home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
No Fragments Archive 10: Diskmags
/
nf_archive_10.iso
/
MAGS
/
ST_USER
/
1990
/
USERJL90.MSA
/
TEXT_ENCRYPT.DOC
< prev
next >
Wrap
Text File
|
1990-05-15
|
3KB
|
55 lines
Top secret file facility
Hide your files from prying eyes with
Paul Overaa's encryption program
HAVE you got some system-commands/utilities on hard disk which you'd like to
protect against unauthorised use? Or text-files that ought to be for your eyes
only? If the answer is yes then here's a short utility which will do the job.
You can even use it for protecting programs against those classes of virus
which add themselves to existing code.
First and foremost I've got to admit (before anyone else points it out)
that this program isn't going to have the CIA's cipher boys quaking in their
boots. With high-speed hardware this particular cipher mechanism is quite
easily broken. Having said that, you're unlikely to find anyone able to crack
it using any ST based techniques.
The encryption technique used is an old favourite - byte-orientated
exclusive-ORing. The benefit of this approach is that the program which
performs the encryption process can also be used to do the deciphering.
Simple fixed key exclusive-ORing is far too easy to break, so to make the
hacker's task more difficult I've used a scheme which takes into account the
position of each character being encrypted. Used in conjunction with long
string keys the result is a simple technique which is surprisingly effective.
The program is command line based and uses this format:
Encrypt <SourceFile> <DestinationFile> <EncryptionKey>
Any string of characters can be used as the encryption key, but don't
include spaces because they are regarded as command-line argument delimiters.
If, for example, the file you wish to encrypt is called TEST1 then this is
thecommand line required:
TEST1 TEST2 ThisIsMyEncryptionKey
This will produce an encrypted version called TEST2. To decipher the TEST2
file just use the same utility again:
TEST2 TEST3 ThisIsMyEncryptionKey
This will create a file called TEST3 which is identical to the original
TEST1. By the way, the safest idea is to use this utility on copies of your
programs rather than on the originals, just in case you forget the encryption
key!
Typical Uses
-------------
Text file encryption is one obvious use for the program. Another, which might
be useful for hard disk owners, is for encrypting potentially damaging system
commands and restricting the use of certain utilities. Keep the encrypted form
on the disk and temporarily decipher a copy when you want to run it.
You have probably heard of virus programs which can attach themselves to
program code. Well, there's no way a virus could attach itself to an encrypted
version of a program and run because the additional code would become
meaningless after it had been deciphered. The encryption technique is therefore
another tool for fighting the virus makers.