Make Instructions Help Quit
───────────────────────────────┬─┬─────────────────────────────
What is a One Time Pad
-----------------------------------------------------------
A One Time Pad allows you to encipher and decipher written
correspondence between two people. It is a pad with randomly
generated letters (and the '-' for word spacing) in the top
row. On the next row down write out the message you wish to
encipher or decipher. Then using the Vigenere Tableau and
the provided instructions encipher or decipher the message
and place the enciphered or deciphered text on the bottom
line. If you were enciphering a message transfer the
enciphered text to a Message Pad for mailing or delivering.
This is ideal for short messages. Once you reach a large
volume of messages a computer is more appropriate. Great fun
for kids to use too. See examples starting on Page 55.
Selecting Make
-----------------------------------------------------------
When you select make the File Selection Screen will appear
and you will be asked to select a "SCM" File to use to make
a One Time Pad. The associated "DFT" File must be present
also.
You will then be asked to enter a seed number between
100,000,001 and 4,294,967,295 and a 7 character Pad ID.
┌──────────────────────────────────────────────────┐
│ Make a One Time Pad │
│ │
│ Enter a 7 character Pad Identification String. │
│ It can be any ALPHA character that you can │
│ enter from the keyboard between character codes │
│ 32 (space) and 126. │
│ │
│ Enter Pad ID String ── 1-1A-1B ▄ │
│ ▀▀▀▀▀▀▀▀▀ │
│ Escape to Quit ▄ Insert ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀ │
└──────────────────────────────────────────────────┘
Page 44
---------------------------------------------------------------
The Pad ID lets you tell one pad from another. If you
exchange encrypted messages with two or more people you can
use names to distinguish which pad to use with each person.
Once these are entered the One Time Pad and a Message Pad
will be sent to the printer. Each One Time Pad is 7 pages
long (14 half pages) as is each Message Pad. Two copies of
each are printed. You have the option of quiting before the
printing is finished.
┌──────────────────────────────────┐
│ Printing Of │
│ │
│ ONE TIME PAD │
│ MESSAGE PAD │
│ │
│ In Progress │
│ │
│ Quit ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀ │
└──────────────────────────────────┘
Selecting Instructions
-----------------------------------------------------------
This prints out the Vigenere Tableau and the Instructions
for using the One Time Pads. You can select anywhere from
1 to 99 copies. Once printed they can be laminated for easier
use.
Wipe/Delete Files Page 45
-----------------------------------------------------------
When you select Wipe/Delete Files the following menu will
be displayed:
═════════════════════════════════════════════════════════════
Wipe/Delete File(s)
Wipe Delete Help Quit
─────────────────────────────┬─┬─────────────────────────────
Selecting Wipe
-----------------------------------------------------------
When you select the wipe file function the File Selection
Screen will appear and you can select the files you desire
to wipe.
┬─────────────────────────────────
│DEFAULT 001 08-17-94 10:26:54 A The files marked
│ENC_DEC 001 08-17-94 10:27:30 A to be wiped will
│ERROR 001 08-13-94 15:33:20 A have an arrow to
│EXPD32 001 08-17-94 11:08:16 A the left of the
│E_MAIL 001 08-17-94 10:28:10 A file name. Select
│H_D_T 001 08-17-94 10:28:32 A as many files as
│EXPD32 002 08-17-94 11:08:16 A you want. When you
│ CRC32 ASM 04-21-94 16:06:56 A return the following
screen will appear
and you will have the option to proceed or quit.
┌────────────────────────────────────────────────────────────┐
│ Wipe/Delete File(s) │
│ │
│ File(s) to WIPE: 3 ▄ ┌─┤ WIPING......... ├─┐ │
│ ▀▀▀▀▀▀▀ │ │ │
│ Size of File(s): 429,284 ▄ │ │ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │ │ │
│ │ │ │
│ │ │ │
│ ┌────────────────────────────┐ └─────────────────────┘ │
│ │ A Govt. WIPE on selected │ │
│ │ files is being performed. │ │
│ │ After a file is WIPED its │ Proceed ▄ │
│ │ data CANNOT be recovered. │ ▀▀▀▀▀▀▀▀▀▀ │
│ └────────────────────────────┘ Quit ▄ │
│ ▀▀▀▀▀▀▀▀▀▀ │
└────────────────────────────────────────────────────────────┘
Page 46
---------------------------------------------------------------
┌───────────────────────────────┐
│ File Attributes Set │ As a default setting
│ │ confirmation is asked
│ File Name: EXPD32.PKD ▄│ on every file before
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀│ it is wiped. If you
│ [ ] Read Only │ used the /C command
│ [ ] Hidden │ line parameter when
│ [ ] System │ you started Global
│ │ Security confirmation
│ Wipe this File? │ will only be asked on
│ │ files with any of the
│ Yes ▄ No ▄ Quit ▄ │ Read-Only, Hidden, or
│ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ │ System attributes set.
└───────────────────────────────┘ As each file is wiped
its name will appear
in the Wiping Box and when the wiping process is complete
a "√" will appear after its name. When all the files have
been wiped the following will be displayed:
┌────────────────────────────────────────────────────────────┐
│ Wipe/Delete File(s) │
│ │
│ File(s) to WIPE: 3 ▄ ┌─┤ WIPING......... ├─┐ │
│ ▀▀▀▀▀▀▀ │ 3 EXPD32.PKD √ │ │
│ Size of File(s): 429,284 ▄ │ 2 EXPD32.ENC √ │ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │ 1 EXPD32.EEM √ │ │
│ │ │ │
│ │ │ │
│ ┌────────────────────────────┐ └─────────────────────┘ │
│ │ A Govt. WIPE on selected │ │
│ │ files is being performed. │ │
│ │ After a file is WIPED its │ 3 Files WIPED!! ▄ │
│ │ data CANNOT be recovered. │ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │
│ └────────────────────────────┘ Ok ▄ │
│ ▀▀▀▀▀▀▀▀▀▀ │
└────────────────────────────────────────────────────────────┘
Government Wipe Procedure
-----------------------------------------------------------
All files are wiped IAW the Department of Defense procedure
DoD 5220.22-M. This is their procedure for wiping highly
classified files so they cannot be read or recovered by
anyone. The procedure goes like this:
First overwrite the file with all 1 bits, then all 0
bits. Repeat this three times. Then overwrite the file
a final time with any character - I use character code
240 which is ≡. Then read the file to verify that the
last write was successful.
When this is completed the file has been overwritten a total
of 7 times and the last write is verified to make sure it
was successful. Any data you had in this file can never be
recovered!
Selecting Delete Page 47
-----------------------------------------------------------
The procedures for deleting files is the same as for wiping
them. The only difference is that a deleted file can be
recovered in some circumstances. A deleted file may be
recovered by many of the popular file undelete utilities
if it has not been overwritten by any other file. This is
why if you realize that you deleted a file that you wanted
to keep, immediately exit Global Security and use your
undelete utility to recover the file.
Frequency Distribution Tests Page 48
---------------------------------------------------------------
How do I know that the encryption program I want to use is any
good or not? With all of the computer encryption programs being
sold today there is no way to tell if they deliver on what they
claim. With Global Security you can test the encrypted files
yourself to see how good the program really is. But first, what
are the requirements for a good field encryption program. There
are six of them: 1. - The system should be, if not theoretically
unbreakable, unbreakable in practice. (Global Security uses the
One Time Pad System that is unbreakable in both theory and
practice.) 2. - Compromise of the system (the program) should
not inconvenience anyone. (Since the program is freely sold to
anyone this is not an issue. Only the key (Group Files) must
be kept secret.) 3. - The key should be rememberable without
notes and should be easily changeable. (The keys used by Global
Security are in the Group Files which can be changed in under
30 minutes on a 80386 or above.) 4. - The cryptograms should
be transmissible by telegraph. (In this day and age by computer
using binary file or E-Mail transmission.) 5. - The apparatus
or documents should be portable and operable by a single person.
6. - The system should be easy, neither requiring knowledge of
a long list of rules nor involving mental strain.
The above six requirements were published by Auguste Kerckhoffs
in 1883 in "La Cryptographie militaire" and still hold true
today. It has been said that any modern cryptographer would be
very happy if any cipher fulfilled all six. You are looking at
one happy cryptographer. Global Security fulfills all the
requirements listed above. Now that I have made the claim how
can you prove that I am right or wrong? There are statistical
tests that can be done on a file to see if it is enciphered in
a random manner or not. Two tests and a frequency distribution
table built up for an enciphered file can be conducted by Global
Security. These tests can be performed only on enciphered files
from Global Security. In order to conduct tests on enciphered
files from other programs you would have to know the file format
used.
There are a few terms that have to be defined first. The first
is "Kappa sub r" (r for random) which for the 26 letter english
alphabet is .0385. What this value says is that there is a 3.85
percent chance of drawing any two letters that are the same out
of two urns which contain the 26 letter alphabet. The second
value is "kappa sub p" (for plaintext) which is equal to .0667
for english. If you have two urns that each contain 100 letters
in the proportion in which they are used in normal test there
is a 6.67 percent chance of drawing any two letters that are
the same.
The Kappa sub r value of .0385 for the 26 letter alphabet is
equal to 1/26. If you take the 30 letter Russian Cyrillic
alphabet the Kappa sub r value is .0333 or 1/30. For the 256
characters used by a computer the Kappa sub r value is
.00390625 or 1/256. This value plays a central role in the Phi
Test and Chi Test used in Global Security.
Page 49
---------------------------------------------------------------
When Frequency Distribution Tests is selected the following
screen will appear:
═══════════════════════════════════════════════════════════════
Frequency Distribution Tests
Phi Test Chi Test Help Quit
───────────────────────────────┬─┬─────────────────────────────
Selecting the Phi Test
---------------------------------------------------------------
First select the file to do a Phi Test and Frequency
Distribution Count on from the File Selection Screen. Once all
the calculations have been made on the file the results will be
displayed as shown below.
The Phi Test can determine whether a given frequency count
reflects a monalphabetic or a polyalphabetic encipherment. A
frequency table for a monalphabetic enciphered file will reflect
the same distrubtion table as text in normal use. A frequency
table for a polyalphabetic enciphered file will just reflect
random text. To use it you first multiply the total number of
characters in a file by the total number minus one. If the total
characters is 17,539 then multiply 17,539 by 17,538. Then
multiply this product by the Kappa sub r value of .00390625. The
result will be the polyalphabetic expected Phi. I do not have a
Kappa sub p value for the 256 character set on a computer. I
suspect that it would be fairly close to the Kappa sub p value
for the 26 letter alphabet since most of the time you would be
enciphering english text. For the purposes of this test this
value is not needed. Next you take the frequency count of each
character and multiply it by its frequency count minus one. If
the frequency count for the character A is 461 then you multiply
461 by 460. When this is done for all 256 characters add all
these 256 products together to get one final value. This is the
ovserved Phi value. The following values are from a text file
enciphered by the author.
┌────────────────────────────────────────────────────────────────────────┐
│ Frequency Distribution Tests │
│ │
│ File Name: STWATCH.ENC ▄ Phi Data Size: 125,020 ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │
│ Dec Hex Char Count Percent Dec Hex Char Count Percent │
│ │
│ Expected Phi Value (Kappa Sub r): 61,054,200 ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │
│ Observed Phi Value: 61,042,706 ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │
│ Frequency Table Statistics │
│ │
│ Mean Value: 488 ▄ Variance (s²): 443 ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │
│ ▄ ▄ PgUp ▄ PgDn ▄ Home ▄ End ▄ Help ▄ Quit ▄ │
│ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ │
└────────────────────────────────────────────────────────────────────────┘
Page 50
---------------------------------------------------------------
As you can see the observed Phi value is very close to the
expected Phi value Kappa Sub r. This means that the frequency
count for all 256 characters is based on a polyalphabetic
encipherment. In other words, the frequency distribution for all
256 characters is completely random in nature. If it had been a
monalphabetic encipherment, the frequency distribution would
have been more in line with an expected Phi value Kappa Sub p
which would have been a value approximately 16 times larger than
61,054,200. The Mean Value for the frequency distribution and
the Variance (s²) is also given. If you take the square root of
the Variance you will have the standard deviation. If these two
values are close it means that the frequency distribution for
all 256 characters in even, or random, in nature. Use the
indicated Command Bars or keyboard keys to page through the
Frequency Distribution table. It looks like the following:
┌────────────────────────────────────────────────────────────────────────┐
│ Frequency Distribution Tests │
│ │
│ File Name: STWATCH.ENC ▄ Phi Data Size: 125,020 ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │
│ Dec Hex Char Count Percent Dec Hex Char Count Percent │
│ 48 30 0 436 .3487 56 38 8 466 .3727 │
│ 49 31 1 477 .3815 57 39 9 497 .3975 │
│ 50 32 2 478 .3823 58 3A : 446 .3567 │
│ 51 33 3 512 .4095 59 3B ; 480 .3839 │
│ 52 34 4 466 .3727 60 3C < 473 .3783 │
│ 53 35 5 498 .3983 61 3D = 485 .3879 │
│ 54 36 6 502 .4015 62 3E > 467 .3735 │
│ 55 37 7 447 .3575 63 3F ? 512 .4095 │
│ │
│ ▄ ▄ PgUp ▄ PgDn ▄ Home ▄ End ▄ Help ▄ Quit ▄ │
│ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ │
└────────────────────────────────────────────────────────────────────────┘
The Chi Test
---------------------------------------------------------------
The Chi Test is used to compare two Frequency Distribution
Tables to see if they have been enciphered with the same key.
First select the first enciphered file from the File Selection
Screen and then the second one. The Chi Test works like this.
Multiply the number of characters in the first file by the
number in the second, and then by the Kappa Sub r value. This
is the expected Chi Value. Then take the first value in the first
distribution table and multiply it by the first value in the
second distribution table. Do this for all 256 characters in
the distribution table. Then add all 256 products into one large
value. This is the observed Chi value. If the two are close to
one another is means that they have been enciphered using the
same key. Since a pseudo random key as long as the original
message is used, this means that the keys for any two messages
enciphered by Global Security are the same in nature, ie. two
long strings of different pseudo random characters. In order
to reproduce this long string of pseudo random characters and
decipher the file you need an exact copy of the Group Files
used to encipher the file.
Page 51
---------------------------------------------------------------
The following screen will appear showing the expected Chi value
Kappa Sub r and the observed Chi value when the calculations
are done. As you can see the expected Chi value Kappa Sub r and
the observed Chi value are very close. This means that two long
strings of pseudo random characters, each as long as the file
it enciphered, was used as the key. When this test is used on
two files enciphered using the One Time Pad System it can only
mean that the two keys used are the same type and are not
actually the same key.
┌────────────────────────────────────────────────────────────────────────┐
│ Frequency Distribution Tests │
│ │
│ File Name: STWATCH.ENC ▄ Chi Data Size: 125,020 ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │
│ File Name: WIN386.ENC ▄ Chi Data Size: 518,776 ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │
│ │
│ │
│ Expected Chi Value (Kappa Sub r): 253,349,123 ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │
│ Observed Chi Value: 253,332,073 ▄ │
│ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ │
│ │
│ │
│ Ok ▄ │
│ ▀▀▀▀▀▀▀▀▀▀ │
└────────────────────────────────────────────────────────────────────────┘
An in depth explanation of both of these tests is presented on
pages 377 to 382 in "The Codebreakers" by David Kahn and
published by The Macmillan Company.
If you want to write a program to perform your own tests on
files enciphered with Global Security here is the format of
an enciphered file.
BYTES MEANING
---------------------------------------------------------------
1 - 30 Global Security ENC File ID.
Do not include this in computations.
31 - 2,078 Enciphered password.
Include this in the computations.
2,079 - 2,205 127 byte header.
Do not include this in computations
2,206 - ? Enciphered data. Include it in the
computations.
The formulas for the Mean Value and Variance are taken from page
597 of "The VNR Concise Encyclopedia of Mathematics".
_ 1 n 1 n _
Mean Value (x) = ─ Σ xi Variance (s²) = ─── Σ (xi - x)²
n i=1 n-1 i=1
TIPS ON USING GLOBAL SECURITY IN THE REAL WORLD Page 52
---------------------------------------------------------------
Setting up the Group File and Passwords
-----------------------------------------------------------
If two people across town or in different countries want
to exchange enciphered files, or enciphered E-Mail messages,
with Global Security, they will need to have the same set of
"DFT", "SCM", and "KEY" files (Group Files). These files
have to be exactly the same or else you will never be able
to decipher any files. If you are the one creating these
files you will need to get them to the other person by the
safest means possible. The safest way is for you to deliver
them yourself. The next safest way would be a private or
public courier service. The least safest way would be to use
the mail service of any country. The mail service of any
country is owned by the government. The have the ability to
open any and all mail, regular or registered, at any time,
and you will never know for sure if they have opened yours
or not. Only you can decide what method is safe enough for
you. Next you have to decide where to keep these files. If
you work in an office where other people have access to the
computer you work on do not keep them on your hard disk.
If you do anyone will be able to copy them when you are not
around. Keep them on a floppy disk that you carry back and
forth from home to the office. This decision is also up to
you. Just remember, if anyone is able to copy the files
someone probably will. How often should you change these
files? The best answer is as often as possible or practical.
If you suspect that someone may have copied them you need to
change them right away. Other that that you should have an
irregular schedule for issuing a new set of Group Files.
A list of passwords you will use must be set up also. This
list must be kept as safe as the Group Files. You could
have a password that changes with every message, or every
day, or every week, or every month, etc. How you set up the
passwords is up to you.
SPECIAL NOTE
-----------------------------------------------------------
"Any repetition of any kind in the keys of cryptograms under
analysis imperils them and perhaps dooms them to solution.
It does not matter whether the repetitions lie within a
single message or among several, arise from the interaction
of repeating primary keys or from the simple repeating of
a single long key. Repetitions in the key cannot be
permitted." "The Codebreakers" page 398 by David Kahn.
A set of Group Files contains only 43,200 sets of keys. If
one set of Group Files were to be used to encipher and
transmit hundreds or thousands of files/messages there is
a chance that one or more would be enciphered by the same
set of keys. These messages enciphered with the same set
of keys would then be open to analysis and possible
deciphering. A set of Group Files should therefore be used
to transmit only 10 to 25 files/messages and then they
should be changed.
Page 53
-----------------------------------------------------------
Global Security is uncrackable even by the National Security
Agency (NSA), but only if your Group Files and Password List
are kept safe. If they are stolen without your knowledge
your enciphered files or E-Mail messages can be intercepted
and deciphered. Global Security will do its job if you do
yours.
Who is looking at your Computer Data and E-Mail Messages?
-----------------------------------------------------------
You must always think that someone has intercepted your
enciphered files or E-Mail messages but as long as they do
not have your Group Files and password list they will never
be able to decipher them. The people most likely to
intercept them are the NSA and the FBI. I quote from the 2
March 1994 article in the business section of The Washington
Post mentioned earlier: "The FBI and NSA have long enjoyed
broad legal and technological powers to snoop-to capture
virtually any conversation or data transmission over phone
lines, by cellular or cordless phone and with a variety of
exotic methods."
Because of the nature of E-Mail Systems your data can very
easily be intercepted and read at numerous points along the
way. An E-Mail message sent from the Middle East to the
head office in Los Angles, Calif. may go through several
interconnected E-Mail Systems before it gets to the person
it was meant for. Many of these E-Mail Systems overseas are
owned and operated by different governments. You can be sure
that any interesting messages wind up on the desks of
numerous government agencies or intelligence services. This
is why you need Global Security. It can encipher an E-Mail
message so that not even the National Security Agency (NSA)
can decipher the it.
After you have written a very sensitive report you delete
all backup copies and WIPE the original file after it is
enciphered. Two days later data from this sensitive report
appears in all the major newspapers. Where did the data
come from? It came from the backup copy you deleted but did
not wipe. Someone came in at night and looked at all the
deleted files on your hard disk to see if there was anything
of value he/she could use. A file that has been deleted by
DOS only has its directory and FAT entries deleted. The data
from the file is still on disk and can be recovered.
Transmitting Enciphered Files
-----------------------------------------------------------
Once you have a file enciphered you have to transmit it to
another computer to get it delivered to the right person.
This could be to another PC in the next state, the mainframe
computer in the home office, or an E-Mail Service such as
MCI.
Page 54
---------------------------------------------------------------
The communications programs used will depend on the
circumstances. The choice will be up to you. All
communications programs used must be able to transmit files
without any errors and without adding any extra bytes into
the file between the File ID String and the end of the file.
Characters or lines added to the beginning or end of the
file are OK.
A file enciphered and transformed for E-Mail is a text file.
It has only printable ASCII characters, the carriage return,
and line feed characters in the file. When you transmit a
file by E-Mail, the E-Mail Service adds a header to the file.
This usually contains a From and To line and may contain
other information depending on the E-Mail Service you are
using. The E-Mail Service then places this into the "mailbox"
of the person you have sent it to along with all of his/her
other mail from other sources. As long as the E-Mail Service
did not alter any bytes between the High RADIX 64 file format
ID and the end ID you will have no trouble reconstructing
it when you download your mail.
SPECIAL NOTE: Since there is no Global Security program to
decipher an enciphered file that has been transmitted to a
mainframe computer you will have to download the file from
the mainframe to a PC before it can be deciphered.
SPECIAL NOTE: If the enciphered file has been transmitted
to an Apple Macintosh computer you will also have to
download the file to a PC before it can be deciphered. This
has to do with the way the Macintosh computer stores data as
well as the fact that there is no version of Global Security
for the Macintosh.
Long and Short Term Storage of Enciphered Files
-----------------------------------------------------------
For short term storage of enciphered files where they may
be used on a daily, weekly, or monthly basis storage on
floppy or hards disks should not pose any problems. Just
remember that floppy and hard disks do fail from time to
time so keep BACKUP copies of all your enciphered and Group
Files.
For long term storage or archiving of enciphered files where
they may not be used for 6 months to many years a nonvolatile
storage media such as optical disks which have a shelf life
of up to 30 years should be used. It would be best to put
the enciphered files on one optical disk and the Group Files
required to decipher them on a different one, and keep them
in separate places. Keep the passwords in a safe secure place
where they can be retrieved even after a number of years.
USING A ONE TIME PAD Page 55
---------------------------------------------------------------
The following examples will show you how to use a One Time
Pad to encipher and decipher messages. A copy of the same
instructions and Vigenere Tableau printed by the program
is shown below so you can use it while doing the examples.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z -
┌─────┬─────┬─────┬─────┬─────┬─────┬─────┬─────┬─────┐
A │A B C│D E F│G H I│J K L│M N O│P Q R│S T U│V W X│Y Z -│
B │B C D│E F G│H I J│K L M│N O P│Q R S│T U V│W X Y│Z - A│
C │C D E│F G H│I J K│L M N│O P Q│R S T│U V W│X Y Z│- A B│
├─────┼─────┼─────┼─────┼─────┼─────┼─────┼─────┼─────┤
D │D E F│G H I│J K L│M N O│P Q R│S T U│V W X│Y Z -│A B C│
E │E F G│H I J│K L M│N O P│Q R S│T U V│W X Y│Z - A│B C D│
F │F G H│I J K│L M N│O P Q│R S T│U V W│X Y Z│- A B│C D E│
├─────┼─────┼─────┼─────┼─────┼─────┼─────┼─────┼─────┤
G │G H I│J K L│M N O│P Q R│S T U│V W X│Y Z -│A B C│D E F│
H │H I J│K L M│N O P│Q R S│T U V│W X Y│Z - A│B C D│E F G│
I │I J K│L M N│O P Q│R S T│U V W│X Y Z│- A B│C D E│F G H│
├─────┼─────┼─────┼─────┼─────┼─────┼─────┼─────┼─────┤
J │J K L│M N O│P Q R│S T U│V W X│Y Z -│A B C│D E F│G H I│
K │K L M│N O P│Q R S│T U V│W X Y│Z - A│B C D│E F G│H I J│
L │L M N│O P Q│R S T│U V W│X Y Z│- A B│C D E│F G H│I J K│
├─────┼─────┼─────┼─────┼─────┼─────┼─────┼─────┼─────┤
M │M N O│P Q R│S T U│V W X│Y Z -│A B C│D E F│G H I│J K L│
N │N O P│Q R S│T U V│W X Y│Z - A│B C D│E F G│H I J│K L M│
O │O P Q│R S T│U V W│X Y Z│- A B│C D E│F G H│I J K│L M N│
├─────┼─────┼─────┼─────┼─────┼─────┼─────┼─────┼─────┤
P │P Q R│S T U│V W X│Y Z -│A B C│D E F│G H I│J K L│M N O│
Q │Q R S│T U V│W X Y│Z - A│B C D│E F G│H I J│K L M│N O P│
R │R S T│U V W│X Y Z│- A B│C D E│F G H│I J K│L M N│O P Q│
├─────┼─────┼─────┼─────┼─────┼─────┼─────┼─────┼─────┤
S │S T U│V W X│Y Z -│A B C│D E F│G H I│J K L│M N O│P Q R│
T │T U V│W X Y│Z - A│B C D│E F G│H I J│K L M│N O P│Q R S│
U │U V W│X Y Z│- A B│C D E│F G H│I J K│L M N│O P Q│R S T│
├─────┼─────┼─────┼─────┼─────┼─────┼─────┼─────┼─────┤
V │V W X│Y Z -│A B C│D E F│G H I│J K L│M N O│P Q R│S T U│
W │W X Y│Z - A│B C D│E F G│H I J│K L M│N O P│Q R S│T U V│
X │X Y Z│- A B│C D E│F G H│I J K│L M N│O P Q│R S T│U V W│
├─────┼─────┼─────┼─────┼─────┼─────┼─────┼─────┼─────┤
Y │Y Z -│A B C│D E F│G H I│J K L│M N O│P Q R│S T U│V W X│
Z │Z - A│B C D│E F G│H I J│K L M│N O P│Q R S│T U V│W X Y│
- │- A B│C D E│F G H│I J K│L M N│O P Q│R S T│U V W│X Y Z│
└─────┴─────┴─────┴─────┴─────┴─────┴─────┴─────┴─────┘
To Encipher: Write in the plaintext message in the correct place
on the One Time Pad. Find the plaintext letter in
the top alphabet and the key letter in the side
alphabet. Then trace down from the top and in from
the side. The ciphertext letter stands at the
intersection of the column and the row (i.e.
plaintext "M" and key letter "W" equals ciphertext
letter "H"). Place the ciphertext letter in the
correct place on the One Time Pad.
Page 56
---------------------------------------------------------------
To Decipher: Write in the ciphertext message in the correct
place on the One Time Pad. Find the key letter in
the side alphabet. Follow that row in until you
find the ciphertext letter. Follow that column up
to the plaintext alphabet at the top. This is your
plaintext letter (i.e. key letter "S" and cipher-
text letter "Z" equals plaintext letter "H"). Place
the plaintext letter in the correct place on the
One Time Pad.
Below is what a section of a One Time Pad will look like.
Your pseudo random KEY letters are in the top line.
KEY: V W G K P W Z G Z B V P V G G J N J J E A H B E H
PLAIN: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
CIPHER: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
If you want to encipher the phrase " ALL LAWYERS ARE CROOKS"
place this text in the plaintext line as shown below.
KEY: V W G K P W Z G Z B V P V G G J N J J E A H B E H
PLAIN: A L L - L A W Y E R S - A R E - C R O O K S _ _ _
CIPHER: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
Use the "-" as a word spacer. It will make it easier on the
person who is going to decipher the message to seperate the
words.
Next follow the instructions and fill in the ciphertext line
according to the instructions. To encipher the first
plaintext letter find the letter "A" in the alphabet on the
top of Vigenere Tableau and find the first key letter "V"
in the alphabet on the left side of Vigenere Tableau. Trace
down from the top and in from the side. At the intersection
of the column and row you have the ciphertext letter. In
this case it is "V". Place the ciphertext letter "V" below
the plain text letter "A".
KEY: V W G K P W Z G Z B V P V G G J N J J E A H B E H
PLAIN: A L L - L A W Y E R S - A R E - C R O O K S _ _ _
CIPHER: V _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
Page 57
---------------------------------------------------------------
Now do the same for the rest of the message. The enciphered
message should now look like the example below.
KEY: V W G K P W Z G Z B V P V G G J N J J E A H B E H
PLAIN: A L L - L A W Y E R S - A R E - C R O O K S _ _ _
CIPHER: V G R J - W U D C S M O V X K I P - X S K Z _ _ _
Now it is best to transfer the ciphertext to the message
pad, or any plain piece of paper, for sending the enciphered
message.
To decipher just copy the ciphertext message to the correct
One Time Pad. It must be on the same page and starting at
the same place as the original message in order to decipher
it. Otherwise you will just get a garbled message that no
one can understand. This is why you should use a Message
Pad because it tells the person receiving the message what
pad to use and what page and place on that page to start
to decipher the message.
When you receive an enciphered message transfer it to the
correct place on the One Time Pad as shown below. Following
the instructions find the Key letter in the side alphabet.
Trace that in along the row until you find the ciphertext
letter. Go up the column to the top alphabet to find the
plaintext letter. In this case the Key letter "V" and the
ciphertext letter "V" give you a plaintext letter of "A".
KEY: V W G K P W Z G Z B V P V G G J N J J E A H B E H
PLAIN: A _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
CIPHER: V G R J - W U D C S M O V X K I P - X S K Z _ _ _
When you decipher the rest of the message you will get the
following:
KEY: V W G K P W Z G Z B V P V G G J N J J E A H B E H
PLAIN: A L L - L A W Y E R S - A R E - C R O O K S _ _ _
CIPHER: V G R J - W U D C S M O V X K I P - X S K Z _ _ _
Take the dashes out and it will be very easy to read "ALL
LAWYERS ARE CROOKS".
As you can see it is very easy to encipher and decipher
messages using the One Time Pad. Just make sure you are
accurate and you will have no problems. It does take a
little bit of work and that is why the One Time Pad is best
used for short messages and low volume situations.
Page 58
---------------------------------------------------------------
Five letter groups are used by the One Time Pad to break
up any indication of how long individual words are. The
ciphertext should be sent as five letter groups also.
Appendix A Page 59
---------------------------------------------------------------
WHY ENCIPHER DATA
---------------------------------------------------------------
Before you can understand the need for such a program as Global
Security you have to understand the power of the United States
Government to intercept and listen to any phone conversation
in the world that uses satelite or microwave transmission
facilities. This power resides in the government agency know as
the "National Security Agency" (NSA). On 24 October 1952
President Harry S. Truman signed a presidential memorandum that
established the National Security Agency. This memorandum is
still one of the most closely guarded secrets of the U.S.
Government. Since that day the growth of the NSA has been
exponential. With super computers, super secret satelites, and
top secret installations around the world it has the ability to
listen in on, and record, electronic transmissions of any type
anywhere in the world. Most of the information I am about to
give you comes from a book titled "The Puzzle Palace" by James
Bamford, published by Penguin Books in 1983. It is worth
reading. The Communications Satelite Corporation (COMSAT) has
four main satelite earth stations located in the U.S. for
transmitting phone conversations, computer data, and television
signals anywhere in the world. Close by each satelite earth
station the NSA has built a secret installation which could be
used to intercept any incoming or outgoing transmissions, record
it, and send it to its headquarters for processing by its super
computers. There are many who believe that the NSA also taps
into the domestic microwave system to intercept, record, and
process domestic phone conversations and computer data. There is
a facility located a few hundred yards behind the NSA main
Operations Building at Fort Meade, Maryland which is a very
broadband microwave RCV, receive only station, which is tied
into the local telephone company circuits, which are inter-
connected with the nationwide microwave telephone system. Is
NSA actually listening in on domestic long distance phone lines?
No one really knows for sure, but if they want to they certainly
have the capability to do it in a big way. Are they listening in
on international transmissions? Of course they are, that is one
of their primary missions.
Computer transmitted data is especially open to interception,
recording, and processing. Just record it and run it through
another computer. Instant data to look at. There is a way to
make it harder on the NSA to look at your computer data.
Encipher it before transmitting it, then decipher it at the
other end. This has its pitfalls too. Most commercial code
systems utilize methods that have been cracked or are suspect
because the U.S. Government is suspected of having their hands
in the cookie jar so to speak. Read John C. Dvorak's "Inside
Tract" in the March 17, 1992 issue of PC Magazine. He says that
the WordPerfect security system was effortless to crack. He also
reports a "back door" was discovered in an encryption system
(using the El Gamal encryption algorithm) about to be approved
by the U.S. Governments National Institute of Standards and
Appendix A Page 60
---------------------------------------------------------------
Technologies. He reports that "onlookers" accused the NSA of
being behind the "back door" because they really do not want
anyone to have a code that cannot be broken, by them.
If you look at the history of DES (Data Encryption Standard)
which is the U.S. Governments standard for data encryption you
will see that the NSA was caught with its hands in the cookie
jar here also. DES was first developed by IBM in the early
1970's under the code name Lucifer. When the National Bureau
of Standards solicited for encryption algorithms for the U.S.
Government IBM submitted Lucifer. But before it did so IBM
dropped the key length from 128 bits long to 56 bits long. James
Bamford in "The Puzzle Palace" reports that this was due to
closed door meetings between IBM and the NSA where IBM agreed to
cut the key length from 128 to 56 bits. It was eventually
approved as the nations standard for data encryption and became
known as DES. By cutting the key from 128 bits to 56 bits the
NSA made sure that it would be able to crack the code with super
computers. In fact, Dvorak reports, same column mentioned above,
that it only takes hours of super computer brute force to crack
a message encrypted by DES. Plus he reports it is believed that
Adi Shamir of RSA Data Security has cracked the DES by using
math alone. It sounds like the governments standard is only a
standard way of making sure the NSA can read your transmitted
computer data. For a full report on the controversy over DES I
suggest you read the chapter "Competition" in "The Puzzle
Palace".
In the same column John C. Dvorak also praises the RSA Data
Security company and their "practical public key/private key"
method of encoding and decoding messages. This method uses the
patented Rivest-Shamir-Adelman (RSA) encryption algorithm. It
works like this: pick a number N that is the product of 2 prime
numbers. Call them X and Y so that N = X times Y. You then pick
a number less than N to be your public key - call this number P.
Your private key K is then calculated by the formula
P times K = 1(mod L) where L is the least common multiple of
(X - 1) and (Y - 1). To encrypt a message the sender must know
N and P. With a "little" bit of computer work X, Y, and K can be
calculated. The formulas used to encipher and decipher data seem
to me to use very large numbers if N is large which would make
encyphering and deciphering data a lengthly process. To crack
the RSA algorithm would just take a little bit of time.
Calculating prime factors of large numbers would be a cinch on
any computer. On the super computers that the NSA has it would
be even faster. You could even do the hard work in advance.
Just generate a list of large prime numbers and then it would be
a matter of trial and error to find two prime numbers that when
multiplied together produce N. From that point on finding K
would be a piece of cake.
The RSA algorithm seems to be open to analytical attack also.
Looking at the formulas to encipher and decipher data that are
in the June 1990 issue of Byte magazine in the article
Appendix A Page 61
---------------------------------------------------------------
"Cloak and Data" by Rick Grehan it appears that if the first
'A' in the message is encrypted into a 'Z' by the formula all
other A's in the message will also be encrypted into Z's. If
this is the case, any RSA encrypted message is open to the most
basic cryptanalytic procedure: frequency and contact of letters.
How many of each letter are there in the message and what
letters do they come in contact with. Take the letter
combination TH.
It appears often in the english language. If the letter
combination SB appears often in an enciphered message using the
RSA algorithm it is a better than even bet that they stand for
the TH in the plaintext message. From there it is just a matter
of time until you solve the message. The longer the message the
easier it is to solve. From the looks of things I would not
place too much faith in the RSA algorithm.
The 28 April 1994 edition of The Wall Street Journal has a front
page article entitled "Cipher Probe" about the encryption
program PGP - Pretty Good Privacy. This program is based on the
RSA algorithm and is therefore open to the same basic attack
as described above. Any encryption program not based on the "One
Time Pad" System in this day and age can, with a little effort,
be broken by the National Security Agency.
Dvorak reports and I quote: "It's logically believed that the
National Security Agency doesn't like the idea of truly secure
encryption, since it means the NSA won't be able to keep tabs on
foreign spies easily." To this I would add the NSA does not want
the American public to have a truly secure method of encryption
because then the U.S. Government could not keeps tabs on its own
people like it has in the past. One such operation was known as
Operation Shamrock which started in 1945 and continued for 30
years until 1975. Senate Intelligence Committee chairman Frank
Church labeled this "probably the largest governmental
inteception program affecting Americans ever undertaken".
Operation Shamrock consisted of the three major international
telegraph companies of the time voluntarily handing over to the
U.S. Government all international cable traffic between foreign
governments. Later it turned into a giant operation where the
U.S. Government listened in on the American people. When the NSA
was formed in 1952 it inherited Operation Shamrock. When the
country started to convert to computers and magnetic storage
devices the cable companies just turned over their magnetic
drums with all the cable traffic to the NSA for copying. As the
capabilities of the NSA grew to listen in on the American public
agencies of the U.S. Government like the FBI, CIA, DIA, and
Secret Service sent the NSA "watch lists" of people they would
like the NSA to listen to. It only stopped in 1975 because it
was close to being splattered all over the American press. What
the government has done in the past it will do in the future.
Appendix A Page 62
---------------------------------------------------------------
Now that the cold war is over governments everywhere will shut
down their super secret spy agencies and the world will at last
know peace of mind. If you believe that I have some real estate
on the moon I would like to sell you - real cheap. What will
the NSA and the CIA do in the future now that a major reason
for their being no longer exists? Everyone knows that a govern-
ment agency that has been in existence for any length of time
over a few days can never be shut down. It just grows and grows
and grows. So, who will the NSA and CIA target next? There is
only one place to go and that is the American people. It may not
happen over night or even in the next few years, but it will
happen.
Now is the time to get prepared for them. Even the phone system
is going digital at a slow rate. Because of this a computer will
be able to recognize words and intercept and record all phone
conversations that contain a certain word. The NSA will have a
lock on the American people. The following quote was made by
Senator Frank Church of the Senate Intelligence Committee in
1975 in regard to the NSA's ability to intercept electronic
transmissions:
"At the same time, that capability at any time could be turned
around on the American people and no American would have any
privacy left, such [is] the capability to monitor everything:
telephone conversations, telegrams, it doesn't matter. There
would be no place to hide. If this government ever became a
tyranny, if a dictator ever took charge in this country, the
technological capacity that the intelligence community has given
the government could enable it to impose total tyranny, and
there would be no way to fight back, because the most careful
effort to combine together in resistance to the government, no
matter how privately done, it within the reach of the government
to know. Such is the capability of this technology...
I don't want to see this country ever go across the bridge. I
know the capacity that is there to make tyranny total in
America, and we must see to it that this agency and all agencies
that possess this technology operate within the law and under
proper supervision, so that we never cross over the bridge. That
is the abyss from which there is no return."
If the NSA could do this in 1975 what can they do today? It has
been 20 years and a revolution in the computer industry since
then. It is something to think about in the dark of night when
the moon is full and all the little government spies (worms)
are busy watching you.
Appendix B Page 63
---------------------------------------------------------------
WHY GLOBAL SECURITY
---------------------------------------------------------------
Now that I have torn down every encryption method available that
is supposed to be any good and shown you the capability of the
NSA to intercept not only your phone conversations but all your
computer transmissions too, where do we go from here? There is
one method of encryption that can be used that is unbreakable in
practice and in theory. It was first developed in America in
1918, completely rejected by the U.S. Government, and first used
by the German diplomatic establishment sometime between 1921 and
1923. It is called the "One Time Pad System". It is a remarkable
system in its simplicity. For further information see pages 398
to 400 of "The CODEBREAKERS" by David Kahn, published by The
Macmillan Company in 1967. It consists of a random key used
once, and only once. It provides a new and unpredictable key
character for each plaintext character in the message. This
means that every letter or character is enciphered with its own
random key. The letter 'A' may be enciphered into a 'Z' the
first time it is encountered in the message and into an 'N' the
next time, a 'B' the next, and so on and so on. This means for
a message that is encyphered as "Z T Q W" the first 'Z' could be
deciphered into any of the 26 letters of the alphabet. This
holds true for all the other letters also. This could be
deciphered into the word "L O O K" where both the 'T' and the
'Q' stand for the letter 'O'. "The perfect randomness of the
one-time system nullifies any horizontal, or lengthwise,
cohesion, as in coherent running key or autokey, and its
one-time nature bars any vertical assembly in Kasiski or
Kerckhoffs columns, as in keys repeated in a single message or
among several messages. The cryptanalyst is blocked." If you
were to use the brute forc method and try to decipher this
message with every possible key combination all you would have
done is compile a list of every possible four letter word in the
world. There are stop, hard, slow, kiss, etc., etc., etc. The
longer the message the more possibilities there are. What is
boils down to is that you have an equation in two unknowns with
only 1 equation and that is impossible to solve. X + Y = 9. You
know that 9 is the ciphertext. Without another equation there is
no way to solve X (the plaintext) or Y (the key). X and Y could
be any values you choose that equal 9. All this does is compile
a long list of possible solutions with one just as good as the
other. Since there are an infinite number of numbers there are
an infinite number of solutions to the above equation. One could
be just as valid as the other. There is no way to know which one
is right.
In this age of computers why is this "One Time Pad System" not
in widespread use? Could it be the fact that computers cannot
generate random numbers. All they can generate is pseudo-random
numbers. This means that the string of random numbers produced
by any computer can be reproduced by that or another computer
using the same formula. But this is exactly what is required by
any computer program to encipher data. You need to be able to
reproduce that same set of random numbers to decipher the data.
Appendix B Page 64
---------------------------------------------------------------
This is easy enough. There are many formulas to generate pseudo-
random numbers on computers. But even this is not enough. Most
of these formulas only require a small seed number to get the
formula going. This is the key to why these formulas and other
encryption formulas are no good. Remember this:
NO MATTER HOW INTRICATE OR COMPLEX ANY DATA ENCRYPTION FORMULA
IS, IF THE SEED NUMBER TO START THE FORMULA IS SMALL, THAT
ENCRYPTION FORMULA CAN BE VERY EASILY CRACKED BY THE BRUTE
FORCE METHOD.
Just plug in all possible seed numbers into the formula using
a super computer and within a matter of hours any message can
be decoded. This is the bane of most encryption formulas. They
try to keep the seed number small by using very complex and
lengthy formulas because human beings, you and me, do not like
to enter 100 and 200 digit seed numbers into a computer every
time we have to encipher or decipher a message. The small seed
number is their Achilles Heel. In this day of the super computer
I would call any seed number under 40 digits small. This equates
to about a 128 bit number on a computer.
So what would it take to make an ideal computer program for
enciphering and deciphering data.
1 - The formulas used to encipher and decipher data have to
be as simple as possible for fast, economical, error
free performance.
2 - The formula must have a very long key (seed number), but
one that does not have to be entered by a human into the
computer. A number that is 7,776 bits (972 bytes) long
is used by Global Security.
3 - The program must use the "One Time Pad System" by
generating a unique key letter for each plaintext letter
in the file or message enciphered.
4 - The files created to enter this long seed number into
the formula must be easy to make, and more important,
easy to produce new files as often as required.
5 - The system must be reliable. It must decipher all files
or messages without error.
6 - The system must be "software only". No extra hardware
required.
7 - The cryptosystem must be easy to use. The more
complicated a cryptosystem is the less it will be used.
All this and more describes Global Security, the best little
enciphering/deciphering program in the world. The 7 items listed
above all apply to Global Security. What follows is a detailed
Appendix B Page 65
---------------------------------------------------------------
explanation of why Global Security is the most secure, bar none,
of any encryption/decryption method or program available in the
world today. This has to be done so you will know that what I
say is true. You will not have to take my word for it. You can
then make up your own mind about how good Global Security really
is. Run the Phi and Chi Tests to confirm this in the new
Frequency Distribution Tests included in Global Security.
There are four files that have to be created by the program
before you can encipher and decipher files, or make actual
"One Time Pads". The first is called a Prime Number File. This
file holds 3,067 prime numbers in the range 100,000,001 to
4,294,967,295. You enter a search factor between 2 and 100,000
(an even number must be used) and a starting number equal to or
greater than 100,000,001. The search factor is there so you will
not find consecutive prime numbers. If you enter a search factor
of 32,984 and a starting number of 1,496,392,593 the second
number to be checked for being prime would be 1,496,425,577 and
so on and so on until 3,067 prime numbers are found. The numbers
wrap around if they exceed 4,294,967,295. There are
approximately 83,899,345,900,000 different prime number files
that can be created. On my 20 Mhz 386DX computer this takes only
about 20 minutes or less with the 32 bit version of Global
Security.
The next step is to create a Default Parameter File. When you
encipher a file 2,205/2,326 bytes are added to the length of the
file or E-Mail Message. A group of 2,048 bytes hold a 7
character password (enciphered) needed to decipher the rest of
the file. Where the 7 character password is placed within these
2,048 bytes is determined by the Default Parameter File. This
file also holds one parameter used by the enciphering, decipher-
ing, and scrambling formulas. This file takes only a few minutes
to create. There are 1.19657994458 times 10 to the 24th power
different ways to create a Default Parameter File.
The third step is to scramble the Prime Number File and create a
Scrambled Prime Number File. How many different ways are there
to scramble 3,067 prime numbers? Using Stirling's Approximation
formula for calculating large factorials you get:
3,067! = 8.17375658029 times 10 to the 9,363rd power
This is a number 9,364 digits long. It is best to scramble and
rescramble this file as often as possible. The more you do this
the harder it will be to duplicate the file.
The fourth and last file to create is a Key File. This holds
the initial key used to select 243 prime number from the
Scrambled Prime Number File to plug into the encryption/
decryption formula. How can you automatically select an initial
key from a file? DOS provides the answer to that for us. Every
file you are going to encrypt has a date/time stamp assigned by
DOS when the file was created. Since DOS assigns date/time
stamps in 2 second intervals there can be 43,200 different date/
time stamps in one 24 hour period. Therefore the Key File holds
43,200 different numbers in the range 100,000,001 to
Appendix B Page 66
---------------------------------------------------------------
4,294,967,295. These numbers are randomly selected. Once created
this file can also be scrambled as many times as you like. Due
to the way the file is scrambled in sections there are only
apprximately 3.48143426965 times 10 to the 30,261 different ways
to scramble a Key File. The program checks the date/time stamp
of the file and uses it to index into the Key File to select an
initial seed to use in the formulas. This initial seed is then
used to randomly select 243 prime numbers from a Scrambled Prime
Number File. These 243 prime numbers are placed into 3 arrays
which comprise 81 different pseudo random number generators. One
pseudo random number generator is used to randomly select from
the other 80 pseudo random number generators for each character
in a file to encipher or decipher.
These 81 pseudo random number generators require 3 prime numbers
each for a total of 243 prime numbers. Each prime number is 4
bytes or 32 bits long. This equals 7,776 bits. This is the
initial starting seed for all the random number generators. For
anyone to duplicate a seed number 7,776 bits (972 bytes) long
without the original files used to create it would require a
miracle in the absolute true sense of the word.
What is all boils down to is that a brute force attack on any
message enciphered with Global Security would require more time
and more computer power than is possible within the next few
million years or so. To decipher a message you need the exact
same set of files used to encipher it. The only way to get these
files would be to steal them. So what? If someone stole the
files all you have to do is change them - it only takes 20
minutes or so. In fact, to really be secure, you could make it a
practice to change the files every week. This way if someone did
steal the files they could only decipher the messages for that
week and no more. There is also the question of the password.
This could be set up to change on every message. Now someone
would have to steal the files and the correct password for each
message to decipher them.
The best place to keep these files is on a floppy disk locked
up in a very good safe. They should only be taken out by an
authorized person. If you left the files on a hard disk on a
single computer or a network it would be very easy for someone
to copy them. The best program in the world will not protect
you from "inane" actions like this.
For each person or organization you exchange enciphered data
with it is a good idea to maintain a different set of Scrambled,
Default, and Key files. A seperate list of passwords should be
kept also.
I envision a setup much like the following one. You are an
auditing department of a large accounting firm with teams of
auditors that travel fequently around the country making audits
on large corporations and companies. These auditing teams send
back to the home office very sensitive data and reports that
could have major implications on Wall Street if the information
leaked out. Just before a team heads out to audit a company they
Appendix B Page 67
---------------------------------------------------------------
are given a new set of Group Files to use with Global Security
and a list of passwords to use for each day. At the home office
the only person that has the other set of files and passwords is
their boss. He is the only one that can decipher the incoming
data and reports. The next time a team went out a new set of
Group Files would be created again. This is as secure as you
can get.
The key to having a secure system is to use a set of Group
Files only a few times and then create new ones. This ensures
that every message that is enciphered will have a unique set of
keys which means a unique string of pseudo random characters
that is just as long as the file. If this is always adhered to
any message that is intercepted will not be able to be broken or
analysed in any way.
The government, or anyone with a lot of money, could set up a
special van that when parked outside of your home or office
could record the keystrokes from your computer and the data
going to your screen from the electrical signals they emit.
It would then be possible to create duplicates of the Group
Files from this data. If you think someone is doing this to you,
you can guard against this interception by using "Tempest"
shielding on your computer which does not permit these
electrical signals to be emitted. Check with your local hardware
vendor to see if this "Tempest" shielding can be installed on
your computer.
Clear and Present Danger
---------------------------------------------------------------
Just recently I had the pleasure of reading "Clear and Present
Danger" by Tom Clancy. The only reason I mention this here is
that on page 240 of the paperback novel he presents a very
excellent explanation of the One time Pad System. This is the
system used by most major governments in the world and now you,
an individual, have at your command Global Security which is
based on the same secure One Time Pad System.
Appendix C Page 68
---------------------------------------------------------------
STARTUP/TERMINATION ERRORS
---------------------------------------------------------------
There are 4 errors that can be displayed upon startup and
1 upon termination of GS16.EXE. They will be displayed and
you will be returned to the DOS prompt.
1. Global Security ■ 16 requires DOS Version 3.x
or above.
2. Global Security ■ 16 needs to be in 25 rows by
80 columns Mode.
If your display is set to display anthing other than
the above please set it back using the DOS Mode
Command (MODE CO80 for color or MODE BW80 for black
and white).
3. Gobal Security ■ 16 cannot find itself at the
end of the Environment.
In DOS 3.0 and above a fully qualified drive, path,
and program name is place at the end of the
environment assigned to the program. Global Security
uses this information to find itself and place the
GLOBAL.PRN file in the same directory. If you get
this error message it means that you are using a
DOS version of 1.x or 2.x. Or your version of DOS
does not place this information at the end of the
program environment.
4. Insufficient extra memory to run Global
Security ■ 16.
Global Security uses dynamic memory allocation for
its text window buffers. If there is not 20K of
extra memory available when the program is started
this message will be displayed. Remove some TSR's
and run Global Security again.
5. (Termination Error) Global Security ■ 16 terminated
due to memory allocation/release error.
An error was encountered while allocating or
releasing memory for use by a text window. This
error should never be encountered unless another
program has grabbed all available memory for its
own use.
Appendix C Page 69
---------------------------------------------------------------
PROGRAM ERRORS
---------------------------------------------------------------
The following errors are displayed by the Extended Error
Reporting System as required by the program.
1. Drive Index Too Large for Drive Table
When the program first determines which drives are
installed in your system (substituted drives included)
it builds a drive table and an index for the current
drive. It checks for a maximum of 26 drives but only
the first 12 are usable by the program. If the drive
you loaded the program from has an index greater than
12 the program will display this error and then exit
the program.
2. Wrong KEY File Selected
When deciphering a file you will be asked to select the
designated KEY File to decipher the program. If you
select the wrong one you will be told and then returned
to the File Selection Screen to select the correct KEY
File.
3. More than 1,000 Directories on Disk
If you load Global Security from a disk with more than
1,000 directories the Extended Error Reporting System
will display this error and then exit the program.
If you select a disk drive within the program to use
that has more than 1,000 directories you will be
returned to the File Selection Screem to select another
disk drive.
4. Number Already Used
While creating a Default Paramter File you cannot place
2 or more password characters in the same position. If
you try to use a number twice the Extended Error
Reporting System will tell you and you will be returned
to the number entry screen to enter another number.
5. Enciphered File too Large to View
If the enciphered file you selected to view is larger
than 5,952,000 bytes the Extended Error Reporting System
will tell you and return you to the File Selection
Screen to select another enciphered file to view.
6. Number Entered too Small
Number entered is out of range on the small side. You
will be returned to the number entry screen to enter
a number in the correct range.
Appendix C Page 70
---------------------------------------------------------------
7. Number Entered too Large
Number is out of range on the large side. You will be
returned to the number entry screen to enter a number
in the correct range.
8. Number Entered not Even
While entering a number for the Search Factor an odd
number was given. You will be returned to the number
entry screen to enter an even number.
9. Number Entered not Odd
While entering a Starting Number for the Prime Number
search an even number was entered. You will be returned
to the number entry screen to enter an odd number.
10. S.F./S.N. Evenly Divisible by Same Number
The Search Factor and Start Number are checked to make
sure they have no common divisors between them. If they
were to have a common divisor no prime numbers would
be found. If they do have a common divisor you will be
returned to the Start Number entry screen to enter
another starting number.
11. Insufficient Space on Disk
When creating any file the program checks to make sure
there will be enough space on the disk to hold it. If
not the Extended Error Reporting System will tell you
and then return you to an appropriate menu. At this
point you may have to change disks or exit the program
and erase some files on the disk you want to use.
12. Substituted Drive
While selecting a drive to use in the File Selection
Screen you selected a substituted drive (ie. a drive
letter has been substituted for a path name). You will
be returned to the File Selection Screen to select an
unsubstituted drive. This applies to Assigned drives
too. (See DOS ASSIGN and SUBST commands in your DOS
Manual)
13. File is Incomplete
When you selected a Prime Number File to scramble you
selected one that was incomplete. You will be returned
to the File Selection Screen to select another Prime
Number File to scramble.
Appendix C Page 71
---------------------------------------------------------------
14. File Contains Invalid Data
A check is made on some of the files created by Global
Security. If you ever get this error message the file
has been corrupted. You will be returned to an
appropriate menu.
15. File is Already Complete
When selecting a Prime Number File to finish you
selected one than is already complete. You will be
returned to the File Selection Screen to select another
file to finish.
16. File Not Found
At various times in the program you will need 1 or 2
additional files in a process. When you encipher a file
you are asked to select a KEY File to use. The SCM and
DFT files with the same name must also be present. If
they are missing you will get this error message with
the file name and then returned to an appropriate menu.
17. More than 12 Levels of Subdirectories
If you have more than 12 levels of subdirectories the
program will exit upon startup after displaying the
above error message. After startup if you use a disk
that has more than 12 levels of subdirectories the
program will display this error message and return you
to an appropriate menu.
18. Decompression Integrity Check Failed
Decipher Integrity Check Failed
Reconstrcution Integrity Check Failed
An error was detected during the integrity check while
deciphering, decompressing, or reconstruction a file.
Data may be corrupted. If the file was transmitted to
you ask for it to be enciphered, compressed, transformed,
and transmitted again.
19. Disk Full
Since the calculations of the required disk space needed
to decipher a file or set of messages for E-Mail may
not always be accurate you will get this message if the
disk you are using to put deciphered files/messages onto
runs out of room. Make more room on the disk or use your
hard disk to put the deciphered files onto.
20. Not a Valid "ENC" File to Decipher
The decipher routine could not find the proper Global
Security File ID String which identifies this as an
"ENC" File. The ID String may be corrupted or you have
selected a file with an "ENC" file extension but which is
not a true "ENC" file.
Appendix C Page 72
---------------------------------------------------------------
21. No "HR64" Messages in File to Extract
While scanning a file of E-Mail messages none were found
to extract. If you know for a fact that there are
messages to extract in the file the High RADIX 64 ID
String has been corrupted.
22. Too Many Files With The Same Name
The decipher routines will assign the original name to
any file it decipheres. If a file with the same name
already exists in the directory it will use the same
file name but assign a file extension of "001". If "001"
is in use it will use "002", etc. all the way up to
"999". If you already have 999 file names like this in
the directory you will get this message.
23. Future Compression Method Used
Future Encryption Method Used
You are attempting to decipher or decompress a file
or message that has been enciphered or compressed by
a method used by a future version of Global Security.
Select Ok from the Extended Error Reporting System
Screen and you will be returned to an appropriate menu
or, if you are deciphering E-Mail Messages, the program
will continue looking for valid messages to decipher
until the end of the file has been reached.
24. Not a Valid File to UnPack.
You have selected a file that does not have the Global
Security Pack File ID String in the header or the ID
string has become corrupted.
25. WIPE File Verify Error.
After the last overwrite of a file with character 240
the file is read and verified that it is filled with
character 240. If for any reason the file is not filled
with character 240 this error is displayed.
26. Suspected Computer Virus Attack! (Registered Versions
Only)
Every time Global Security is executed it calculates
a CRC_32 value for its EXE file on disk. If it does not
match the one stored in the program this message will
be displayed in an Extended Error Reporting System
Screen and then the program will perform a controlled
exit to DOS.
27. All Files Selected to Pack are Empty.
If the files you have selected to Pack are all 0 length
this error message will appear and you will be returned
to an appropriate menu.
Page 73
---------------------------------------------------------------
28. "HR64" Files to Create Exceeds 999
When trying to break up a very large file into smaller
ones for transmission by E-Mail the number of small files
to create exceeds 999.
29. No. Selected Does Not Match No. in Header
Not all the files needed to reconstruct the original
file have been selected.
30. Recon Group Files Not in Proper Order
The first file in the selected list is not the first
file in the group needed to reconstruct the original
file.
31. End of File Before End of Reconstruction
End of File Before End of Extraction
The actual end of file came before it should have. The
file you have received may have lost some data along
the way.
32. Not a Valid "HR64" File to Reconstruct
The file selected does not have the "HR64" file format
signature in it. Select another file.
33. Not a Valid "ENC" File for Phi/Chi Tests
The file selected does not have a valid ENC signature
in it. Select another file.
Appendix C Page 74
---------------------------------------------------------------
CRITICAL ERRORS
---------------------------------------------------------------
The following errors are reported by the Critical Error
Reporting System. Possible remedies are also suggested.
1. Disk Write Protected
Remove the write protection from the disk and select
Retry from the Critical Error Reporting System menu.
2. Unknown unit
With the File Selection Screen this error should never
be encountered. But if it is select Cancel from the
Critical Error Reporting System menu and you will be
returned to an appropriate menu.
3. Drive Not Ready
You have selected a drive without a disk in it. Insert
a disk in the drive and select Retry from the Critical
Error Reporting System menu or select cancel and you
will be returned to the File Selection Screen to select
another drive.
4. Unknown Command
A device has received an unknown command. If you ever
encounter this critical error select Cancel from the
Critical Error Reporting System menu and you will be
returned to an appropriate menu.
5. Data Error (Bad CRC)
A data error as indicated by a bad CRC value has been
encountered. You may select Retry from the Critical
Error Reporting System menu and DOS may be able to
overcome the error. If it still reports Data Error after
a few attempts select cancel from the menu and you will
be returned to an appropriate menu. The process you were
trying to do will be cancelled and all files being
worked on or created will be taken care of.
If you continue to get this error repeatedly on a floppy
or hard disk it indicates that the disk is going bad
in the area reported by the Critical Error Reporting
System.
6. Bad Request Structure Length
Select cancel from the Critical Error Reporting System
menu and you will be returned to an appropriated menu.
Appendix C Page 75
---------------------------------------------------------------
7. Seek Error
A disk drive is having problems finding a specific track
or cluster on a disk. Select Retry from the Critical
Error Reporting System menu a few times to see if DOS
can overcome this error. If it cannot select Cancel and
you will be returned to an appropriate menu.
If you continue to get this error repeatedly on a floppy
or hard disk it indicates that the disk is going bad
in the area reported by the Critical Error Reporting
System.
8. Unknown Media Type
A disk with an unknown or improper format type is being
used. This may also happen because of different format
programs being used which are not compatable with all
computers (ie. my 386 will not read any disk formated
by my brothers IBM PS/2 286). Select Cancel from the
Critical Error Reporting System menu and you will be
returned to an appropriate menu.
9. Sector Not Found
A disk drive could not find the sector it was looking
for. You can select Retry from the Critical Error
Reporting System menu a few times to see if DOS can
overcome this error. If it cannot select Cancel and you
will be returned to an appropriate menu.
If you continue to get this error repeatedly on a floppy
or hard disk it indicates that the disk is going bad
in the area reported by the Critical Error Reporting
System.
10. Out of Paper
Will never be reported by Global Security because it
does not use DOS to print with.
11. Write Fault
Select Retry to see if DOS can overcome the error. If
it cannot select Cancel and you will be returned to an
appropriate menu.
If you continue to get this error repeatedly on a floppy
or hard disk it indicates that the disk is going bad
in the area reported by the Critical Error Reporting
System.
Appendix C Page 76
---------------------------------------------------------------
12. Read Fault
Select Retry to see if DOS can overcome the error. If
it cannot select Cancel and you will be returned to an
appropriate menu.
If you continue to get this error repeatedly on a floppy
or hard disk it indicates that the disk is going bad
in the area reported by the Critical Error Reporting
System.
13. General Failure
May be caused by a floppy disk drive going bad. This is
the only time the author has seen this critical error on
his system. Select cancel to be returned to an
appropriate menu, or abort to exit the program.
PRINTER ERRORS
---------------------------------------------------------------
The following errors are reported by the Printer Error
Reporting System.
1. TIMEOUT - Printer has timed out. Select Cancel from the
menu in the Printer Error Reporting System, reset your
printer and try again.
2. I/O ERROR - Printer has encountered an I/O Error. Select
Cancel from the menu in the Printer Error Reporting
System and try again.
3. NOT SELECTED - Printer not turned on. Turn your printer
on and select Retry from the menu in the Printer Error
Reporting system
4. OUT OF PAPER - Put more paper in your printer and select
Retry from the Menu in the Printer Error Reporting
System.
5. BUSY - Usually means that the printer is turned on but
is not on line. Put the printer on line and select Retry
from the menu in the Printer Error Reporting System.
Appendix D Page 77
---------------------------------------------------------------
PROGRAM LIMITATIONS
---------------------------------------------------------------
The File Selection Screen will only handle:
1. 12 disk drives.
2. 1,000 directories on a disk drive.
3. 2,048 files in a directory.
4. 12 levels of Subdirectories. (DOS has 32)
Floppy Disk Drive Systems: If your computer has only one
floppy disk drive you are not allowed to use this drive as
an A: and B: drive as some DOS utilities do.
Appendix E Page 78
---------------------------------------------------------------
TERMINOLOGY
---------------------------------------------------------------
Algorithm A set of rules for solving a problem in a
finite number of steps.
Back Door Used in reference to a formula in a Pseudo
Random Number Generator. Allows whoever
inserted the back door to decipher a message
without knowing the seed number used to
encipher it.
Binary File Any file that does not meet the definition
of a text file (See Below).
Click To quickly press and release a mouse button.
Command Bar A shadowed bar that carries out a command
or action. May be activated by pressing the
indicated Hot Key or clicking with the left
mouse button. Common Command Bars are Quit
and Help. Some Command Bars do not have a
Hot Key. In that case use the indicated
keyboard key (ie. PgUp, Home, End).
Cursor Keys The Left, Right, Up, and Down Arrow keys.
Ciphertext Plaintext that has been put through a
transformation into secret form.
Directory A collection of computer files (programs,
data, and subdirectories) stored at the same
location on disk.
Directory Tree A graphic display of the directory structure
on a disk. Shown as a branching structure
that looks like a tree. All directories and
subdirectories are branches off of the root
directory.
E-Mail Electronic Mail (messages) sent from
computer to computer. Usually restricted to
text files (See Below).
File Group A group of four related files with the same
name but different file extensions created
by the program. The file extensions are PRM
for Prime Number Files, DFT for Default
Parameter Files, SCM for Scrambled Prime
Number Files, and KEY for Key Files.
Mouse Pointer The non-blinking rectangular box on the
screen indicates the mouse position.
Paging Keys The Page Down, Page Up, Home, and End Keys.
The Home Key takes you to the beginning of
a file or list. The End Key takes you to
the end of a file or list.
Appendix E Page 79
---------------------------------------------------------------
Plaintext A message that will be put into secret form
(ie. data file).
Prime Number Prime numbers are numbers that have only
improper divisors (ie. only divisible evenly
by themselves and one).
Pseudo Random
Numbers Numbers generated by a formula that exhibit
properties of random distribution. Can be
duplicated.
Pseudo
Random Number
Generator A process that continuously generates pseudo
random numbers under control of a formula.
Seed Number The initial number used by a formula in a
pseudo random number generator to start
generating pseudo random numbers. Sometimes
called a key or key number.
Text File Any file that uses only the character codes
32 to 127, the carriage return, line feed,
and tab control characters.
Appendix G Page 80
---------------------------------------------------------------
PGP on PGP
---------------------------------------------------------------
I have just received my first copy of Pretty Good Privacy (PGP)
and have had a chance to look over the program and documentation.
I still stand by my statement on page 61 that any program not
based on the "One Time Pad" System can be broken by the NSA.
The documentation for PGP has not changed my mind. Once you read
the documentation you realize that they really use a conventional
cipher called IDEA(tm) invented in Europe. The only part that
uses the RSA algorithm is the encryption of the key for the
conventional cipher. If the public key can be broken to get the
secret key you can then get the key to the conventional cipher
and decrypt the message. The math to retrieve a secret key from
a public key is known and published. Anyone who thinks the NSA
cannot break a public key is a fool. I will let PGP's own
documentation say the rest.
"A major vulnerability exists if public keys are tampered with.
This may be the most crucially important vulnerability of a
public key cryptosystem, in part because most novices don't
immediately recognize it."
"Another similar attack involves someone creating a clever
imitation of PGP that behaves like PGP in most respects, but
doesn't work the way it's supposed to. For example, it might be
deliberately crippled to not check signatures properly, allowing
bogus key certificates to be accepted." This is possible because
the source code to PGP is published for anyone to use, change,
etc.
"An expensive and formidable cryptanalytic attack could possibly
be mounted by someone with vast supercomputer resources, such as
a Government intelligence agency. They might crack your RSA key
by using some new secret factoring breakthrough."
"Perhaps the Government has some classified methods of cracking
the IDEA(tm) conventional encryption algorithm used in PGP. This
is every cryptographer's worst nightmare. There can be no
absolute security guarantees in practical cryptographic
implementations."
"They are concerned that the whole package is weakened if we use
a hybrid public-key and conventional scheme just to speed things
up. After all, a chain is only as strong as its weakest link.
They demand an explanation for this apparent "compromise" in
the strength of PGP. This may be because they have been caught
up in the public's reverence and awe for the strength and
mystique of RSA, mistakenly believing that RSA is intrinsically
stronger than any conventional cipher. Well, it's not."
AND THEY ARE RIGHT!
INDEX Page 81
Achilles Heel...............64 DoD 5220.22-M...............46
Algorithm...................78 Dvorak, John C..............59
Association of Shareware
Professionals (ASP) E_Mail, What is it..........39
Address..................5 El Gamal Encryption
Disputes.................5 Algorithm...................59
Member...................5 Encipher/Decipher a File....35
Ombudsman................5 Errors
Available by same Author.....6 Start Up/Termination....68
Program.................69
Back Door................59,78 Critical................74
Bamford, James..............59 Printer.................76
Block Cursor................15 Executing Global Security...12
Build a Prime Number File...25 Extended Error
Byte Magazine...............60 Reporting System............21
Extract E-Mail Files........40
Chi Test....................50
Chime.......................16 FBI.........................61
CIA.........................61 Features.....................4
Ciphertext..................78 File Group..................24
Clear and Present Danger....67 File Selection Screen.......17
"Cloak and Data"............61 Four Ways to use
Command Bars................16 Global Security
Command Line Parameters Normal Encipher..........9
Any Order/Combination...12 E-Mail Encipher..........9
/B......................12 Storage on Disk..........9
/P......................12 One Time Pads............9
/T......................12 Frequency Distribution
/V......................12 Tests.......................48
/C......................12 Functions
Communications Satelite Build a Prime
Corporation (COMSAT)........59 Number File.............25
Compressing Files...........32 Create a Default
Computer Requirements.......10 Parameter File..........28
Create a Default Parameter Encipher/Decipher
File........................28 a File..................35
Critical Error Generate a Key File.....30
Reporting System............20 Make a One Time Pad.....43
Pack/UnPack File(s).....32
Data Encryption Standard Scramble a Prime
(DES).......................60 Number File.............29
Data Integrity Checks....34,38 Transform E-Mail Files..39
Decipher a File.............37 Wipe/Delete File(s).....45
Decompressing Files.........34
Default Parameter Files.....28 Grehan, Rick................61
Password Character Generate a Key File.........30
Positions...............28 Government Wipe Procedure...46
Random Factory
Array Shift.............28 High RADIX 64 File Format...39
DIA.........................61
Directory...................78 "Inside Track"..............59
Directory Tree..............78 Installing Global Security..11
INDEX Page 82
Intercepting Computer Data PC Magazine.................59
and E-Mail Transmissions....53 PGP - Pretty Good Privacy...61
PGP on PGP..................80
Kahn, David.................63 Phi Test....................49
Kappa Sub r.................48 Phone System - Digital......62
Kappa Sub p.................48 Plaintext...................79
Kerckhoffs, Auguste.........48 Preface......................7
Keyboard President Truman, Harry S...59
Control C Key...........15 Prime Number................79
Keyboard (Cont.) Printer
Control Break Key.......15 Extended ASCIIZ
Escape Key..............15 Characters..............22
Function Keys...........14 Command Line Switch /P..12
Hot Keys................16 Emulation Modes.........10
Pause Key...............15 Laser...................10
Print Screen Key........15 Pause After Page........22
Key Files...................30 Print Screen Key........15
Printer Error
La Cryptographie militaire..48 Reporting System........22
Lempel-Ziv-Welch Method.....33 Printer Errors..........76
Licensing....................6 Setup Problems..........22
Lucifer.....................60 Using...................22
Program Limitations.........77
Main Menu...................24 Public Key/Private Key......60
Make a One Time Pad.........43 Pseudo Random Numbers.......79
MCI.........................39 Pseudo Random
Mouse Number Generator............79
Click...................78
Hide Pointer............15 Receive Only Station (RCV)..59
Pad..................16,23 Reconstruct E-Mail Files....41
Right Button............15 Registration Incentives......5
Using...................15 Rivest-Shamir-Adelman (RSA)
Using the Mouse Pad.....23 encryption algorithm........60
RSA Data Security...........60
National Institute of
Standards and Technologies..59 Scramble a Prime
National Security Number File.................29
Agency (NSA)..............7,59 Secret Service..............61
Operation Shamrock......61 Senate Intelligence Committe
Senator Church, Frank
One Time Pad System Chairman................62
First Developed.........63 Tyranny Speach......62
First Used by...........63 Setting up the Group Files
Rejected by.............63 and Passwords...............48
Unbreakable.............63 Shamir, Adi.................60
Using a One time Pad....55 Sorting Files...............19
Vigenere Tableau........55
What is a One Time Pad..43 Text File................39,79
Operation Shamrock..........61 "The CODEBREAKERS"..........63
"The Puzzle Palace".........59
Pack/UnPack File(s).........32 Tips on Using Global
Pass It Along................6 Security in the Real World..52
INDEX Page 83
Tom Clancy..................67
Transform E-Mail Files......39
Transmitting Enciphered
Files.......................49
Using a One Time Pad........55
What is Electronic Mail?....39
Why Encipher Data...........59
Why Global Security.........63
Wipe/Delete File(s).........45