home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The World of Computer Software
/
World_Of_Computer_Software-02-387-Vol-3of3.iso
/
c
/
cry_v12.zip
/
CRY.DOC
next >
Wrap
Text File
|
1993-03-09
|
65KB
|
1,673 lines
CryptoAnalyzer Version 1.2
Copyright (c) 1993
All Rights Reserved
by
William Ned Miller
7504 Saffron Court
Hanover MD 21076
(410) 766-2365
Section Page
1.0 Introduction ............................................... 1
1.1 Document Layout ......................................... 2
2.0 System Requirements ........................................ 2
2.1 Hardware Requirements ................................... 2
2.2 Video Adapters .......................................... 2
2.3 Operating System Limitations ............................ 2
3.0 Installation ............................................... 3
4.0 Program Options ............................................ 4
4.1 Substitution Helper ..................................... 4
4.2 Substitution ............................................ 6
4.2.1 Encipher ........................................... 7
4.2.2 Encipher with Keyword .............................. 9
4.2.3 Decipher with Keyword .............................. 10
4.3 Railfence ............................................... 11
4.3.1 Encipher ........................................... 11
4.3.2 Decipher ........................................... 13
4.3.3 Decipher Helper .................................... 13
4.4 Playfair ................................................ 14
4.4.1 Encipher ........................................... 15
4.4.2 Decipher ........................................... 17
4.4.3 Helper ............................................. 17
4.5 Polyalphabetic .......................................... 18
4.5.1 Encipher ........................................... 19
4.5.2 Decipher ........................................... 20
4.5.3 Helper ............................................. 21
4.6 Bifid ................................................... 22
4.6.1 Encipher ........................................... 22
4.6.2 Decipher ........................................... 23
4.7 Read File ............................................... 24
5.0 Licensing .................................................. 25
6.0 Disclaimer ................................................. 26
7.0 Whats New .................................................. 27
8.0 Where CryptoAnalyzer Can Be Found .......................... 28
- i -
1.0 Introduction
CryptoAnalyzer, CRY, is a program to aid the user in the solving of
cryptograms. Not only is CRY an aid but it will also allow the user to
easily create their own cryptograms. This version of the program will aid
the user in solving substitution, railfence, playfair, Bifid and
Polyalphabetic type cryptograms but future releases of the program will
contain additional methods. There are many features to CryptoAnalyzer, the
following lists a few:
1) Text entered under one option will be carried over to another.
This way the user will not have to re-enter data when going
from one method to another.
2) Text listed in the lower window, when the F1 key has been
pressed, can be dump to a user defined file.
3) The simple substitution helper will save the user a lot of
erasers and rubbed out paper when this type of cryptogram
is being solved.
4) Text can be read from a file.
The following display will be presented to the user when CRY is
executed.
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| 1. Substitution Helper |
| 2. Substitution |
| 3. Railfence |
| 4. Playfair |
| 5. Polyalphabetic |
| 6. Bifid |
| |
| 0. Read File |
| |
| |
| |
| |
+-------------------------------------------------------------------------+
| F10=Exit|
|----------------$8.50 Shareware Contribution Requested-------------------+
Pressing the "1" key will enter the "Substitution Helper", "2" will
enter "Substitution" and "3" will enter "Railfence", "4" will enter
"Playfair", "5" will enter "Polyalphabetic" and "6" will enter "Bifid".
Pressing the F10 function from this window will exit CryptoAnalyzer and leave
the user at the point where CRY was executed.
CryptoAnalyzer was developed in the programming language Ada.
- 1 -
1.1 Document Layout
The remainder of this document is as follows:
Chapter 2 - System Requirements
Chapter 3 - Installation Procedures
Chapter 4 - Program Options
Chapter 5 - Licensing
Chapter 6 - Disclaimer
Chapter 7 - Where CryptoAnalyzer Can Be Found
2.0 System Requirements
This chapter describes system requirements necessary to execute
CryptoAnalyzer.
2.1 Hardware Requirements
CryptoAnalyzer is compatible with the AT, PS2 models and other 100%
compatible systems. If a user has an 8086/8088 system contact the author for
a version to execute on these type systems.
2.2 Video Adapters
CryptoAnalyzer will operate with all type of video adapters. It has
been designed and tested with Monochrome, EGA, CGA and VGA adapters.
2.3 Operating System Limitations
CryptoAnalyzer has been designed to execute on systems with DOS versions
3.00 through 5.00.
- 2 -
3.0 Installation Procedures
The following procedures allow new users to easily install
CryptoAnalyzer on their system. The following procedures make the assumption
that you have a hard disk as drive "c", boot from that drive and will be
using "CRY" as the directory for the program.
1. Make a subdirectory "CRY" under the "C:\" (root) directory.
mkdir cry
2. Copy all CRY files to this new "C:\CRY" directory.
copy *.* c:\cry
3. Type "cry" at the DOS prompt
cd cry
cry
- 3 -
4.0 Program Options
This chapter will explain each of the options available with the
CryptoAnalyzer program.
4.1 Substitution Helper
Choosing this option from the main menu will aid the user in solving
simple substitution cryptograms. Upon selection, the following will be
presented to the user:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| |
| +Enter Cipher Text----------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
| |
| |
| |
| |
| |
| |
| |
| |
+-------------------------------------------------------------------------+
| F10=Stop Editing|
+-------------------------------------------------------------------------+
At this point, the user enters in the cipher text that is to be
deciphered. Once all of the text has been entered, press the F10 function
key to stop the editing process and enter the substitution helper. The
following will be displayed:
NOTE
Plain or cipher text entered on one screen will be retained and be
accessible on another.
- 4 -
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| Cipher=ABCDEFGHIJKLMNOPQRSTUVWXYZ Cipher Letter _ |
| Enter Plain Text Plain =-------------------------- Plain Letter |
| +---------------------------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
| --- -- --- ---- |
| --- --- ---- |
| --- -- ---- |
| -- --- |
| --- |
| -- ----- -------. |
| |
| |
|A= 2 C= 2 E= 6 G= 1 I= 4 K= M= 3 O= 9 Q= S= 2 U= 1 W= Y= 1|
|B= D= 2 F= 2 H= 3 J= L= 2 N= 3 P= R= 3 T= 7 V= X= Z= 1|
+-------------------------------------------------------------------------+
| F10=Exit|
+-------------------------------------------------------------------------+
This window will be all that is needed to solve a cryptogram that uses
simple substitution. The window contains a number of fields that will aid
the user in solving the cryptogram.
1) The top part of the window contains the mapping from cipher text to
plain text.
2) The bottom of the window will contain a frequency count of each
letter in the cryptogram. This may aid the user in determining the
more frequent letters used in the english language.
3) Just under the cipher text will be where the plain text will be
displayed. At first, the plain text will be displayed as '-'. As
a cipher letter is mapped to a plain letter the mapping will be
displayed.
4) At the top right will be the user's input fields that are used to
enter a cipher letter and a plain text letter. When these two
fields are filled in, a mapping from cipher to plain text will be
performed and the various portions of the window will be updated
to reflect the users input. The following are a few examples that
may be entered:
- 5 -
Cipher Letter: A
Plain Letter: B
In this example the program will map the letter "A" to the letter "B".
In the plain text area the letter "B" will be displayed corresponding to the
letter "A" that is in the cipher text area. The cipher to plain mapping at
the top of the window will be updated to reflect the input.
Cipher Letter: A
Plain Letter: -
In this example the program will erase the mapping of the letter "A" to
the letter "B". This will be reflected in the cipher to plain text mapping
and also in the plain text area.
4.2 Substitution
Choosing this option from the main menu will aid the user in enciphering
and deciphering substitution cryptograms. Upon selection the following will
be presented to the user:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| |
| 1. Encipher |
| 2. Encipher With Keyword |
| 3. Decipher With Keyword |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
+-------------------------------------------------------------------------+
| F10=Main Menu|
+-------------------------------------------------------------------------+
- 6 -
4.2.1 Encipher
Choosing the "Encipher" option from the main menu will aid the user in
enciphering substitution cryptograms. Upon selection, the following will be
presented to the user:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| |
| |
| +Enter Plain Text-----------------------------------------------------+ |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| +---------------------------------------------------------------------+ |
| |
.
.
.
| |
+-------------------------------------------------------------------------+
| F10=Stop Editing|
+-------------------------------------------------------------------------+
At this point, the user enters in the plain text that is to be
enciphered. Once all of the text has been entered, press the F10 function
key to stop the editing process and enter the enciphering process. The
following will be displayed:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| |
| +Enter Plain Text-----------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
.
.
.
| |
+-------------------------------------------------------------------------+
|F1=Process F2=Cipher F9=File F10=Exit|
+-------------------------------------------------------------------------+
- 7 -
At this point there are two options. The "Cipher" options, by pressing
F2, will allow the user to create a cryptogram by choosing their own
substitution letters. The following will be presented to the user:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| +Enter Plain Text-----------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
| Plain =ABCDEFGHIJKLMNOPQRSTUVWXYZ |
| Cipher =-------------------------- |
| |
| Plain _ |
| Cipher |
| |
| |
| |
+-------------------------------------------------------------------------+
|F1=Process F2=Cipher F10=Exit|
+-------------------------------------------------------------------------+
The user can choose their own substitution letter by letter. First a
plain text letter and then a cipher letter. As the letters are entered, the
mapping will be displayed above the user entry fields. Once all of the
letters have been mapped, choosing the "Process" option, F1, the ciphered
text will be generated and displayed.
After the F1 key has been pressed and the cryptogram created, the F9
function key can be used to dump the text to a file. The user will be given
the chance to choose their own output file or the default 'crypto.txt' can be
used. Once the file name has been chosen pressing the enter will cause the
file to be created in the current directory. Pressing the 'ESC' key will
cancel the file output option.
- 8 -
4.2.2 Encipher with Keyword
Choosing the "Encipher with Keyword" option from the substitution menu
will aid the user in enciphering substitution cryptograms. The user will be
presented with a window in which to enter the plain text. Once the plain
text has been entered and the F10 key pressed, the user is ready to create
the cipher text. The following will be displayed for the user:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| Shift: _ |
| Keyword: |
| +Enter Plain Text-----------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to come to | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
.
.
.
| |
+-------------------------------------------------------------------------+
|F1=Process F2=Shift F3=Keyword F10=Exit|
+-------------------------------------------------------------------------+
Enciphering a substitution with this option requires the user to enter
a keyword and a shift value. If no keyword or shift values are provided then
the ciphered text will be the same as the plain text.
1) Keyword - Pressing the F3 function key will place the cursor on this
field. The key must contain the letters "A-Z". This is
usually a common word. The whole word can be entered
CryptoAnalyzer will remove any duplication.
2) Shift - Pressing the F2 function key will place the cursor on this
field. This is an integer value between 0 and 26. This
indicate how much to shift the keyword and the rest of
the alphabet to create the cipher map. A value of zero
indicates that the alphabet is NOT to be shifted. This
is the default value if no value is entered.
- 9 -
The following is a few examples using a keyword and a shift value:
1) Keyword = MILLER (will be inserted as 'MILER')
Shift = 0
Plain =ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher=MILERABCDFGHJKNOPQSTUVWXYZ
In this example not much substitution will take place just where the
keyword is enter into the equation. The shift value of '0' did not
cause a shift in the cipher alphabet.
2) Keyword = MILLER
Shift = 25
Plain =ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher=ZMILERABCDFGHJKNOPQSTUVWXY
In this example 25 out of 26 letter letters were substituted. The
letter "e" happens to map back to the letter "e". If the shift had
been another value no letter would map back onto itself. Notice how
the second 'L' in 'MILLER' has been remove from the keyword.
Once the cipher alphabet has been created, pressing the F1 function key
will create the cryptogram from this alphabet. It will be displayed in the
lower half of the window. Again the F9 key can be used to dump the text to
an output file.
4.2.3 Decipher with Keyword
Choosing the "Decipher with Keyword" option from the substitution menu
will aid the user in deciphering substitution cryptograms. The user will be
presented with a window in which to enter the cipher text. Once the cipher
text has been entered and the F10 key pressed, the user is ready to recreate
the plain text. The procedures to recreate the plain text are the same as
described in the previous section. Remember the user must know the keyword
and shift value in order for the plain text to be reconstructed. If these
values are not known then using the "substitution helper" will aid in the
reconstruction.
- 10 -
4.3 Railfence
Choosing this option from the main menu will aid the user in enciphering
and deciphering railfence cryptograms. Upon selection, the following will be
presented to the user:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| 1. Encipher |
| 2. Decipher |
| 3. Decipher Helper |
| |
| |
.
.
.
| |
| |
+-------------------------------------------------------------------------+
| F10=Main Menu|
+-------------------------------------------------------------------------+
4.3.1 Encipher
Choosing the "Encipher" option from the Railfence menu will aid the user
in enciphering railfence cryptograms. Upon selection the following will be
presented to the user:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| |
| +Enter Plain Text-----------------------------------------------------+ |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| +---------------------------------------------------------------------+ |
| |
.
.
.
| |
| |
+-------------------------------------------------------------------------+
| F10=Stop Editing|
+-------------------------------------------------------------------------+
- 11 -
At this point the user enters in the plain text that is to be enciphered.
Once all of the text has been entered, press the F10 function key to stop the
editing process and enter the enciphering process. The following will be
displayed:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| Height = |
| +Enter Plain Text-----------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
.
.
.
| |
| |
+-------------------------------------------------------------------------+
|F1=Process F2=Height F9=File F10=Exit|
+-------------------------------------------------------------------------+
At this point there are two options. The "Height" options, by pressing
F2, will allow the user to choose a height for their rails. After entering
a height, press the F1 function key to produce the cryptogram. The following
will be presented to the user:
- 12 -
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| Height = 5 |
| +Enter Plain Text-----------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
| +---------------------------------------------------------------------+ |
| |NTLNO FUOEI ALETT TOTON WHMRG MOEHD HCTIT EOODC MEIER RSFOO AIY | |
| | | |
| | | |
| | | |
| | | |
| | | |
| +---------------------------------------------------------------------+ |
| |
+-------------------------------------------------------------------------+
|F1=Process F2=Height F9=File F10=Exit|
+-------------------------------------------------------------------------+
4.3.2 Decipher
Choosing the "Decipher" option from the main menu will aid the user in
deciphering railfence cryptograms. The processing and parameters are the
same as in enciphering a railfence cryptogram.
4.3.3 Decipher Helper
Choosing the "Decipher Helper" option from the Railfence menu will aid
the user in deciphering railfence cryptograms. Once the text has been
entered and the F1 function key has been pressed, the following will be
presented to the user:
- 13 -
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| Up: ^ |
| Down: v Height: 3 |
| +Enter Plain Text-----------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
| +---------------------------------------------------------------------+ |
| |NSTFL ONOOA FIUYO ITEIE OALOD ETCMT TEIOT ERONR WHMRG MOEHD HCT | |
| | | |
| | | |
| | | |
| | | |
| | | |
| +---------------------------------------------------------------------+ |
| |
+-------------------------------------------------------------------------+
|F1=Process F9=File F10=Exit|
+-------------------------------------------------------------------------+
Using the up and down arrow keys, the user will be able to go through
heights ranging from 3 to 20. The plain text will be displayed in the lower
window. Once the correct rail has been reached, the plain text will just pop
out in the lower window.
4.4 Playfair
Choosing this option from the main menu will aid the user in enciphering
and deciphering playfair cryptograms. Upon selection, the following will be
presented to the user:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| |
| 1. Encipher |
| 2. Decipher |
| 3. Helper |
| |
.
.
.
| |
+-------------------------------------------------------------------------+
| F10=Main Menu|
+-------------------------------------------------------------------------+
- 14 -
4.4.1 Encipher
Choosing the "Encipher" option from the Playfair menu will aid the user
in enciphering Playfair cryptograms. Upon selection, the following will be
presented to the user:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| Keyword: |
| +Enter Plain Text-----------------------------------------------------+ |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| +---------------------------------------------------------------------+ |
| |
| |
.
.
.
| |
+-------------------------------------------------------------------------+
| F10=Stop Editing|
+-------------------------------------------------------------------------+
At this point the user enters in the plain text that is to be enciphered.
Once all of the text has been entered, press the F10 function key to stop the
editing process and enter the enciphering process. The following will be
displayed:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| Keyword: |
| +Enter Plain Text-----------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
.
.
.
| |
+-------------------------------------------------------------------------+
|F1=Process F2=Keyword F9=File F10=Exit|
+-------------------------------------------------------------------------+
- 15 -
At this point there are two options. The "Keyword" options, by pressing
F2, will allow the user to choose their keyword. After entering a keyword,
press the F1 function key to produce the cryptogram. The following will be
presented to the user:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| Enter Plain Text Keyword: THEKEY |
| +---------------------------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
| +---------------------------------------------------------------------+ |
| |SGLVY OEKGH KLSAD OQQOU ARKLY GAQGR KHUAE KGBRA YAEKP MQAGZ OKZK | |
| | | |
| | | |
| | | |
| +---------------------------------------------------------------------+ |
| |
+-------------------------------------------------------------------------+
|F1=Process F2=Keyword F9=File F10=Exit|
+-------------------------------------------------------------------------+
The following method is applied when enciphering with the playfair
method:
1) It uses a 5x5 matrix in which the letters of the alphabet
are entered. This program will assume that 'i' and 'j'
occupy the same location. The assignment of the letters
will be according to the keyword. Once the square has
been defined, the following three instructions are used
to create the cipher text from the plain text.
a) If the next pair of letters are in the same row, then the
letters to the right are taken.
b) If the next pair of letters are in the same column, then the
letters below are taken.
c) If the two letters are in different rows and columns, then
the letters opposite in the rectangle are taken.
- 16 -
4.4.2 Decipher
Choosing the "Decipher" option from the "Playfair" menu will aid the
user in deciphering playfair cryptograms. The processing and parameters are
the same as in enciphering a playfair cryptogram.
The following method is applied when deciphering with the playfair
method:
1) Deciphering requires a 5x5 matrix created by a keyword.
Once the square has been defined, the following three instructions
are used to create the plain text from the cipher text.
a) If the next pair of letters are in the same row, then the
letters to the left are taken.
b) If the next pair of letters are in the same column, then the
letters above are taken.
c) If the two letters are in different rows and columns, then
the letters opposite in the rectangle are taken.
4.4.3 Helper
Choosing the "Helper" option from the "Playfair menu will aid the user
in analyzing playfair cryptograms. Once the text has been entered, the
following will be displayed:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| |
| +Enter Cipher Text----------------------------------------------------+ |
| |NTLNO FUOEI ALETT TOTON WHMRG MOEHD HCTIT EOODC MEIER RSFOO AIY | |
| | | |
| | | |
| | | |
| | | |
| | | |
| +---------------------------------------------------------------------+ |
| |
.
.
.
| |
+-------------------------------------------------------------------------+
|F1=Translate F2=Square F3=Keyword F9=File F10=Exit|
+-------------------------------------------------------------------------+
- 17 -
The Keyword option, F3, will allow the user to enter their guess for the
keyword. Once the keyword has been entered, the Square option, F3, can be
used to view the 5x5 square that will be used in the decipherment. The
Translate options, F1, will allow the user to perform the translation to
plain text. Constant editing of the square may be required to obtain the
correct solution.
4.5 Polyalphabetic
Choosing this option from the main menu will aid the user in enciphering
and deciphering polyalphabetic cryptograms. Upon selection, the following
will be presented to the user:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| |
| 1. Encipher |
| 2. Decipher |
| 3. Helper |
| |
.
.
.
| |
+-------------------------------------------------------------------------+
| F10=Main Menu|
+-------------------------------------------------------------------------+
- 18 -
4.5.1 Encipher
Choosing the "Encipher" option from the polyalphabetic menu will aid the
user in enciphering polyalphabetic cryptograms. At this point, the user
enters in the plain text that is to be enciphered. Once all of the text has
been entered, press the F10 function key to stop the editing process and
enter the enciphering process. The following will be displayed:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| Keyword = |
| +Enter Plain Text-----------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
.
.
.
| |
+-------------------------------------------------------------------------+
|F1=Process F2=Keyword F9=File F10=Exit|
+-------------------------------------------------------------------------+
At this point there are two options. The "Keyword" options, by pressing
F2, will allow the user to choose their keyword. After entering a keyword,
press the F1 function key to produce the cryptogram. The following will be
presented to the user:
- 19 -
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| KeyWord = MILLER |
| +Enter Plain Text-----------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
| +---------------------------------------------------------------------+ |
| |ZWHTW KTMET QVRWC LPCSW ZOQVZ BZNSD QBZEL VMQOZ JKTMT CGFGV ECC | |
| | | |
| | | |
| | | |
| +---------------------------------------------------------------------+ |
| |
+-------------------------------------------------------------------------+
|F1=Process F2=Keyword F9=File F10=Exit|
+-------------------------------------------------------------------------+
The following method is applied when enciphering with the Polyalphabetic
method:
1) Using the keyword, write it over the plain text. The following
illustrate the process: (Assume keyword is 'MILLER')
MILER MILER MILER MILER MILER
NOWIS THETI MEFOR ALLGO ODMEN
2) Generate a table that has the following format:
Keyletter
ABCDEFGHIJKLMNOPQRSTUVWXYZ
P +--------------------------
l A|ABCDFEF...
a B|BCDEFGH...
i C|CDEFGHI...
n D|DEFGHIJ...
L E|EFGHIJK...
e F|FGHIJKL...
t G|GHIJKLM...
t .|.......
e .|.......
r .|.......
3) To encipher take the intersection of the key letter column and
the plain text row.
- 20 -
4.5.2 Decipher
Choosing the "Decipher" option from the Polyalphabetic menu will aid the
user in deciphering polyalphabetic cryptograms. The processing and
parameters are the same as in enciphering with the following exception.
1) To decipher find the letter on the Keyletter row that is in the
keyword scan down to the cipher letter and then associate the
plain text letter.
4.5.3 Helper
Choosing the "Helper" option from the "Polyalphabetic" menu will allow
the user in analyzing polyalphabetic cryptograms. Once the text has been
entered the following will be displayed:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| Enter Best Key Length: |
| Enter Keyword: |
| +Enter Cipher Text----------------------------------------------------+ |
| |NTLNO FUOEI ALETT TOTON WHMRG MOEHD HCTIT EOODC MEIER RSFOO AIY | |
| | | |
| | | |
| | | |
| | | |
| | | |
| +---------------------------------------------------------------------+ |
| |
.
.
.
| |
+-------------------------------------------------------------------------+
|F1=KeyLength F2=Keyword F9=File F10=Exit|
+-------------------------------------------------------------------------+
Using this option will require the user to play with the 'Key Length'
and 'Keyword'. When the 'Best Key Length' is entered CryptoAnalyzer will
attempt to calculate the keyword. This does depend on the 'Best Key Length'
being correct, so several attempts may be necessary. The calculate keyword
will not always be correct and will require editing the keyword to make it
correct.
- 21 -
4.6 Bifid
Choosing this option from the main menu will aid the user in enciphering
and deciphering Bifid cryptograms. Upon selection, the following will be
presented to the user:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| |
| |
| 1. Encipher |
| 2. Decipher |
| |
| |
.
.
.
| |
+-------------------------------------------------------------------------+
| F10=Main Menu|
+-------------------------------------------------------------------------+
4.6.1 Encipher
Choosing the "Encipher" option from the Bifid menu will aid the user in
enciphering Bifid cryptograms. At this point, the user enters in the plain
text that is to be enciphered. Once all of the text has been entered, press
the F10 function key to stop the editing process and enter the enciphering
process. The following will be displayed:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| Block Length = |
| Keyword = |
| +Enter Plain Text-----------------------------------------------------+ |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| +---------------------------------------------------------------------+ |
| |
.
.
.
| |
+-------------------------------------------------------------------------+
|F1=Process F2=Block Length F3=KeyWord F9=File F10=Exit|
+-------------------------------------------------------------------------+
- 22 -
At this point there are three options. The "Block Length" option, by
pressing F2 and "KeyWord" option, by pressing F3. After entering a keyword,
press the F1 function key to produce the cryptogram. The following will be
presented to the user:
+-----------------CryptoAnalyzer V1.2 by William Ned Miller---------------+
| Block Length = 5 |
| KeyWord = MILLER |
| +Enter Plain Text-----------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
| +---------------------------------------------------------------------+ |
| |YBKXP DTQLE PZRAL GLFMK UPNIG YXPCL TUINN EQRIH UQBNM OZEHN YTV | |
| | | |
| | | |
| | | |
| +---------------------------------------------------------------------+ |
| |
+-------------------------------------------------------------------------+
|F1=Process F2=Keyword F9=File F10=Exit|
+-------------------------------------------------------------------------+
4.6.2 Decipher
Choosing the "Decipher" option from the Bifid Menu will aid the user in
deciphering Bifid cryptograms. The processing and parameters are the same as
in enciphering.
- 23 -
4.7 Read File
Choosing the "Read File" option from the main menu will allow the user
to read in a file. Only the first six lines and 74 character/line will be
read.
- 24 -
5.0 Licensing
* A $8.50 shareware contribution is requested for using the
program.
* The author retains the sole right to sell the program.
* The author grants users the right to copy and distribute
the program within the following constraints:
- All program files remain unaltered and are distributed
together.
- No attempt is made to sell the program, or to make
money from it or any modified version of it.
- The program is not bundled with any other hardware or
software transactions without the author's permission.
- Only the original "non-cloned" version of the program
with the request contribution is distributed.
- Recognized user groups may charge a maximum $7
duplication or distribution fee.
* Continued use of the program (more than 3 weeks) by any
individual, corporation or institution without a single
user or site license is prohibited.
* Single user licenses are obtained by sending in the $8.50
shareware contribution.
* User that send in the requested contribution will receive
instructions on how to remove the shareware request and
insert their own name and registration number.
* Once CryptoAnalyzer has been registered the registration
follows the program for all future releases of the
program.
- 25 -
6.0 Disclaimer
The author disclaims all warranties expressed or implied as to the
quality or performance of this program. The author will not be held liable
for any lost profits, lost savings or any other direct, indirect,
incidental or consequential damages resulting from the use of this program.
Your use of this program constitutes your agreement to this disclaimer and
your release of the author from any form of liability or litigation.
- 26 -
7.0 Whats New
V1.1
This version includes the method for Playfair and Polyalphabetic type
cryptograms.
V1.2
This version includes the method for Bifid type cryptograms.
This includes the capability so that the use can read in a files that is
to be enciphered or deciphered.
- 27 -
8.0 Where CryptoAnalyzer Can Be Found
The latest version of CryptoAnalyzer and other products developed by
this author can be found on the following BBS:
The Programmer's Corner
Columbia Maryland
301-596-7692 through 7697
301-995-6873 through 6877
301-621-3424 and 3436
- 28 -
CryptoAnalyzer Version 1.2
Copyright (c) 1993
All Rights Reserved
William Ned Miller
7504 Saffron Court
Hanover MD 21076
(410) 766-2365
Registration Form
Registration Provides:
1) Notification of the next release of CryptoAnalyzer.
2) Instructions on how to remove the shareware contribution request
and insert the users name and registration number. Registration
follows all future release of the program.
To register your copy of CryptoAnalyzer please fill in the following
information and send it along with $8.50 (US) to:
William Ned Miller { Please only send }
7504 Saffron Court { checks drawn on }
Hanover MD 21076 { U.S. banks or }
{ postal money }
{ orders. }
Name: ____________________________________________________________
Address: _________________________________________________________
__________________________________________________________________
Phone: (Optional) ( )______-__________________________________
Where Did You Get CryptoAnalyzer _________________________________
__________________________________________________________________
Comments: ________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________