home *** CD-ROM | disk | FTP | other *** search
- ^X.TH HILL 1
- ^X.SH NAME
- ^Xhill \- encryption program using Hill cipher
- ^X.SH SYNOPSIS
- ^X.B hill
- ^X[ -e | -d ]
- ^X[ -c | -C | -p ]
- ^X[ -u ]
- ^X[ key ]
- ^X.SH DESCRIPTION
- ^X.I Hill
- ^Xprovides file encryption using the Hill cipher.
- ^XIn encryption mode,
- ^Xplaintext is read from the standard input
- ^Xand ciphertext is written to the standard output
- ^Xin accordance with a user-specified
- ^X.B key.
- ^XAdditional options allow compressing the plaintext
- ^Xand/or expressing the ciphertext in ASCII.
- ^XIn decryption mode, the operations of encryption mode
- ^Xare reversed (provided the right
- ^X.B key
- ^Xis supplied).
- ^X.SH OPTIONS
- ^X.TP
- ^X.B \-e
- ^XEncryption mode.
- ^X.TP
- ^X.B \-d
- ^XDecryption mode.
- ^X.TP
- ^X.B \-c
- ^XUse
- ^X.I compact
- ^Xor
- ^X.I uncompact
- ^Xfor compression or decompression
- ^X(these programs must be on the search path
- ^Xto use this option).
- ^X.TP
- ^X.B \-C
- ^XUse
- ^X.I compress
- ^Xor
- ^X.I uncompress
- ^Xfor compression or decompression
- ^X(these programs must be on the search path
- ^Xto use this option).
- ^X.TP
- ^X.B \-p
- ^XUse
- ^X.I pack
- ^Xor
- ^X.I unpack
- ^Xfor compression or decompression
- ^X(these programs must be on the search path
- ^Xto use this option).
- ^X.TP
- ^X.B \-u
- ^XUse
- ^X.I uuencode
- ^Xafter encryption
- ^Xor
- ^X.I uudecode
- ^Xbefore decryption
- ^X(these programs must be on the search path
- ^Xto use this option).
- ^X.SH "SECURITY CONSIDERATIONS"
- ^X.I Hill
- ^Xprovides strong security against straight cryptanalysis
- ^Xand acceptable security against probable-plaintext analysis.
- ^XUse of the -c and -C options
- ^Xactually improves security;
- ^Xone of these options should be used
- ^Xexcept where time is critical.
- ^XUse of the -p option
- ^Xdecreases security;
- ^Xit should be used only where space is critical
- ^Xand neither -C nor -c is available.
- ^X.PP
- ^XKeys must be at least 9 bytes long
- ^X(the maximum length is 256 bytes)
- ^Xand should be both long and hard to guess.
- ^XAll security resides in the keys.
- ^X.SH "TIME CONSIDERATIONS"
- ^X.I Hill
- ^Xencrypts at the rate of about 2 kilobytes per second
- ^X(using a 16-byte key)
- ^Xon an 8MHz IBM PC/AT running SCO Xenix.
- ^XTime increases linearly in the length of the file
- ^Xand in the square root of the key length.
- ^X.SH "SPACE CONSIDERATIONS"
- ^XEncrypted files increase in length by about 1%.
- ^X.SH FILES
- ^X/usr/bin/hill script for pre/postprocessing
- ^X.br
- ^X/usr/bin/hill0 actual encryption program
- ^X.br
- ^XThese two files can be installed anywhere on the search path.
- ^X.SH "MS-DOS VERSION"
- ^XThe MS-DOS version of
- ^X.I hill
- ^Xhas the same capabilities,
- ^Xexcept that only the
- ^X.B \-e
- ^Xand
- ^X.B \-d
- ^Xoptions are supported.
- ^X.SH "SEE ALSO"
- ^X.IR pack (1),
- ^X.IR compact (1),
- ^X.IR compress (1)
-