home *** CD-ROM | disk | FTP | other *** search
-
-
-
- CCCCRRRRYYYYPPPPTTTT((((1111)))) CCCCRRRRYYYYPPPPTTTT((((1111))))
-
-
-
- NNNNAAAAMMMMEEEE
- crypt - encode/decode
-
- SSSSYYYYNNNNOOOOPPPPSSSSIIIISSSS
- ccccrrrryyyypppptttt [ password ]
- ccccrrrryyyypppptttt [[[[----kkkk]]]]
-
- DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNN
- _c_r_y_p_t reads from the standard input and writes on the standard output.
- The _p_a_s_s_w_o_r_d is a key that selects a particular transformation. If no
- argument is given, _c_r_y_p_t demands a key from the terminal and turns off
- printing while the key is being typed in. If the ----kkkk option is used,
- _c_r_y_p_t will use the key assigned to the environment variable CrYpTkEy.
- _c_r_y_p_t encrypts and decrypts with the same key:
-
- crypt key <clear >cypher
- crypt key <cypher | pr
-
- Files encrypted by _c_r_y_p_t are compatible with those treated by the editors
- _e_d(1), _e_d_i_t(1), _e_x(1), and _v_i(1) in encryption mode.
-
- The security of encrypted files depends on three factors: the
- fundamental method must be hard to solve; direct search of the key space
- must be infeasible; ``sneak paths'' by which keys or clear text can
- become visible must be minimized.
-
- _c_r_y_p_t implements a one-rotor machine designed along the lines of the
- German Enigma, but with a 256-element rotor. Methods of attack on such
- machines are known, but not widely; moreover the amount of work required
- is likely to be large.
-
- The transformation of a key into the internal settings of the machine is
- deliberately designed to be expensive, i.e., to take a substantial
- fraction of a second to compute. However, if keys are restricted to
- (say) three lower-case letters, then encrypted files can be read by
- expending only a substantial fraction of five minutes of machine time.
-
- If the key is an argument to the _c_r_y_p_t command, it is potentially visible
- to users executing _p_s(1) or a derivative. The choice of keys and key
- security are the most vulnerable aspect of _c_r_y_p_t.
-
- FFFFIIIILLLLEEEESSSS
- /dev/tty for typed key
-
- SSSSEEEEEEEE AAAALLLLSSSSOOOO
- ed(1), edit(1), ex(1), makekey(1), ps(1), stty(1), vi(1).
-
- WWWWAAAARRRRNNNNIIIINNNNGGGG
- If two or more files encrypted with the same key are concatenated and an
- attempt is made to decrypt the result, only the contents of the first of
- the original files will be decrypted correctly.
-
-
-
-
- PPPPaaaaggggeeee 1111
-
-
-
-
-
-
- CCCCRRRRYYYYPPPPTTTT((((1111)))) CCCCRRRRYYYYPPPPTTTT((((1111))))
-
-
-
- BBBBUUUUGGGGSSSS
- If output is piped to _n_r_o_f_f and the encryption key is _n_o_t given on the
- command line, _c_r_y_p_t can leave terminal modes in a strange state (see
- _s_t_t_y(1)).
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PPPPaaaaggggeeee 2222
-
-
-
-