home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Technotools
/
Technotools (Chestnut CD-ROM)(1993).ISO
/
lantools
/
leveyu
/
des.doc
< prev
next >
Wrap
Text File
|
1992-02-23
|
6KB
|
144 lines
LEVEY'S DES ENCRYPTION/DECRYPTION UTILITIES
Copyright 1992 - All Rights Reserved
INTRODUCTION
ENCRYPT.EXE & DECRYPT.EXE provide the utmost in file security on your
Netware 386 3.x network. Often users find that files must be protected
from prying eyes and these programs use the DES algorithm to protect
your files.
These programs CAN ONLY be run AFTER they have been installed on your
File Server. Installation is a simple process, however ONLY the Network
Administrator can actually perform the installation. Once installed,
any network user can run the programs.
Please show the documentation to your Network Administrator so he/she
can be aware of the registration procedure which must be followed.
SINCE THESE PROGRAMS USE THE DES ALGORITHM THEY MAY NOT BE EXPORTED,
TRANSFERRED OR OTHERWISE REMOVED FROM THE UNITED STATES OF AMERICA. YOU
ARE SOLELY RESPONSIBLE FOR COMPLIANCE WITH ALL FEDERAL REGULATION
REGARDING THE EXPORT OF PROGRAMS WHICH USE THE DES ALGORITHM.
INSTALLATION
You must copy the following files to a directory of your choice. I
suggest \PUBLIC but that is your decision. Note these programs should
be in a directory which is in your path.
register.exe
remove.exe
encrypt.exe
decrypt.exe
Please use the FLAG command to mark these programs as READ ONLY SHARED
(flag *.exe RO S).
Now the Supervisor must run REGISTER.EXE. This is a ONE-TIME procedure,
but the DES programs WILL NOT run until register has been run.
SUPERVISOR NOTE: REGISTER will create two bindery sets which will be
invisible under normal circumstances. Special information is written
into these bindery sets which will in no way affect the operation of
the network. You may at any time remove this information from the
bindery by running REMOVE.EXE, after which encrypt and decrypt will be
disabled.
RUNNING THE PROGRAMS
Each program REQUIRES three and exactly three command line arguments.
The correct command line formats are as follows:
encrypt <encryption_key> <input_file> <output_file>
decrypt <decryption_key> <input_file> <output_file>
LEVEY'S DES ENCRYPTION/DECRYPTION UTILITIES
Copyright 1992 - All Rights Reserved
If three command line arguments are not supplied the programs will
abort with an error message.
If you type the program name and press ENTER a small menu will be
displayed showing the correct format for the required command line for
each program. DO NOT USE THE SAME NAME FOR INPUT_FILE AND OUTPUT_FILE!
IMPORTANT INFORMATION
These programs are somewhat slower than other DES programs. However,
the level of security obtained is worth the small time difference.
Two encryption/decryption passes are made against each bit of data
processed. During encryption a very large internal key is used for the
first pass, then your key and the internal key is used for the second
pass. This procedure is then reversed during the decryption process.
This dual process method provides the highest level of security
possible. It also makes the encrypted file quite impossible to decrypt
without the proper encryption key.
It has been estimated that it would take a CRAY computer dedicated to
cracking a DES encrypted file more than two years using the brute force
method of decryption to produce a decrypted copy of a DES encrypted
file.
DO NOT FORGET THE ENCRYPTION KEY YOU USE TO ENCRYPT A FILE. THERE IS NO
KNOWN WAY TO DECRYPT A FILE WITHOUT YOUR KEY. THERE ARE NO BACKDOORS
AND THE KEYS ARE NOT STORED IN THE ENCRYPTED FILE. THE AUTHOR CANNOT
HELP YOU DECRYPT A FILE IF YOU FORGET THE ENCRYPTION KEY.
DISCLAIMER
YOU HAVE BEEN TOLD THE PURPOSE OF THESE PROGRAMS IN THE DOCUMENTATION
ABOVE. ANY USE OF THESE PROGRAMS ACKNOWLEDGES THAT YOU AGREE THAT YOU
ARE SOLELY AND COMPLETELY RESPONSIBLE FOR THE PROPER USE OF THESE
PROGRAMS.
USE OF THESE PROGRAMS ALSO ACKNOWLEDGES THAT YOU AGREE THAT THE AUTHOR
CANNOT BE HELD RESPONSIBLE FOR ANY DAMAGE, REAL OR OTHERWISE, FROM YOUR
USE OF THESE PROGRAMS.
SHAREWARE INFORMATION
These programs have been released as Shareware. This is a concept where
you get to evaluate the programs before you make a purchase decision.
The author grants you a non-exclusive thirty (30) evaluation license to
determine if these programs are of any value to you.
At the end of the thirty day evaluation period you must make a
decision. If you decide the programs are of no value, then you must
stop using them.
LEVEY'S DES ENCRYPTION/DECRYPTION UTILITIES
Copyright 1992 - All Rights Reserved
If the programs are of value to you then you must register them with
the author by sending in the registration form at the end of this
document with the appropriate payment for the type of license you
decide to purchase.
Whichever way you decide, the programs have been copyrighted and the
author retains ownership of these programs. All rights are reserved and
the author reserves the right to limit distribution as he sees fit.
REGISTRATION BENEFITS
Should you decide to register these programs you will receive the
following benefits:
1) You will receive the latest versions of these programs.
2) You will also receive copies of these programs which will run on
stand alone PC's, laptops, etc; which ARE NOT connected to a network
File Server.
3) You will receive free updates for one year from date of purchase.
4) You will receive telephone and e-mail technical support.
5) You will receive discounts on other products the author releases.