home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Gigarom 1
/
Gigarom Macintosh Archives (Quantum Leap)(CDRM1080320)(1993).iso
/
FILES
/
APP
/
E-L
/
enigma1.0.cpt
/
enigma.doc.txt
< prev
next >
Wrap
Text File
|
1992-09-26
|
6KB
|
97 lines
Enigma Version 1.0, released 9/26/92
About Enigma
Enigma, named after the famous German encryption system of world war II, implements a partial
version of the NSA developed Data Encryption Standard which is the standard for commercial,
unclassified, data protection. Theoretically DES is secure against any computer that can not do
more than about a thousand billion encryptions a second. Massively parallel computers however
bring DES within the capability of government organizations to break. Short of that kind of
computing power DES is completely secure when used properly. There have been no known
compromises of DES since it was developed in 1977 [IEEE Spectrum Aug '92].
Restrictions
Because this program is distributed over an international network this program can not
implement the full DES standard because US law does not allow export of the complete algorithm.
The program you have downloaded implements a crippled version which is almost as secure, but
does not violate US law. For those interested in the technical details: The key size is only 32 bits
(instead of 64) and part of the f-module has been removed. Despite these changes the protection
provided is still very high against almost all attacks.
A Note About Keys
Enigma has a somewhat unusual keying system that increases the security of files you protect
using it. All characters typed as a key are converted to a 5 bit representation. You should always
use the 26 letters of the alphabet (upper or lower case doesn't matter), the 10 digits 0-9, and the
space bar for your key. Any other characters are ignored. The packing algorithm used ensures
maximum data security even though a restricted character set is used. The benefit is an easy to
remember password that provides maximum security.
You might be a little unsure how restricting the possible characters in a key can actually enhance
security. It is because even in the best cases, people simply can not choose from more than about
75 characters for their key. If no packing were done someone searching for a key would only need
to examine those 75 characters for each 8 bits of the key. By using only five bits per character
there are no "gaps" that can be ignored by someone searching for your key. For maximum security
a key should be at least 13 characters.
How to achieve maximum protection
A few simple precautions need to be taken to assure the absolute secrecy of your data. First of all,
NEVER run enigma with virtual memory on, an image of the clear-text or key could be left on your
hard disk. See the memory control panel for this switch.
Secondly, remember that deleting a file (such as the plain-text version of a just encrypted file)
does not remove the data from the hard disk. Use an application which overwrites deleted files
with null data. Several such programs are available commercially. Alternatively use a disk
sector editor to write zeros over where your data was written (do this carefully). In a future
version I plan to add this capability directly to enigma. Even if you don't follow this step the data
will eventually be overwritten by other data. And only an extremely sophisticated user can
retrieve data after deletion.
Finally, take reasonable care in choosing your keys. They should be more than a few characters
long (13 at least for maximum security). Do not choose obvious things like people, place or pet
names. The more unconnected a key is from you and your life the harder it will be to guess.
How to get the full DES version of this program
A full DES version is available for $10 US. The source code is available for an additional $10. In
either case I can only ship to a US or Canadian address. When requesting the full version you must
include a statement that you agree not to upload the program on any network and that you will not
export the program outside of the United States or Canada. With the full version of enigma I will
include a utility to zero out files so that no trace of an encrypted document remains on your disk.
If you do not or can not pay the shareware fee rest assured, files encrypted with this program are
still quite secure.
Notes:
This program can only encrypt data files (files can not contain resources). I plan to add the
ability to encrypt applications in the future. You will only get the data fork of a file if you decrypt
a file originally containing resources. The program will warn you if you encounter this condition.
This program is compatible with ANY macintosh running any version of the system up to 7.1.1. If
you encounter compatibility problems please let me know. It will run on an original Mac 128K
and it will run on a Quadra (it's a little faster on the Quadra though).
Updates
Congratulations, you have the very first release of enigma in your possession. I have many plans
for more sophisticated versions. If you buy the full DES version you will receive future updates
for a nominal cost.
Standard Disclaimer
I am not responsible for any loss or damage due to the failure of this program to keep your data
secure regardless of the cause.
Enigma is © 1992 by Michael Watson.
You are free to use and distribute this program provided this documentation is enclosed. The
program can not be offered for sale without my permission. Enclosure as part of a user group
shareware collection is allowed so long as the collection is sold only to recover distribution costs.
Payments and questions can be mailed to:
Mike Watson
11955 S.W. Clifford
Beaverton, OR 97005