home *** CD-ROM | disk | FTP | other *** search
/ Wayzata's Best of Shareware PC/Windows 1 / Wayzata's Best of Shareware for PC-Windows - Release 1 - Wayzata Technology (1993).iso / mac / ZIPPED / DOS / GAMES / CRY_V10.ZIP / CRY.DOC next >
Text File  |  1993-01-15  |  43KB  |  1,133 lines

  1.  
  2.  
  3.  
  4.  
  5.  
  6.  
  7.  
  8.  
  9.  
  10.                          CryptoAnalyzer Version 1.0
  11.  
  12.                             Copyright (c) 1993
  13.                             All Rights Reserved
  14.  
  15.                                     by
  16.  
  17.                              William Ned Miller
  18.  
  19.                              7504 Saffron Court
  20.                               Hanover MD 21076
  21.                                (410) 766-2365
  22.  
  23.  
  24.  
  25.  
  26.  
  27.  
  28.  
  29.  
  30.  
  31.  
  32.  
  33.  
  34.  
  35.  
  36.  
  37.  
  38.  
  39.  
  40.  
  41.  
  42.  
  43.  
  44.  
  45.  
  46.  
  47.  
  48.  
  49.  
  50.  
  51.  
  52.  
  53.  
  54.  
  55. Section                                                         Page
  56.  
  57. 1.0 Introduction ...............................................  1
  58.    1.1 Document Layout .........................................  2
  59.  
  60. 2.0 System Requirements ........................................  3
  61.    2.1 Hardware Requirements ...................................  3
  62.    2.2 Video Adapters ..........................................  3
  63.    2.3 Operating System Limitations ............................  3
  64.  
  65. 3.0 Installation ...............................................  4
  66.  
  67. 4.0 Program Options ............................................  5
  68.    4.1 Substitution Helper .....................................  5
  69.    4.2 Substitution ............................................  7
  70.       4.2.1 Encipher ...........................................  8
  71.       4.2.2 Encipher with Keyword .............................. 10
  72.       4.2.3 Decipher with Keyword .............................. 11
  73.    4.3 Railfence ............................................... 12
  74.       4.3.1 Encipher ........................................... 13
  75.       4.3.2 Decipher ........................................... 15
  76.       4.3.3 Decipher Helper .................................... 15
  77.  
  78. 5.0 Licensing .................................................. 16
  79.  
  80. 6.0 Disclaimer ................................................. 17
  81.  
  82. 7.0 Where CryptoAnalyzer Can Be Found .......................... 18
  83.  
  84.  
  85.  
  86.  
  87.  
  88.  
  89.  
  90.  
  91.  
  92.  
  93.  
  94.  
  95.  
  96.  
  97.  
  98.  
  99.  
  100.  
  101.  
  102.  
  103.  
  104.  
  105.  
  106.  
  107.  
  108.                                - i -
  109. 1.0 Introduction
  110.  
  111.      CryptoAnalyzer, CRY, is a program to aid the user in the solving of
  112. cryptograms.  Not only is CRY an aid but it will also allow the user to
  113. easily create their own cryptograms.  This version of the program will aid
  114. the user in solving substitution and railfence type cryptograms but future
  115. release of the program will contain additional methods.  There are many
  116. features to CryptoAnalyzer the following lists a few:
  117.  
  118.      1) Text entered under one option will be carried over to another.
  119.         This way the user will not have to re-enter data when going
  120.         from one method to another.
  121.  
  122.      2) Text listed in the lower window, when the F1 key has been
  123.         pressed, can be dump to a user defined file.
  124.  
  125.      3) The simple substitution helper will save the user a lot of
  126.         erasers and rubbed out paper when this type of cryptogram
  127.         is being solved.
  128.  
  129.      The following display will be presented to the user when CRY is
  130. executed.
  131.  
  132. +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
  133. |                                                                         |
  134. | 1. Substitution Helper                                                  |
  135. | 2. Substitution                                                         |
  136. | 3. Railfence                                                            |
  137. |                                                                         |
  138. |                                                                         |
  139. |                                                                         |
  140. |                                                                         |
  141. |                                                                         |
  142. |                                                                         |
  143. |                                                                         |
  144. |                                                                         |
  145. |                                                                         |
  146. |                                                                         |
  147. |                                                                         |
  148. |                                                                         |
  149. |                                                                         |
  150. +-------------------------------------------------------------------------+
  151. |                                                                 F10=Exit|
  152. |----------------$8.50 Shareware Contribution Requested-------------------+
  153.  
  154.      Pressing the "1" key will enter the "Substitution Helper", "2" will
  155. enter "Substitution" and "3" will enter "Railfence" encipher and decipher
  156. options.  Pressing the F10 function from this window will exit CryptoAnalyzer
  157. and leave the user at the point where CRY was executed.
  158.  
  159.      CryptoAnalyzer was developed in the programming language Ada.
  160.  
  161.  
  162.                                - 1 -
  163. 1.1 Document Layout
  164.  
  165.      The remainder of this document is as follows:
  166.  
  167.      Chapter 2 - System Requirements
  168.  
  169.      Chapter 3 - Installation Procedures
  170.  
  171.      Chapter 4 - Program Options
  172.  
  173.      Chapter 5 - Licensing
  174.  
  175.      Chapter 6 - Disclaimer
  176.  
  177.      Chapter 7 - Where CryptoAnalyzer Can Be Found
  178.  
  179.  
  180.  
  181.  
  182.  
  183.  
  184.  
  185.  
  186.  
  187.  
  188.  
  189.  
  190.  
  191.  
  192.  
  193.  
  194.  
  195.  
  196.  
  197.  
  198.  
  199.  
  200.  
  201.  
  202.  
  203.  
  204.  
  205.  
  206.  
  207.  
  208.  
  209.  
  210.  
  211.  
  212.  
  213.  
  214.  
  215.  
  216.                                - 2 -
  217. 2.0 System Requirements
  218.  
  219.      This chapter describes system requirements necessary to execute
  220. CryptoAnalyzer
  221.  
  222.  
  223. 2.1 Hardware Requirements
  224.  
  225.      CryptoAnalyzer is compatible with the XT, AT, PS2 models and other 100%
  226. compatible systems.
  227.  
  228.  
  229. 2.2 Video Adapters
  230.  
  231.      CryptoAnalyzer will operate with all type of video adapters.  It has
  232. been designed and tested with Monochrome, EGA, CGA and VGA adapters.
  233.  
  234.  
  235. 2.3 Operating System Limitations
  236.  
  237.      CryptoAnalyzer has been designed to execute on systems with DOS versions
  238. 3.00 through 5.00.
  239.  
  240.  
  241.  
  242.  
  243.  
  244.  
  245.  
  246.  
  247.  
  248.  
  249.  
  250.  
  251.  
  252.  
  253.  
  254.  
  255.  
  256.  
  257.  
  258.  
  259.  
  260.  
  261.  
  262.  
  263.  
  264.  
  265.  
  266.  
  267.  
  268.  
  269.  
  270.                                - 3 -
  271. 3.0 Installation Procedures
  272.  
  273.      The following procedures allow new users to easily install
  274. CryptoAnalyzer on their system.  The following procedures make the assumption
  275. that you have a hard disk as drive "c", boot from that drive and will be
  276. using "CRY" as the directory for the program.
  277.  
  278.      1. Make a subdirectory "CRY" under the "C:\" (root) directory.
  279.         mkdir cry
  280.  
  281.      2. Copy all CRY files to this new "C:\CRY" directory.
  282.         copy *.* c:\cry
  283.  
  284.      3. Type "cry" at the DOS prompt
  285.         cd dry
  286.         cry
  287.  
  288.  
  289.  
  290.  
  291.  
  292.  
  293.  
  294.  
  295.  
  296.  
  297.  
  298.  
  299.  
  300.  
  301.  
  302.  
  303.  
  304.  
  305.  
  306.  
  307.  
  308.  
  309.  
  310.  
  311.  
  312.  
  313.  
  314.  
  315.  
  316.  
  317.  
  318.  
  319.  
  320.  
  321.  
  322.  
  323.  
  324.                                - 4 -
  325. 4.0 Program Options
  326.  
  327.      This chapter will explain each of the options available with the
  328. CryptoAnalyzer program.
  329.  
  330. 4.1 Substitution Helper
  331.  
  332.      Choosing this option from the main menu will aid the user in solving
  333. substitution cryptograms.  Upon selection the following will be presented to
  334. the user:
  335.  
  336.  
  337. +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
  338. |                                                                         |
  339. |                                                                         |
  340. |  Enter Cipher Text                                                      |
  341. | +---------------------------------------------------------------------+ |
  342. | |Now is the time                                                      | |
  343. | |for all good                                                         | |
  344. | |men to come                                                          | |
  345. | |to the                                                               | |
  346. | |aid                                                                  | |
  347. | |of their country.                                                    | |
  348. | +---------------------------------------------------------------------+ |
  349. |                                                                         |
  350. |                                                                         |
  351. |                                                                         |
  352. |                                                                         |
  353. |                                                                         |
  354. |                                                                         |
  355. |                                                                         |
  356. |                                                                         |
  357. |                                                                         |
  358. |                                                                         |
  359. |                                                                         |
  360. |                                                                         |
  361. +-------------------------------------------------------------------------+
  362. |                                                         F10=Stop Editing|
  363. +-------------------------------------------------------------------------+
  364.  
  365.  
  366.     At this point, the user enter in the cipher text that is to be
  367. deciphered.  Once all of the text has been entered, press the F10 function
  368. key to stop the editing process and enter the substitution helper.  The
  369. following will be displayed:
  370.  
  371.  
  372.                                    NOTE
  373.  
  374.      Plain or cipher text entered on one screen will be retained and be
  375. accessible on another.
  376.  
  377.  
  378.                                - 5 -
  379.  
  380. +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
  381. |                                                                         |
  382. |                      Cipher=ABCDEFGHIJKLMNOPQRSTUVWXYZ Cipher Letter _  |
  383. |  Enter Plain Text    Plain =-------------------------- Plain  Letter    |
  384. | +---------------------------------------------------------------------+ |
  385. | |Now is the time                                                      | |
  386. | |for all good                                                         | |
  387. | |men to come                                                          | |
  388. | |to the                                                               | |
  389. | |aid                                                                  | |
  390. | |of their country.                                                    | |
  391. | +---------------------------------------------------------------------+ |
  392. |                                                                         |
  393. |  --- -- --- ----                                                        |
  394. |  --- --- ----                                                           |
  395. |  --- -- ----                                                            |
  396. |  -- ---                                                                 |
  397. |  ---                                                                    |
  398. |  -- ----- -------.                                                      |
  399. |                                                                         |
  400. |                                                                         |
  401. |A= 2  C= 2  E= 6  G= 1 I= 4  K=    M= 3  O= 9  Q=   S= 2 U= 1  W=    Y= 1|
  402. |B=    D= 2  F= 2  H= 3 J=    L= 2  N= 3  P=    R= 3 T= 7 V=    X=    Z= 1|
  403. +-------------------------------------------------------------------------+
  404. |                                                                 F10=Exit|
  405. +-------------------------------------------------------------------------+
  406.  
  407.      This window will be all that is needed to solve a cryptogram that uses
  408. simple substitution.  The window contains a number of fields that will aid
  409. the user in solving a cryptogram.
  410.  
  411.      1) The top part of the window contains the mapping from cipher text to
  412.         plain text.
  413.  
  414.      2) The bottom of the window will contain a frequency count of each
  415.         letter in the cryptogram.  This may aid the user in determining the
  416.         more frequent letters used in the english language.
  417.  
  418.      3) Just under the cipher text will be where the plain text will be
  419.         displayed.  At first, the plain text will be displayed as '-'.  As
  420.         a cipher letter is mapped to a plain letter the mapping will be
  421.         displayed.
  422.  
  423.      4) At the top right will be the user's input fields that are used to
  424.         enter a cipher letter and a plain text letter.  When these two
  425.         fields are filled in, a mapping from cipher to plain text will be
  426.         performed and the various portions of the window will be updated
  427.         to reflect the users input.  The following are a few examples that
  428.         may be entered:
  429.  
  430.  
  431.  
  432.                                - 6 -
  433.          Cipher Letter: A
  434.          Plain Letter:  B
  435.  
  436.      In this example the program will map the letter "A" to the letter "B".
  437. In the plain text area the letter "B" will be displayed corresponding to the
  438. letter "A" that is in the cipher text area.  The cipher to plain mapping at
  439. the top of the window will be updated to reflect the input.
  440.  
  441.         Cipher Letter: A
  442.         Plain Letter:  -
  443.  
  444.      In this example the program will erase the mapping of the letter "A" to
  445. the letter "B".  This will be reflected in the cipher to plain text mapping
  446. and also in the plain text area.
  447.  
  448.  
  449. 4.2 Substitution
  450.  
  451.      Choosing this option from the main menu will aid the user in enciphering
  452. and deciphering substitution cryptograms.  Upon selection the following will
  453. be presented to the user:
  454.  
  455.  
  456. +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
  457. |                                                                         |
  458. |                                                                         |
  459. | 1. Encipher                                                             |
  460. | 2. Encipher With Keyword                                                |
  461. | 3. Decipher With Keyword                                                |
  462. |                                                                         |
  463. |                                                                         |
  464. |                                                                         |
  465. |                                                                         |
  466. |                                                                         |
  467. |                                                                         |
  468. |                                                                         |
  469. |                                                                         |
  470. |                                                                         |
  471. |                                                                         |
  472. |                                                                         |
  473. |                                                                         |
  474. |                                                                         |
  475. |                                                                         |
  476. |                                                                         |
  477. +-------------------------------------------------------------------------+
  478. |                                                            F10=Main Menu|
  479. +-------------------------------------------------------------------------+
  480.  
  481.  
  482.  
  483.  
  484.  
  485.  
  486.                                - 7 -
  487. 4.2.1 Encipher
  488.  
  489.      Choosing the "Encipher" option from the main menu will aid the user in
  490. enciphering substitution cryptograms.  Upon selection, the following will be
  491. presented to the user:
  492.  
  493.  
  494. +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
  495. |                                                                         |
  496. |                                                                         |
  497. |  Enter Plain Text                                                       |
  498. | +---------------------------------------------------------------------+ |
  499. | |Now is the time                                                      | |
  500. | |for all good                                                         | |
  501. | |men to come                                                          | |
  502. | |to the                                                               | |
  503. | |aid                                                                  | |
  504. | |of their country.                                                    | |
  505. | +---------------------------------------------------------------------+ |
  506. |                                                                         |
  507. |                                                                         |
  508. |                                                                         |
  509. |                                                                         |
  510. |                                                                         |
  511. |                                                                         |
  512. |                                                                         |
  513. |                                                                         |
  514. |                                                                         |
  515. |                                                                         |
  516. |                                                                         |
  517. |                                                                         |
  518. +-------------------------------------------------------------------------+
  519. |                                                         F10=Stop Editing|
  520. +-------------------------------------------------------------------------+
  521.  
  522.  
  523.     At this point, the user enters in the plain text that is to be
  524. enciphered.  Once all of the text has been entered, press the F10 function
  525. key to stop the editing process and enter the enciphering process.  The
  526. following will be displayed:
  527.  
  528.  
  529.  
  530.  
  531.  
  532.  
  533.  
  534.  
  535.  
  536.  
  537.  
  538.  
  539.  
  540.                                - 8 -
  541. +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
  542. |                                                                         |
  543. |  Enter Plain Text                                                       |
  544. | +---------------------------------------------------------------------+ |
  545. | |Now is the time                                                      | |
  546. | |for all good                                                         | |
  547. | |men to come                                                          | |
  548. | |to the                                                               | |
  549. | |aid                                                                  | |
  550. | |of their country.                                                    | |
  551. | +---------------------------------------------------------------------+ |
  552. |                                                                         |
  553. |                                                                         |
  554. |                                                                         |
  555. |                                                                         |
  556. |                                                                         |
  557. |                                                                         |
  558. |                                                                         |
  559. |                                                                         |
  560. |                                                                         |
  561. +-------------------------------------------------------------------------+
  562. |F1=Process F2=Cipher                                     F9=File F10=Exit|
  563. +-------------------------------------------------------------------------+
  564.  
  565.      At this point there are two options.  The "Cipher" options, by pressing
  566. F2, will allow the user to create a cryptogram by choosing their own
  567. substitution letters.  The following will be presented to the user:
  568.  
  569. +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
  570. |                                                                         |
  571. |  Enter Plain Text                                                       |
  572. | +---------------------------------------------------------------------+ |
  573. | |Now is the time                                                      | |
  574. | |for all good                                                         | |
  575. | |men to come                                                          | |
  576. | |to the                                                               | |
  577. | |aid                                                                  | |
  578. | |of their country.                                                    | |
  579. | +---------------------------------------------------------------------+ |
  580. |                                                                         |
  581. |  Plain  =ABCDEFGHIJKLMNOPQRSTUVWXYZ                                     |
  582. |  Cipher =--------------------------                                     |
  583. |                                                                         |
  584. |  Plain  _                                                               |
  585. |  Cipher                                                                 |
  586. |                                                                         |
  587. |                                                                         |
  588. |                                                                         |
  589. +-------------------------------------------------------------------------+
  590. |F1=Process F2=Cipher                                             F10=Exit|
  591. +-------------------------------------------------------------------------+
  592.  
  593.  
  594.                                - 9 -
  595.      The user can choose their own substitution letter by letter.  First a
  596. plain text letter and then a cipher letter.  As the letters are entered, the
  597. mapping will be displayed above the user entry fields.  Once all of the
  598. letters have been mapped, choosing the "Process" option, F1, the ciphered
  599. text will be generated and displayed.
  600.  
  601.      After the F1 key has been pressed and the cryptogram created, the F9
  602. function key can be used to dump the text to a file.  The user will be given
  603. the chance to choose their own output file or the default 'crypto.txt' can be
  604. used.  Once the file name has been chosen pressing the enter will cause the
  605. file to be created in the current directory.  Pressing the 'ESC' key will
  606. cancel the file output option.
  607.  
  608.  
  609. 4.2.2 Encipher with Keyword
  610.  
  611.      Choosing the "Encipher with Keyword" option from the substitution menu
  612. will aid the user in enciphering substitution cryptograms.  The user will be
  613. presented with a window in which to enter the plain text.   Once the plain
  614. text has been entered and the F10 key pressed, the user is ready to create
  615. the cipher text.  The following will be displayed for the user:
  616.  
  617.  
  618. +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
  619. |                                                                         |
  620. |                                                      Shift:   _         |
  621. |  Enter Plain Text                                    Keyword:           |
  622. | +---------------------------------------------------------------------+ |
  623. | |Now is the time                                                      | |
  624. | |for all good                                                         | |
  625. | |men to come                                                          | |
  626. | |to come to                                                           | |
  627. | |aid                                                                  | |
  628. | |of their country.                                                    | |
  629. | +---------------------------------------------------------------------+ |
  630. |                                                                         |
  631. |                                                                         |
  632. |                                                                         |
  633. |                                                                         |
  634. |                                                                         |
  635. |                                                                         |
  636. |                                                                         |
  637. |                                                                         |
  638. |                                                                         |
  639. |                                                                         |
  640. |                                                                         |
  641. |                                                                         |
  642. +-------------------------------------------------------------------------+
  643. |F1=Process F2=Shift F3=Keyword                                   F10=Exit|
  644. +-------------------------------------------------------------------------+
  645.  
  646.  
  647.  
  648.                                - 10 -
  649.      Enciphering a substitution with this option requires the user to enter
  650. a keyword and a shift value.  If no keyword or shift values are provided then
  651. the ciphered text will be the same as the plain text.
  652.  
  653.      1) Keyword - Pressing the F3 function key will place the cursor on this
  654.                   field.  The key must contain the letters "A-Z".  This is
  655.                   usually a common word.
  656.  
  657.      2) Shift   - Pressing the F2 function key will place the cursor on this
  658.                   field.  This is an integer value between 0 and 26.  This
  659.                   indicate how much to shift the keyword and the rest of
  660.                   the alphabet to create the cipher map.  A value of zero
  661.                   indicates that the alphabet is NOT to be shifted.
  662.  
  663.      The following is a few examples using a keyword and a shift value:
  664.  
  665.      1) Keyword = MILLER
  666.         Shift   = 0
  667.  
  668.         Plain =ABCDEFGHIJKLMNOPQRSTUVWXYZ
  669.         Cipher=MILERABCDFGHJKNOPQSTUVWXYZ
  670.  
  671.         In this example not much substitution will take place just where the
  672.         keyword is enter into the equation.  The shift value of '0' did not
  673.         cause a shift in the cipher alphabet.
  674.  
  675.      2) Keyword = MILLER
  676.         Shift   = 25
  677.  
  678.         Plain =ABCDEFGHIJKLMNOPQRSTUVWXYZ
  679.         Cipher=ZMILERABCDFGHJKNOPQSTUVWXY
  680.  
  681.         In this example 25 out of 26 letter letters were substituted.  The
  682.         letter "e" happens to map back to the letter "e".  If the shift had
  683.         been another value no letter would map back onto itself.  Notice how
  684.         the second 'L' in 'MILLER' has been remove from the keyword.
  685.  
  686.      Once the cipher alphabet has been created, pressing the F1 function key
  687. will create the cryptogram from this alphabet.  It will be display in the
  688. lower half of the window.
  689.  
  690. 4.2.3 Decipher with Keyword
  691.  
  692.      Choosing the "Decipher with Keyword" option from the substitution menu
  693. will aid the user in deciphering substitution cryptograms.  The user will be
  694. presented with a window in which to enter the cipher text.   Once the cipher
  695. text has been entered and the F10 key pressed, the user is ready to recreate
  696. the plain text.  The procedures to recreate the plain text are the same as
  697. described in the previous section.  Remember the user must know the keyword
  698. and shift value in order for the plain text to be reconstructed.  If these
  699. values are not known then using the "substitution helper" will aid in the
  700. reconstruction.
  701.  
  702.                                - 11 -
  703. 4.3 Railfence
  704.  
  705.      Choosing this option from the main menu will aid the user in enciphering
  706. and deciphering railfence cryptograms.  Upon selection, the following will be
  707. presented to the user:
  708.  
  709.  
  710. +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
  711. |                                                                         |
  712. |                                                                         |
  713. | 1. Encipher                                                             |
  714. | 2. Decipher                                                             |
  715. | 3. Decipher Helper                                                      |
  716. |                                                                         |
  717. |                                                                         |
  718. |                                                                         |
  719. |                                                                         |
  720. |                                                                         |
  721. |                                                                         |
  722. |                                                                         |
  723. |                                                                         |
  724. |                                                                         |
  725. |                                                                         |
  726. |                                                                         |
  727. |                                                                         |
  728. |                                                                         |
  729. |                                                                         |
  730. |                                                                         |
  731. +-------------------------------------------------------------------------+
  732. |                                                            F10=Main Menu|
  733. +-------------------------------------------------------------------------+
  734.  
  735.  
  736.  
  737.  
  738.  
  739.  
  740.  
  741.  
  742.  
  743.  
  744.  
  745.  
  746.  
  747.  
  748.  
  749.  
  750.  
  751.  
  752.  
  753.  
  754.  
  755.  
  756.                                - 12 -
  757. 4.3.1 Encipher
  758.  
  759.      Choosing the "Encipher" option from the Railfence menu will aid the user
  760. in enciphering railfence cryptograms.  Upon selection the following will be
  761. presented to the user:
  762.  
  763.  
  764. +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
  765. |                                                                         |
  766. |                                                                         |
  767. |  Enter Plain Text                                                       |
  768. | +---------------------------------------------------------------------+ |
  769. | |Now is the time                                                      | |
  770. | |for all good                                                         | |
  771. | |men to come                                                          | |
  772. | |to the                                                               | |
  773. | |aid                                                                  | |
  774. | |of their country.                                                    | |
  775. | +---------------------------------------------------------------------+ |
  776. |                                                                         |
  777. |                                                                         |
  778. |                                                                         |
  779. |                                                                         |
  780. |                                                                         |
  781. |                                                                         |
  782. |                                                                         |
  783. |                                                                         |
  784. |                                                                         |
  785. |                                                                         |
  786. |                                                                         |
  787. |                                                                         |
  788. +-------------------------------------------------------------------------+
  789. |                                                         F10=Stop Editing|
  790. +-------------------------------------------------------------------------+
  791.  
  792.  
  793.     At this point the user enters in the plain text that is to be enciphered.
  794. Once all of the text has been entered, press the F10 function key to stop the
  795. editing process and enter the enciphering process.  The following will be
  796. displayed:
  797.  
  798.  
  799.  
  800.  
  801.  
  802.  
  803.  
  804.  
  805.  
  806.  
  807.  
  808.  
  809.  
  810.                                - 13 -
  811. +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
  812. |                                                                         |
  813. |  Enter Plain Text                                        Height =       |
  814. | +---------------------------------------------------------------------+ |
  815. | |Now is the time                                                      | |
  816. | |for all good                                                         | |
  817. | |men to come                                                          | |
  818. | |to the                                                               | |
  819. | |aid                                                                  | |
  820. | |of their country.                                                    | |
  821. | +---------------------------------------------------------------------+ |
  822. |                                                                         |
  823. |                                                                         |
  824. |                                                                         |
  825. |                                                                         |
  826. |                                                                         |
  827. |                                                                         |
  828. |                                                                         |
  829. +-------------------------------------------------------------------------+
  830. |F1=Process F2=Height                                     F9=File F10=Exit|
  831. +-------------------------------------------------------------------------+
  832.  
  833.      At this point there are two options.  The "Height" options, by pressing
  834. F2, will allow the user to choose a height for their rails.  After entering
  835. a height, press the F1 function key to produce the cryptogram.  The following
  836. will be presented to the user:
  837.  
  838. +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
  839. |                                                                         |
  840. |  Enter Plain Text                                        Height = 5     |
  841. | +---------------------------------------------------------------------+ |
  842. | |Now is the time                                                      | |
  843. | |for all good                                                         | |
  844. | |men to come                                                          | |
  845. | |to the                                                               | |
  846. | |aid                                                                  | |
  847. | |of their country.                                                    | |
  848. | +---------------------------------------------------------------------+ |
  849. |                                                                         |
  850. | +---------------------------------------------------------------------+ |
  851. | |NTLNO FUOEI ALETT TOTON WHMRG MOEHD HCTIT EOODC MEIER RSFOO AIY      | |
  852. | |                                                                     | |
  853. | |                                                                     | |
  854. | |                                                                     | |
  855. | |                                                                     | |
  856. | |                                                                     | |
  857. | +---------------------------------------------------------------------+ |
  858. |                                                                         |
  859. +-------------------------------------------------------------------------+
  860. |F1=Process F2=Height                                     F9=File F10=Exit|
  861. +-------------------------------------------------------------------------+
  862.  
  863.  
  864.                                - 14 -
  865. 4.3.2 Decipher
  866.  
  867.      Choosing the "Decipher" option from the main menu will aid the user in
  868. deciphering railfence cryptograms.  The processing and parameters are the
  869. same as in enciphering a railfence cryptogram.
  870.  
  871.  
  872. 4.3.3 Decipher Helper
  873.  
  874.      Choosing the "Decipher Helper" option from the main menu will aid the
  875. user in deciphering railfence cryptograms.  Once the text has been entered
  876. and the F1 function key has been pressed, the following will be presented to
  877. the user:
  878.  
  879.  
  880. +-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
  881. |                                            Up:   ^                      |
  882. |  Enter Plain Text                          Down: v         Height:  5   |
  883. | +---------------------------------------------------------------------+ |
  884. | |Now is the time                                                      | |
  885. | |for all good                                                         | |
  886. | |men to come                                                          | |
  887. | |to the                                                               | |
  888. | |aid                                                                  | |
  889. | |of their country.                                                    | |
  890. | +---------------------------------------------------------------------+ |
  891. |                                                                         |
  892. | +---------------------------------------------------------------------+ |
  893. | |NTLNO FUOEI ALETT TOTON WHMRG MOEHD HCTIT EOODC MEIER RSFOO AIY      | |
  894. | |                                                                     | |
  895. | |                                                                     | |
  896. | |                                                                     | |
  897. | |                                                                     | |
  898. | |                                                                     | |
  899. | +---------------------------------------------------------------------+ |
  900. |                                                                         |
  901. +-------------------------------------------------------------------------+
  902. |F1=Process                                               F9=File F10=Exit|
  903. +-------------------------------------------------------------------------+
  904.  
  905.      Using the up and down arrow keys, the user will be able to go through
  906. heights ranging from 3 to 20.  The plain text will be displayed in the lower
  907. window.
  908.  
  909.  
  910.  
  911.  
  912.  
  913.  
  914.  
  915.  
  916.  
  917.  
  918.                                - 15 -
  919. 5.0 Licensing
  920.  
  921.      *  A $8.50 shareware contribution is requested for using the
  922.         program.
  923.      *  The author retains the sole right to sell the program.
  924.      *  The author grants users the right to copy and distribute
  925.         the program within the following constraints:
  926.         - All program files remain unaltered and are distributed
  927.           together.
  928.         - No attempt is made to sell the program, or to make
  929.           money from it or any modified version of it.
  930.         - The program is not bundled with any other hardware or
  931.           software transactions without the author's permission.
  932.         - Only the original "non-cloned" version of the program
  933.           with the startup time delay is distributed.
  934.         - Recognized user groups may charge a maximum $7
  935.           duplication or distribution fee.
  936.      *  Continued use of the program (more than 3 weeks) by any
  937.         individual, corporation or institution without a single
  938.         user or site license is prohibited.
  939.      *  Single user licenses are obtained by sending in the $8.50
  940.         shareware contribution.
  941.      *  User that send in the requested contribution will receive
  942.         instructions on how to remove the shareware request and
  943.         insert their own name and registration number.
  944.      *  Once CryptoAnalyzer has been registered the registration
  945.         follows the program for all future releases of the
  946.         program.
  947.  
  948.  
  949.  
  950.  
  951.  
  952.  
  953.  
  954.  
  955.  
  956.  
  957.  
  958.  
  959.  
  960.  
  961.  
  962.  
  963.  
  964.  
  965.  
  966.  
  967.  
  968.  
  969.  
  970.  
  971.  
  972.                                - 16 -
  973. 6.0 Disclaimer
  974.  
  975.      The author disclaims all warranties expressed or implied as to the
  976. quality or performance of this program.  The author will not be held liable
  977. for any lost profits, lost savings or any other direct, indirect,
  978. incidental or consequential damages resulting from the use of this program.
  979. Your use of this program constitutes your agreement to this disclaimer and
  980. your release of the author from any form of liability or litigation.
  981.  
  982.  
  983.  
  984.  
  985.  
  986.  
  987.  
  988.  
  989.  
  990.  
  991.  
  992.  
  993.  
  994.  
  995.  
  996.  
  997.  
  998.  
  999.  
  1000.  
  1001.  
  1002.  
  1003.  
  1004.  
  1005.  
  1006.  
  1007.  
  1008.  
  1009.  
  1010.  
  1011.  
  1012.  
  1013.  
  1014.  
  1015.  
  1016.  
  1017.  
  1018.  
  1019.  
  1020.  
  1021.  
  1022.  
  1023.  
  1024.  
  1025.  
  1026.                                - 17 -
  1027. 7.0 Where CryptoAnalyzer Can Be Found
  1028.  
  1029.      The latest version of CryptoAnalyzer and other products developed by
  1030. this author can be found on the following BBS:
  1031.  
  1032.                        The Programmer's Corner
  1033.                           Columbia Maryland
  1034.  
  1035.                       301-596-7692 through 7697
  1036.                       301-995-6873 through 6877
  1037.                       301-621-3424   and   3436
  1038.  
  1039.  
  1040.  
  1041.  
  1042.  
  1043.  
  1044.  
  1045.  
  1046.  
  1047.  
  1048.  
  1049.  
  1050.  
  1051.  
  1052.  
  1053.  
  1054.  
  1055.  
  1056.  
  1057.  
  1058.  
  1059.  
  1060.  
  1061.  
  1062.  
  1063.  
  1064.  
  1065.  
  1066.  
  1067.  
  1068.  
  1069.  
  1070.  
  1071.  
  1072.  
  1073.  
  1074.  
  1075.  
  1076.  
  1077.  
  1078.  
  1079.  
  1080.                                - 18 -
  1081.                           CryptoAnalyzer Version 1.0
  1082.                               Copyright (c) 1993
  1083.                               All Rights Reserved
  1084.  
  1085.                               William Ned Miller
  1086.                               7504 Saffron Court
  1087.                                Hanover MD 21076
  1088.                                 (410) 766-2365
  1089.  
  1090.  
  1091.   Registration Form
  1092.  
  1093.   Registration Provides:
  1094.  
  1095.   1) Notification of the next release of CryptoAnalyzer.
  1096.   2) Instructions on how to remove the shareware contribution request
  1097.      and insert the users name and registration number.  Registration
  1098.      follows all future release of the program.
  1099.  
  1100.   To register your copy of CryptoAnalyzer please fill in the following
  1101.   information and send it along with $8.50 (US) to:
  1102.  
  1103.   William Ned Miller                     { Please only send }
  1104.   7504 Saffron Court                     { checks drawn on  }
  1105.   Hanover MD 21076                       { U.S. banks or    }
  1106.                                          { postal money     }
  1107.                                          { orders.          }
  1108.  
  1109.   Name: ____________________________________________________________
  1110.  
  1111.  
  1112.   Address: _________________________________________________________
  1113.  
  1114.   __________________________________________________________________
  1115.  
  1116.  
  1117.   Phone: (Optional) (     )______-__________________________________
  1118.  
  1119.  
  1120.   Where Did You Get CryptoAnalyzer _________________________________
  1121.  
  1122.   __________________________________________________________________
  1123.  
  1124.   Comments: ________________________________________________________
  1125.  
  1126.   __________________________________________________________________
  1127.  
  1128.   __________________________________________________________________
  1129.  
  1130.   __________________________________________________________________
  1131.  
  1132.   __________________________________________________________________
  1133.