home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Fritz: All Fritz
/
All Fritz.zip
/
All Fritz
/
FILES
/
UTILFILE
/
EIDOS.LZH
/
EID.DOC
< prev
next >
Wrap
Text File
|
1992-10-30
|
41KB
|
1,124 lines
(C) Copyright 1991 MaeDae Enterprises
E N C R Y P T - I T F O R D O S
Version 1.xx
Reference Manual
Encryption, decryption, and cryptanalysis program.
Supporting the secure Data Encryption Standard (DES).
Context sensitive help and on-line manual make it easy!
Encrypt-It is user supported software (Shareware). If you use it
past the initial 15 day evaluation period you are required to
register it. No exceptions!
Registered Users: Your serial number can be found on the back of
your manual, the distribution disk, or on the registration card.
Encrypt-It for DOS
"Encryption/Decryption/Cryptanalysis -- Fast, Safe, and Easy to Use"
is published by
MaeDae Enterprises
5430 Murr Road
Peyton, CO 80831 USA
(719) 683-3860
Published and printed in the United States of America.
Copyright 1991 by MaeDae Enterprises as a licensed, unpublished,
proprietary work. All international rights reserved.
Page 1
(C) Copyright 1991 MaeDae Enterprises
The printed Reference Manual and associated registered software
may not be copied, resold, reproduced, disclosed, archived,
transmitted, or transferred in any form, electronic or otherwise,
without the expressed written permission of MaeDae Enterprises.
You may freely distribute the Shareware version.
REGISTERED USERS: (those who paid and receive a serial number)
MaeDae Enterprises hereby grants a "book" license to the original
individual (even if purchased by a company) user of this copy of
Encrypt-It. You may use the program on your computer and make
one backup for storage as long as there is no possibility of use
or residence on more than one machine at any time. Just like two
people cannot read the same book in different locations at the
same time. Every registered copy of Encrypt-It has a unique
embedded serial number for traceabililty. You may not sell or
give copies of the registered program or printed documentation to
anyone. No exceptions.
Pricing, specifications, and conditions are subject to change
without notice.
Send all registrations and inquires for site (multiple CPU or
network) licensing to MaeDae Enterprises at the address on the
previous page.
Disclaimer:
MaeDae Enterprises makes NO claims AND offers NO warranties of
any sort with Encrypt-It. MaeDae Enterprises assumes NO
responsibility for any sort of damage resulting from the apparent
or actual use of Encrypt-It(mental or physical). The program
provided is not guaranteed as to merchantability or fitness for
its ultimate use. The user accepts all responsibility for use
and may not resell the program.
IBM PC/XT/AT are registered trademarks of the International
Business Machines Corporation.
Encrypt-It is a trademark of MaeDae Enterprises. Other
trademarks belong to their respective owners.
Page 2
(C) Copyright 1991 MaeDae Enterprises
PREFACE
ABOUT THIS MANUAL
You will notice that this manual is concise. This is intentional
as we have strived to make Encrypt-It the easiest program of its
type to use. We have opted to provide an on-line manual and
extensive context sensitive user help. Feel free to use this
reference manual to install and get acquainted with the program.
For many of you, this may be your first exposure to Shareware.
To help eliminate possible confusion, we have included a short
description of the Shareware marketing concept, explaining what
it is and why it relies on you for its survival.
What is Shareware? Shareware is not a kind of software. It is a
revolutionary method of marketing Commercial software. Our
software is Commercial software that we are allowing you to
examine for 15 days before you make the purchase decision. With
traditional marketing methods, you have to purchase Commercial
software from a computer store or through mail order businesses,
then try it out, and hope it does what you want. Shareware
allows you to "try before you buy!"
We rely upon you, the customer, to examine our software. If you
find our software useful, please register. Your support is
needed for us to continue to improve our products.
Enough of this verbage. The real fun and learning begin when you
use the program. So enjoy, live long, and prosper.
With warmest regards,
The gang at MaeDae Enterprises.
Page 3
(C) Copyright 1991 MaeDae Enterprises
Table of Contents
=================
Page Description
==== ============
5. What is the Data Encryption Standard (DES)?
5. What is Encrypt-It? An overview of its features.
6. Hardware Requirements
7. Installation - the "README.DOC" file.
7. Installation Notes
9. Getting Started
10. Tutorial
11. Additional Features
14. Troubleshooting
15. Basic Definitions
16. Encrypted Ramblings
Page 4
(C) Copyright 1991 MaeDae Enterprises
WHAT IS THE DATA ENCRYPTION STANDARD (DES)?
===========================================
Most encryption schemes are kept secret. One exception is the
Data Encryption Standard (DES) which was issued by the U.S.
National Bureau of Standards. Even the National Security Agency
(NSA) was intimately involved in the development and acceptance
testing of the algorithm.
Now we know where DES came from, but how does it work? DES
performs its encryption by working on a block of 64 bits of your
data using a 64 bit key (we generate the 64 bit key from yours).
Basically DES is a substitution cipher. We know this sounds very
technical but don't worry, we have hidden all the complexity of
DES behind an extremely easy to use interface. Our context
sensitive help and extensive on-line manual makes protecting your
data a simple task.
Why did we choose to implement DES? We chose DES because it is a
standard. Its ability to protect your data is well documented.
Our goal is to provide you the best possible software tool for
the protection of your data. We use multiple layers of
encryption with DES as the final layer of protection for your
data. Because of this approach, we feel your data is protected
far better than using DES by itself.
WHAT IS Encrypt-It?
===================
Encrypt-It is a powerful encryption/decryption package that
allows you to:
1. Encrypt any file using Data Encryption Standard encryption,
2. Decrypt the file using a confidental key,
3. Perform encryption and decryption on entire groups of files in
a batch mode,
4. Obtain file statistics (frequency/distribution, mode, mean,
median, and more) to determine how well the file is encrypted
(also to look at other encrypted files),
5. And do it all without cryptic commands!
6. Other features:
-- Keyboard macros - 100+ macros each with 1000 keystrokes.
-- DOS Shell - Call up a DOS shell at any prompt.
-- Screen Blanker - Also protects your key by erasing it!
Encrypt-It comes configured to work with most display adapters
and monitors. You can easily customize it to suit your needs.
Page 5
(C) Copyright 1991 MaeDae Enterprises
HARDWARE REQUIREMENTS
=====================
1. IBM PC/XT/AT, IBM PS/2, or fully compatible computer.
2. 512K RAM and DOS 3.0 or later.
3. Any monitor. Encrypt-It has been written to accommodate
monochrome, color, enhanced graphics, and video graphics array
adapters. Some "autoswitch" adapters may need to be in "manual".
4. At least one 5.25" floppy disk drive. Two floppy disk drives
or one floppy and a hard disk (300K free space minimum for the
full system) are strongly recommended.
Page 6
(C) Copyright 1991 MaeDae Enterprises
INSTALLATION - README.DOC
=========================
For all installation information see the README.DOC on the main
distribution diskette. You can view the information on-line or
print it out on your printer. README.DOC is constantly updated to
contain the latest information.
P.S. The Shareware version of Encrypt-It is compelete. However,
it is a 15 day trial version. Also, additional product
information screens are added.
Feel free to share ONLY the Shareware version with friends and
potential users of Encrypt-It for 15 day trial/evaluation purposes
only. You may not use the Shareware version on other machines in
order to avoid purchasing additional copies of the full program.
You may not give away any copies or make more than one copy of
the fully operational program for other than archival purposes.
The full version of Encrypt-It has a unique serial number
embedded in each copy for traceability.
IMPORTANT INSTALLATION NOTES:
1. Diskette #1 contains many files in addition to EID.EXE.
Because Encrypt-It is a large program, the additional files
EID_HM.TXT and EID_HM.INX are required for context sensitive help
and on-line manual. So please make sure that these files are in
your default directory when running the program.
If you have only one floppy drive, you can build a work diskette
containing: EID.EXE, EID_HM.TXT, and EID_HM.INX. Do not copy
EID.CNF, if it exists. A new EID.CNF will be saved when you
select options and retain them.
2. If your Encrypt-It does not run properly:
A. Delete the EID.CNF file and try to run again. Check out
our troubleshooting section near the end of this manual.
B. Your machine may not be totally IBM PC operating system
compatible. This is not always disastrous and a quick call to
our phone support staff may solve your problem.
C. You may have a slightly incompatible "EGA" card with auto
switch features. Usually, turning off autoswitch and forcing the
system into the EGA mode solves the problem.
D. If you have any memory resident programs or system drivers,
try running without them loaded in your computer. On some
computers, ANSI.SYS is suspect.
3. If your monitor appears to be losing certain characters or
features, you may have a "color" system with a composite
monochrome (green, amber, LCD, etc.) monitor. Adjust the
Page 7
(C) Copyright 1991 MaeDae Enterprises
contrast and brightness of the monitor until the screen is
readable. In some cases, you may have to go to the Install Menu
to choose acceptable "colors". See the "Troubleshooting" section.
4. This Manual is designed to give you a general overview and
familiarity with the program. More complete, up-to-date
information is available to you through the context sensitive
help (F1) and the on-line manual. When using the more advanced
features of the program, the help screens will guide you through
the toughest questions with ease. As Encrypt-It continues to add
more features, you can be sure that the on-line manual and
context sensitive help will give you the guidance needed. This
way everybody wins. We don't spend money continually revising
manuals and charging you higher prices, and you get what you want
and deserve: accurate up-to-date information. So fire up the
computer, dig in, and welcome to Encrypt-It!
5. Note to advanced users: To be able to run Encrypt-It from any
point on your hard disk, create a batch file called EID.BAT and
store it in your path.
It should contain --> C:\EID\EID.EXE /C=C:\EID\EID.CNF
This will enable you to run Encrypt-It from anywhere on your hard
disk with full context sensitive help and on-line manual. Be
sure to install the help/manual path within Encrypt-It to be
C:\EID.
Encrypt-It supports optional configuration files through the use
of the /C= command line switch. You saw an example of this in
the above section. Create as many unique configuration files as
you would like using unique names. At startup time you can
specify any of the configuration files through the use of an
optional /C=MyConfig.CNF type command.
Page 8
(C) Copyright 1991 MaeDae Enterprises
GETTING STARTED
===============
After you type EID <<cr>> (Enter or Return), the opening screen
of Encrypt-It will appear. At the bottom of your Encrypt-It
opening screen you are instructed to press any key to continue.
The MAIN MENU will appear on your screen.
The Main Menu options with descriptions are below.
*On-Line Manual: This is an on-line manual covering features of
Encrypt-It in more depth than the documentation available in this
manual.
*Encrypt: Encode or hide the information within a file to make
it unreadable to anyone who doesn't have a special access code
called a key. Just like you can't unlock a lock without a key,
you can't look at an encrypted file without the key. You limit
the number of people who know the key, thereby limiting the
number of people who can access the intelligence within the file
even if they have access to the file. A key is simply a
combination of letters and numbers. They may or may not have any
conventional meaning. For example, the letters xyz12345 could be
a key.
Please note that we provide two methods of encryption and
decryption. The methods are our lighter proprietary method and
the Data Encryption Standard (DES) encryption method. The DES
provides the more powerful method, but is much slower. Choose
the appropriate method for the level of protection you require.
Encrypt-It can't retrieve the key you used to encrypt the file.
If you forget the key for the decryption process you can also
forget your file. This is the nature of data protection. We
have no way of helping you recover any lost data due to a lost
key! So be careful!
*Decrypt: Decryption is the opposite of encryption. You use a
key with the encrypted file to reverse the encryption process
giving you the file you started with.
*Analysis/Statistics: Here you can "look" at any file to see how
the characters are distributed within the file. Statistics are
provided to allow you to get a feel for the "goodness" of the
encryption process.
*Install: The installation portion of Encrypt-It allows you to
customize the colors, directory defaults, and other options.
Quit and exit to DOS: All good things must come to an end.
Choose this option if you want to leave Encrypt-It and return to
DOS.
You may choose any of the displayed options by pressing the first
letter or by moving the light bar (the giant cursor) with your
cursor keys or space bar to the desired option and pressing
Page 9
(C) Copyright 1991 MaeDae Enterprises
Return. Please note that once you have a pulldown active, the
first letter selects options within the pulldown NOT the top
Encrypt-It main menu line.
(If you have a "color" system with a composite monochrome monitor
and don't see a light bar or other features, try adjusting the
brightness or contrast of your monitor. You may also need to
install special colors for your system. See the Install Menu.)
Now let's do something simple to demonstrate how Encrypt-It
works.
Press E (Encrypt)
Then press enter with the "pick from a menu" option highlighted.
You will be asked for the directory mask and path for your files.
Your screen should clear and you will be given a list of files to
encrypt. Press enter with the first file highlighted. Press
enter again on the next menu to accept the default name for the
encrypted file. Don't forget to pick a unique key for encrypting
the file.
You have just encrypted your first file.
*** Warning *** Encrypt-It remembers the last key you used!
You don't have to retype it in if you want to use the same key
for the next operation. This makes it easier for you but it can
lead to a problem if you walk away from your computer with
Encrypt-It still running. Another user could potentially find
out the last key you used by checking the encrypt or decrypt
screens. We recommend that you NEVER encrypt or decrypt a file
and then leave the area with Encrypt-It running.
TUTORIAL (ENCRYPTING/DECRYPTING A FILE)
=======================================
Now let's encrypt a file while using various options. Don't
worry about being fancy or being intimidated; this first use is
only for practice. We can get fancy later.
From the Main Menu, highlight the encrypt section and press
E
(Encrypt) a file.
The encrypt pulldown will appear on the menu with the SelectMenu
option highlighted. Steps are:
1. Press enter. You will now be prompted for where the file is
located which is to be encrypted and the mask for the directory.
You are being asked for the subdirectory name for its storage
location.
Page 10
(C) Copyright 1991 MaeDae Enterprises
2. Press enter to accept the default directory. A directory of
files will appear with the first filename highlighted.
3. Press enter to use this file. You will then see a window
listing multiple options for paths, key, and output file. Since
this is the first file we've encrypted, the key won't contain
anything. The cursor should be on the line prompting you for a
key. So choose an easy to remember key and type it in. Accept
all the defaults by pressing enter. Note: Pressing enter on the
destination filename is the signal that you are done editing the
options.
4. A file will now be written in encrypted form using the
default key and the default filename show. The file to be
encrypted is broken into small blocks which can be easily be read
into your computer's memory then encrypted. You will see the
block number increase as each block is processed. The screen
will display an "Operation Successful" message and return to the
main menu after it finishes.
From the Main Menu, highlight the decrypt section and press
D
(Decrypt) a file.
To decrypt a file you reverse the process for encrypting a file.
You first select the file you just encrypted using the same steps
as for encryption. Use the same key as when you encrypted the
file. The output file name will be extracted from the header of
the encrypted file. It's that simple.
ADDITIONAL FEATURES
===================
MULTIPLE FILE OPERATIONS
Use the tag option to tag multiple files for encryption or
decryption in a batch mode. When you use the directory screen
you have the option of tagging multiple files. If multiple
files are tagged, Encrypt-It will prompt you for some information
and then work with the entire group of files at one time.
AUTO FILENAME GENERATION
Encrypt-It will automatically generate a unique destination name
when you encrypt a file. You have the option to override this
feature for single file operations. We suggest a tilde (~) as
the first character of an encrypted file's extension. We
automatically generate an extension of a ~ followed by two
characters. Your directory is checked for files and we generate
00-99 and AA-ZZ until we find a unique unused filename. Most of
Page 11
(C) Copyright 1991 MaeDae Enterprises
the time the extension will be a .~00 for the first encrypted
file, a .~01 for the second, etc. This technique is what allows
us to encrypt entire groups of files in a batch mode without your
manual inputs. Using this method we can generate about 776
unique filenames by working with the file extension and leaving
the main portion of the filename unchanged.
Page 12
(C) Copyright 1991 MaeDae Enterprises
DOS SHELL
Encrypt-It provides a quick interface to DOS for you. At any
prompt press Ctrl+X (control X). A second copy of the DOS
command processor will be loaded to allow you to use standard DOS
commands. Type EXIT and press enter when you want to return.
Warning: Do NOT load any memory resident programs while in the
DOS shell!
KEYBOARD MACROS
Keyboard macros are supported to allow you to easily emulate you
at the keyboard. They allow you to attach command strings to
over 100 keys. These execute exactly as if you were at the
keyboard typing the commands. We support Shift+F1-F10 directly
as a single keystroke. We also have two keystroke macros where
the first key is Ctrl+O then you press a second key. For the two
keystroke macros first press Ctrl+O then 0-9, Alt0-9, A-Z, AltA-Z,
AltF1-F10, or CtrlF1-F10. When you play back the macros, the
Shift+F1 through Shift+F10 keys execute directly, all others are
two keystroke combinations where you first use Control+O as the
first key. The shifted F10 is the autostart macro and will
execute automatically when you bring up Encrypt-It. To modify the
keyboard macros use the Alt+= key combination (hold down Alt and
tap =) to call up the macro menu. We provide extensive context
sensitive help in the program to make this easy.
The default keyboard macro file's name is EID.MAC. If you would
like to specify a different name use the /M=MyMacro.MAC command
line argument at startup time. Example:
EID /M=C:\EID\MyMacros.MAC (The path is optional)
SCREEN BLANKER
Encrypt-It will automatically blank your screen after a few
minutes of inactivity. This will prevent your screen from having
a pattern burned into its phosphor if you leave Encrypt-It running
for extended periods of time in an unattended mode. A special
feature of the screen blanker is to zero out the stored key. If
you leave your computer unattended long enough for this screen to
come up, the key that you last used has a chance of being
compromised. This automatic key erase feature of Encrypt-It will
help protect your data by automatically erasing your key from
memory.
COLOR CONTROL
For users with color monitors, the color option in the Install
menu gives you total color control of text, background, borders,
highlighted areas, etc. Just press C from the install menu.
Page 13
(C) Copyright 1991 MaeDae Enterprises
TROUBLESHOOTING
===============
Displays - If, after loading Encrypt-It, you see text and no
borders, or nothing at all, you may have a compatibility problem.
Encrypt-It uses high speed screen updates which may cause a problem
with some not-too-close IBM PC operating system compatibles. For
example, the Tandy 2000 and Sanyo 555 series computers are not
compatible with Encrypt-It.
IBM type monochrome (MDA), color (CGA), EGA (enhanced graphic),
and VGA (video graphics array) adapters are known to work with
Encrypt-It. If you are using a compatible color video card with a
green or amber screen, or LCD monitor, you may need to adjust
your brightness and contrast, or Install other "colors" from the
color installation screen. Sometimes executing the DOS "MODE
BW80" command works.
Some "autoswitch" Enhanced Graphic Adapters and "Hercules" type
mono-graphics cards may need to have their auto modes disabled
for proper operation.
If Encrypt-It will not run, you may have insufficient memory, or
too many memory resident programs. Try running Encrypt-It with
no memory resident programs.
If Encrypt-It just stops running or "freezes", you may have
removed the program diskette from the disk drive. The program
disk must be available to access the context sensitive help and
on-line manual. Of course, if EID.EXE and its support files are
on your hard drive, this will probably not be a problem.
Occasionally, certain memory resident, TSR, or "pop-up" programs
conflict with Encrypt-It. In general, there is no problem, but
there are many new programs being written without regard to the
system requirements of Encrypt-It. Remove them from memory, and
try again. If that fails, try getting rid of device drivers in
your CONFIG.SYS file. ANSI.SYS is a prime suspect for some
not-so-compatibles.
MISCELLANEOUS
Encrypt-It works closely with your computer's hardware to gain
much of its speed. However, it never directly addresses the
hardware without using standard DOS calls. If you have any
memory resident software that modifies the way DOS works, then
Encrypt-It Pro may not function properly. We strongly recommend
you remove all memory resident software before running Encrypt-It!
Page 14
(C) Copyright 1991 MaeDae Enterprises
BASIC DEFINITIONS:
==================
The terms used in Encrypt-It may be a little confusing. These
terms are not made up, they are frequently used when discussing
cryptography. We have tried to pick a handful of the most
important terms and define them for you. They are:
Data Encryption Standard (DES) - The Data Encryption Standard was
issued by the U.S. National Bureau of Standards. The National
Security Agency (NSA) was intimately involved in the development
and acceptance testing of the algorithm. DES performs its
encryption by working on a block of 64 bits of your data using a
64 bit key (we generate the 64 bit key from yours). Basically
DES is a substitution cipher.
Cryptography -- The general study of hiding the meaning of
messages and the general techniques used for the hiding.
Cryptanalysis -- The solving or breaking of codes without any
knowledge of the key.
Cipher -- Any technique, method, or scheme (substitution,
transposition, and XOR) used to encrypt and decrypt text,
without regard to its linguist structure.
Plaintext -- The unencrypted or totally decrypted readable text.
Ciphertext -- The unintelligible text, after encrypting it.
Encrypting -- The process of encoding/encrypting a plaintext file
to hide the intelligence.
Decrypting -- Decoding an encrypted/ciphertext file.
Key -- The text that was used to encrypt or decrypt a file.
Sometimes called a code word. Keys can be simple everyday words
or very complex combinations of characters that have no meaning.
Some electronic information services pick your password by
combining two regular words with a character between them.
Examples keys: abc1234, Never:Again, and alsdkfqiaef.
Page 15
(C) Copyright 1991 MaeDae Enterprises
ENCRYPTED RAMBLINGS - SOME GOOD INFORMATION
===========================================
As networks proliferate the need for data security increases.
The world in the past has largely depended on physical security,
that is safes and locks. Computers, much to the bureaucrats
consternation, are rapidly eroding the possibility of physical
security (wherever a modem is connected to a phone line). Laws
will be passed, but in the final result, honesty depends on good
locks and all the ministrations of legislators and bureaucrats
will come have little positive effect on security. Human nature
will win out. The easier it is to get, the more likely it is to
be stolen. Encryption provides part of the answer to the need
for increased security. It will be especially useful in systems
that are open to all users but have some confidential data.
Instead of complex levels of users verification through
passwords, everyone can get the file but only the people with the
key can decode the information. Encryption at its present state
is cumbersome and time consuming but, faster computers and better
programs can ease this problem. This is where Encrypt-It comes
to the rescue.
Encryption if nothing else is a fascinating exercise. Encrypt-It
implements a version of Vernham's machine developed at Bell
labs in the 20's as part of its lite encryption methods. The
original machine used Baudot code on the Teletype and performed
an exclusive or (XOR) on each character of the message and the
key to produce the encrypted character. The message was decoded
by the same machine in the same manner. The method is considered
unbreakable if two conditions are met. First the key is longer
than the message and second the key is only used once, sometimes
called a "one time pad." Typically the files you will be
encrypting are much longer than the key (also much longer than
the one we build from your key) thereby weakening the encryption.
Distribution and maintenance of keys is unworkable in the day to
day operation of any communications operation of any size.
Encrypt-It builds a much more complex key in its lite encryption
from your simple key, in an effort to provide a method to ease
this problem. It creates a one time pad based on your unique
key. Most random keys are not truly random since all random
functions are repeatable and their true randomness is somewhat
suspect. What is the solution? Always the specter of a bigger
and faster computers loom in the future to provide even faster
encryption. Thinkers build on the best thoughts of those
preceding them. More powerful computers and better encryption
techniques will eventually provide a good solution to this
problem.
Encrypt-It provides encryption methods that range from the fairly
secure to the very secure. When you choose DES we use the lite
encryption methods as the first layer followed by the secure DES.
This further complicates the process of breaking the code.
The best encryption in the world won't protect your data if you
Page 16
(C) Copyright 1991 MaeDae Enterprises
give away the key. The secure encrypting of the data is our job.
The choice of a good key and its protection is your job.
How do you select a good key? Several things should be
considered. The key should not have a lot of repeating
characters, if they have any pattern to the eye they should not
be used. The keys should be kept secure.
Encrypt-It supports keys up to 40 characters in length. We
recommend you use as long a key as practical. Phrases or short
sentences should work well as the key and still be easy to
remember.
NOTE: If there is any question of the randomness of the
encrypted file, Encrypt-It could be used on it multiple times
using different keys. The true randomness of the key should not
matter since the use of more than one key should make unraveling
very difficult, if not impossible. This process could be
repeated until the paranoia of the person generating the keys was
satisfied.
Page 17