home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
PC Direct 1995 May
/
PC Direct CD-ROM (May 1995).ISO
/
ipe
/
protec
/
manual
/
chap6.txt
< prev
next >
Wrap
Text File
|
1994-08-09
|
6KB
|
151 lines
Chapter 6
Encryption
Encryption refers to the scrambling of information
within a file so that it cannot be deciphered.
PROTEC NET encryption prevents users from
deciphering confidential information without
authorization. PROTEC NET provides two types of
encryption: Automatic and Manual.
=========================
Automatic File Encryption
=========================
PROTEC NET Automatic Encryption provides an extra
level of security since only authorized users with
the appropriate permissions may access encrypted
files. This feature is transparent to the user
because PROTEC NET encrypts and decrypts files as
they are accessed. PROTEC NET Automatic
Encryption will not encrypt program files with the
extension .EXE or .COM. A file will only be
encrypted once. To obtain a list of all files
specified for Automatic Encryption, refer to
PROTEC NET Programs, REPORT.EXE.
If users select files to be encrypted, copy the
Encryption program, ENCRYPT.EXE, to the users
PUBLIC directory. A User can automatically
encrypt any program to which he has been granted
access.
NOTE If files, directories or drives have been specified
for automatic encryption, supervisors must logoff the
workstation for changes to take affect.
Encryption Key
An encryption key is required to encrypt files.
The key is not case sensitive. The encryption key
length must be at least 1 character long and at
most 8. If you are using the DES Hardware option,
the maximum encryption key length is 8. Valid
characters are as follows:
A-Z, a-z, 0-9 ` - = [ ] ; ' . / , ~ ! @ # $ % ^ *
( ) _ + { } : " < > ? \ |
Encryption Method
There are two methods of encryption which can be
utilized with PROTEC NET. Both methods are
described below:
Proprietary encrypts files by a PROTEC NET
proprietary 64 bit algorithm which is software
based.
DES (Hardware) encrypts files using the Data
Encryption Standard as defined by NIST (US
National Institute of Standards and
Technology). This method requires the Jones
Futurex Encryption 300 circuit board.
To Specify Drives, Directories or Files to
Encrypt/Decrypt Automatically
1 Access the Encryption program, ENCRYPT.EXE.
2 Select the appropriate resource. To select
files, highlight them and pressing the
SPACEBAR, or F3 to select all. If you do not
know where a file is located press F8 to
search.
3 Press F6 to encrypt or F5 to decrypt.
4 Enter an encryption key and select an
encryption method.
5 Choose the ENCRYPT button.
6 Choose the OK button. Once encrypted, the
encryption method is displayed to the left of
the filename.
================================
Command Line - Manual Encryption
=================================
PROTEC NET also provides a command-line encryption
program which may be used by the supervisors and
users alike.
To encrypt a file, you must use the PROTEC NET
utility, PCRYPT.EXE. Files may be encrypted to
function with PROTEC's automatic encryption
security module using this utility. If users
other than supervisors may use encryption, copy
PCRYPT.EXE into a directory that users may access.
If all users are allowed to use encryption, copy
PCRYPT.EXE to the PUBLIC directory on the C:
Drive. For more information on PCRYPT.EXE, refer
to PROTEC NET Programs.
NOTE Users may encrypt any file that they are allowed to
access.
==============================
Encryption and Backup Programs
==============================
Backup programs which back the system up by file,
such as Norton Backup, will create a backup of
your system where files specified for automatic
encryption are backed up in an decrypted format.
If the system needs to be backed up where files
must sustain their encrypted format, unload PROTEC
NET temporarily and then back up the system. For
information on unloading PROTEC NET temporarily,
refer to Supervisor Login Function.
Files that have been manually encrypted will be
backed up in their encrypted format.