home *** CD-ROM | disk | FTP | other *** search
-
-
-
-
-
-
-
-
-
- CFC (FastCryp)
-
- INSTRUCTION MANUAL
-
- BY
- ARTHUR MELNICK
-
-
- THIS PROGRAM IS USER-SUPPORTED SOFTWARE.
- IT MAY BE COPIED AND DISTRIBUTED FREELY.
-
- IF YOU FIND THIS PROGRAM USEFUL, A
- DONATION OF $25 IS REQUESTED. SEND
- DONATIONS TO:
-
- ALMTEK
- P.O. BOX 6425
- SAN RAFAEL, CA. 94903
-
- USERS ALSO SENDING THEIR NAME AND
- ADDRESS WILL RECEIVE A COLLECTION OF
- PROGRAMS CALLED THE DATA SECURITY TOOL KIT,
- WHICH IS DESCRIBED AT THE END OF THIS
- MANUAL.
-
- THIS SOFTWARE AND MANUAL ARE PROVIDED
- "AS IS" AND WITHOUT WARRANTIES AS TO
- PERFORMANCE OR MERCHANTABILITY OR ANY
- EXPRESS OR IMPLIED WARRANTIES WHATSOEVER.
- THE USER MUST ASSUME THE ENTIRE RISK OF
- USING THE PROGRAM.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PAGE 1
-
-
-
-
-
-
-
- CFC (FastCryp)
-
- CFC (FastCryp) is a general purpose cryptographic program
- used for encrypting and decrypting any type of file. It is
- designed to run on an IBM Personal Computer and compatibles under
- DOS 2.00 or later. The program operates very quickly, requiring
- only about one second to process each 4k bytes of input. The
- input may be either the unencrypted or the encrypted file, and
- the opposite output is produced.
- The user must enter a key (password) in order to process any
- file. The key used for encryption must be exactly the same as
- the key used for decryption for the process to work properly.
- Keys are at least 4 and no more than 32 ASCII characters long.
- All characters are significant, including punctuation and "white
- space" characters, with the exception that the 26 alphabetic
- characters may be entered in either upper or lower case.
- The program is invoked from the command line by:
-
- CFC [input file] [output file] [key]
-
- If one or more of the arguments are not entered on the
- command line, they will be prompted for when the program runs.
- The command line arguments are separated by one or more spaces.
- If the key itself contains spaces, it may not be entered from the
- command line.
- Standard DOS file specifications are used for the input file
- and output file, including optional path, drive, and extension.
- If the input file and output file specifications are EXACTLY the
- same, the input file will be overwritten. If they are not
- EXACTLY the same but point to the same file, the file may be
- damaged.
- The algorithm (formula) used in CFC (FastCrypt) is designed
- to keep casual intruders from snooping through your files. It is
- not designed to resist attack from someone with the resources of
- a major world power. If a greater level of security is desired,
- the user is referred to other programs in the Data Security Tool
- Kit.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PAGE 2
-
-
-
-
-
-
-
- THE DATA SECURITY TOOL KIT
-
- The Data Security Tool Kit is a collection of programs
- designed to allow the user to send, receive, store and use data
- and program files while denying access to those files to
- unauthorized personnel.
-
- The programs include:
-
- CERA CERA deletes files from a disk or diskette in such
- a way so that they can not be "undeleted".
-
- CDES CDES encrypts and decrypts files using the
- National Bureau of Standards Data Encryption Standard.
- In addition to the usual "electronic code book" mode of
- operation, CDES also supports the more secure "cipher
- block chaining" mode.
-
- CEX CEX expands a binary file into an ASCII file which
- may be sent or received by a communications program
- which only supports 7 bit ASCII files.
-
- CMP CMP compresses ASCII files produced by CEX back to
- their original 8 bit format.
-
- CX CX encrypts and decrypts files using a key file
- which is at least as long as the file to be encrypted
- or decrypted. If an existing program or data file is
- used as a key, CX produces a "running key" or Vigenere
- cipher. If a file of random numbers is used as a key,
- CX produces a "one time pad" cipher, the only code
- which can be mathematically proven to be unbreakable.
-
- CGR CGR, when used in conjunction with an AST
- RESEARCH, INC. "SixPak" multifunction card, produces a
- block of random numbers in memory. It does this by
- using the SixPak card's clock to time the interval
- between user key strokes.
-
- CBR CBR writes or appends the block of random numbers
- produced by CGR to a disk file so that they may be used
- as a key file by CX.
-
- CWR CWR writes a file to a diskette and completely
- bypasses the diskette's directory. Since CWR also
- scrambles the file, it is very difficult for someone to
- determine that the file is even there.
-
- CRD CRD reads files from diskettes written by CWR.
-
- CFC CFC (FastCryp) is a fast cryptographic program
- which encodes and decodes at better than 4K bytes per
- second.
-
-
-
-
-
- PAGE 3
-
-
-
-