home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
OS/2 Shareware BBS: 8 Other
/
08-Other.zip
/
pmc101.zip
/
PMCrypt.INF
(
.txt
)
< prev
Wrap
OS/2 Help File
|
1995-11-11
|
9KB
|
195 lines
ΓòÉΓòÉΓòÉ 1. Introduction ΓòÉΓòÉΓòÉ
Welcome to PMCrypt.
Package PMCrypt
Version V1.01.00
Platform OS/2 2.1 or greater.
Licence Freeware - Do what you like with it !
Author A.Gawthrope. 1995
The documentation in this book is intended as a guide only. PMCrypt has
comprehensive on-line help available.
ΓòÉΓòÉΓòÉ 1.1. Function ΓòÉΓòÉΓòÉ
To allow any binary or ASCII file to be encrypted, thus denying access by
unauthorized persons, then decrypted by someone with the appropriate keys at a
later date.
ΓòÉΓòÉΓòÉ 1.2. General Description ΓòÉΓòÉΓòÉ
The encryption system is a secret key system providing encryption for civil /
lower security tasks. (Providing the eight keys required are kept secret) it
will provide good security. I intended it for the encryption of local data
files on my network originally but it outgrew this function quickly.
ΓòÉΓòÉΓòÉ 1.3. Usage Guidelines ΓòÉΓòÉΓòÉ
Important. Please read.
Within the settings dialog it is possible to set default keys. These are used
for encryption and decryption when the user does not generate any other keys.
As the default keys are stored along with the other settings details this is a
weakness if the user relies upon these keys.
A set of keys for the current session can be generated and used for encryption
or decryption whilst the software is running. These are not stored anywhere
when the software is not being used.
Furthermore one time keys can be generated for each individual encryption or
decryption Again these are not stored when the software is not being used.
Once a file has been encrypted with a set of keys, decryption will only work if
the USER supplies these keys again. The software does not keep track in anyway
of what keys encrypted what file.
ΓòÉΓòÉΓòÉ 2. Requirements ΓòÉΓòÉΓòÉ
ΓòÉΓòÉΓòÉ 2.1. Software ΓòÉΓòÉΓòÉ
Only OS/2 version 2.1 or greater is required.
The following program files are also required :
PMCrypt.exe
PMCrypt.dll
PMCrypt.hlp
applib.dll
crypt.dll
The DLL files must be either in the current directory (whilst the program is
executing) or in the LIBPATH environment variable.
ΓòÉΓòÉΓòÉ 2.2. Hardware ΓòÉΓòÉΓòÉ
Any hardware that is capable of running OS/2.
ΓòÉΓòÉΓòÉ 3. Installation ΓòÉΓòÉΓòÉ
PMCrypt can either be installed over the top of an earlier version or into a
new folder/directory anywhere on your system.
If you choose to install over the top of a previous version then it is Crucial
that all existing copies of the supplied DLL and HLP files are updated to the
ones supplied in this release. Earlier documentation files in the form TXT can
be removed, these have been replaced with a OS/2 format book.
PMCrypt can either be run from the directory were it was installed or if you
execute PMCrypt from another directory be sure that the following environment
variables contain paths to the required files :
LIBPATH Fully qualified path to the DLL files.
HELP Fully qualified path to the HLP file.
Both of these variables can be found in 'config.sys'.
The software will create a settings file called 'PMCrypt.ini' in the directory
where the software is executed. To avoid creating duplicates of this file I
would suggest that you always change to the installation directory before
executing the software.
Initially PMCrypt will open a window that occupies most of the screen, this can
be reseized to whatever you wish. If the check box to save the window position
and size is checked on the Settings menu option then when restarted it will be
restored to it's previous state.
ΓòÉΓòÉΓòÉ 4. Usage overview ΓòÉΓòÉΓòÉ
Although PMCrypt is very easy to use once familiar with the cycle of events
required to encrypt or decrypt a file, I have created the sections below to aid
the first time user.
ΓòÉΓòÉΓòÉ 4.1. First time setup ΓòÉΓòÉΓòÉ
After PMCrypt has been installed your first task will be to use the Settings
menu option to indicate some of the default information that PMCrypt will use.
An entry should be made into all the fields provided. You might also like to
enter your own or generate eight random keys which will be used for the
encryption or decryption processes whenever you do not provide any other keys.
This can be useful in that it provides a mechanism for using the same keys over
and over again. But be warned that the keys are kept together with the other
settings details and are thus liable to attack from unauthorized people. Also
the more frequently a set of keys are used for encryption the easier you are
making it for the encrypted data to be hacked into.
When PMCrypt is run for the first time default values will be placed into the
fields and eight default keys generated.
ΓòÉΓòÉΓòÉ 4.2. Generate keys ΓòÉΓòÉΓòÉ
To increase the security of your encrypted data, I have created the Generate
keys menu option. By using this you can generate numeric keys which will be
used for this session only. (ie. Until you change them or quit PMCrypt). Once
entered or generated the same keys will be used for either the encryption or
decryption options.
When you first enter this menu option after starting PMCrypt the key fields
will contain the default values contained in the Settings menu option. Any
changes made here will not effect the keys held in the Settings option.
ΓòÉΓòÉΓòÉ 4.3. Encrypting ΓòÉΓòÉΓòÉ
Select the file to encrypt by either typing the full file specification or
using the File list button to select it. The encrypted file defaults to the
name UNTITLED and will be placed on the drive and into the directory held in
the Settings menu option. The keys that will be used will be either the ones
you set using the Generate keys menu option or the default ones. If you wish
to use neither of these then check the One time keys radio button. When
encryption starts you will be prompted for eight keys. These will apply ONLY
to this encryption session and will not be held/saved anywhere so remember them
!!!
When both the file name to encrypt and a file name for the encrypted version
have been entered then the Encrypt button becomes active. Press this to begin
the encryption process. If you wish to stop encrypting then press the Stop
button. This will immediately stop encryption, allowing you to change keys,
file names etc.
The encrypted file might be a few characters longer than the original, this is
caused by the encrypting method. When the file is then decrypted the file will
retain these extra characters on the end of the file. They should not cause
problems with any type of file. Once the file has grown slightly then it will
not continue to grow any further.
ΓòÉΓòÉΓòÉ 4.4. Decrypting ΓòÉΓòÉΓòÉ
This is almost identical to the encryption process, however the file name for
the decrypted data defaults to Decrypt, the drive and directory to the values
contained within the Settings menu option.
ΓòÉΓòÉΓòÉ 5. Contacting the author ΓòÉΓòÉΓòÉ
ΓòÉΓòÉΓòÉ 5.1. Email ΓòÉΓòÉΓòÉ
If you have any comments then please post them to :
pmcrypt@paddocks.demon.co.uk
ΓòÉΓòÉΓòÉ 6. Version history ΓòÉΓòÉΓòÉ
Version 1.00.00 07/10/1995
First release.
There is currently no on-line help available, this is being developed right now.
Version 1.01.00 12/11/1995
On-line help to field level added.
Readme file replaced with OS/2 book file.
Several bug fixes and cosmetic changes.