home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Wayzata's Best of Shareware PC/Windows 1
/
Wayzata's Best of Shareware for PC-Windows - Release 1 - Wayzata Technology (1993).iso
/
mac
/
ZIPPED
/
DOS
/
GAMES
/
CRY_V10.ZIP
/
CRY.DOC
next >
Wrap
Text File
|
1993-01-15
|
43KB
|
1,133 lines
CryptoAnalyzer Version 1.0
Copyright (c) 1993
All Rights Reserved
by
William Ned Miller
7504 Saffron Court
Hanover MD 21076
(410) 766-2365
Section Page
1.0 Introduction ............................................... 1
1.1 Document Layout ......................................... 2
2.0 System Requirements ........................................ 3
2.1 Hardware Requirements ................................... 3
2.2 Video Adapters .......................................... 3
2.3 Operating System Limitations ............................ 3
3.0 Installation ............................................... 4
4.0 Program Options ............................................ 5
4.1 Substitution Helper ..................................... 5
4.2 Substitution ............................................ 7
4.2.1 Encipher ........................................... 8
4.2.2 Encipher with Keyword .............................. 10
4.2.3 Decipher with Keyword .............................. 11
4.3 Railfence ............................................... 12
4.3.1 Encipher ........................................... 13
4.3.2 Decipher ........................................... 15
4.3.3 Decipher Helper .................................... 15
5.0 Licensing .................................................. 16
6.0 Disclaimer ................................................. 17
7.0 Where CryptoAnalyzer Can Be Found .......................... 18
- i -
1.0 Introduction
CryptoAnalyzer, CRY, is a program to aid the user in the solving of
cryptograms. Not only is CRY an aid but it will also allow the user to
easily create their own cryptograms. This version of the program will aid
the user in solving substitution and railfence type cryptograms but future
release of the program will contain additional methods. There are many
features to CryptoAnalyzer the following lists a few:
1) Text entered under one option will be carried over to another.
This way the user will not have to re-enter data when going
from one method to another.
2) Text listed in the lower window, when the F1 key has been
pressed, can be dump to a user defined file.
3) The simple substitution helper will save the user a lot of
erasers and rubbed out paper when this type of cryptogram
is being solved.
The following display will be presented to the user when CRY is
executed.
+-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
| |
| 1. Substitution Helper |
| 2. Substitution |
| 3. Railfence |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
+-------------------------------------------------------------------------+
| F10=Exit|
|----------------$8.50 Shareware Contribution Requested-------------------+
Pressing the "1" key will enter the "Substitution Helper", "2" will
enter "Substitution" and "3" will enter "Railfence" encipher and decipher
options. Pressing the F10 function from this window will exit CryptoAnalyzer
and leave the user at the point where CRY was executed.
CryptoAnalyzer was developed in the programming language Ada.
- 1 -
1.1 Document Layout
The remainder of this document is as follows:
Chapter 2 - System Requirements
Chapter 3 - Installation Procedures
Chapter 4 - Program Options
Chapter 5 - Licensing
Chapter 6 - Disclaimer
Chapter 7 - Where CryptoAnalyzer Can Be Found
- 2 -
2.0 System Requirements
This chapter describes system requirements necessary to execute
CryptoAnalyzer
2.1 Hardware Requirements
CryptoAnalyzer is compatible with the XT, AT, PS2 models and other 100%
compatible systems.
2.2 Video Adapters
CryptoAnalyzer will operate with all type of video adapters. It has
been designed and tested with Monochrome, EGA, CGA and VGA adapters.
2.3 Operating System Limitations
CryptoAnalyzer has been designed to execute on systems with DOS versions
3.00 through 5.00.
- 3 -
3.0 Installation Procedures
The following procedures allow new users to easily install
CryptoAnalyzer on their system. The following procedures make the assumption
that you have a hard disk as drive "c", boot from that drive and will be
using "CRY" as the directory for the program.
1. Make a subdirectory "CRY" under the "C:\" (root) directory.
mkdir cry
2. Copy all CRY files to this new "C:\CRY" directory.
copy *.* c:\cry
3. Type "cry" at the DOS prompt
cd dry
cry
- 4 -
4.0 Program Options
This chapter will explain each of the options available with the
CryptoAnalyzer program.
4.1 Substitution Helper
Choosing this option from the main menu will aid the user in solving
substitution cryptograms. Upon selection the following will be presented to
the user:
+-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
| |
| |
| Enter Cipher Text |
| +---------------------------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
+-------------------------------------------------------------------------+
| F10=Stop Editing|
+-------------------------------------------------------------------------+
At this point, the user enter in the cipher text that is to be
deciphered. Once all of the text has been entered, press the F10 function
key to stop the editing process and enter the substitution helper. The
following will be displayed:
NOTE
Plain or cipher text entered on one screen will be retained and be
accessible on another.
- 5 -
+-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
| |
| Cipher=ABCDEFGHIJKLMNOPQRSTUVWXYZ Cipher Letter _ |
| Enter Plain Text Plain =-------------------------- Plain Letter |
| +---------------------------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
| --- -- --- ---- |
| --- --- ---- |
| --- -- ---- |
| -- --- |
| --- |
| -- ----- -------. |
| |
| |
|A= 2 C= 2 E= 6 G= 1 I= 4 K= M= 3 O= 9 Q= S= 2 U= 1 W= Y= 1|
|B= D= 2 F= 2 H= 3 J= L= 2 N= 3 P= R= 3 T= 7 V= X= Z= 1|
+-------------------------------------------------------------------------+
| F10=Exit|
+-------------------------------------------------------------------------+
This window will be all that is needed to solve a cryptogram that uses
simple substitution. The window contains a number of fields that will aid
the user in solving a cryptogram.
1) The top part of the window contains the mapping from cipher text to
plain text.
2) The bottom of the window will contain a frequency count of each
letter in the cryptogram. This may aid the user in determining the
more frequent letters used in the english language.
3) Just under the cipher text will be where the plain text will be
displayed. At first, the plain text will be displayed as '-'. As
a cipher letter is mapped to a plain letter the mapping will be
displayed.
4) At the top right will be the user's input fields that are used to
enter a cipher letter and a plain text letter. When these two
fields are filled in, a mapping from cipher to plain text will be
performed and the various portions of the window will be updated
to reflect the users input. The following are a few examples that
may be entered:
- 6 -
Cipher Letter: A
Plain Letter: B
In this example the program will map the letter "A" to the letter "B".
In the plain text area the letter "B" will be displayed corresponding to the
letter "A" that is in the cipher text area. The cipher to plain mapping at
the top of the window will be updated to reflect the input.
Cipher Letter: A
Plain Letter: -
In this example the program will erase the mapping of the letter "A" to
the letter "B". This will be reflected in the cipher to plain text mapping
and also in the plain text area.
4.2 Substitution
Choosing this option from the main menu will aid the user in enciphering
and deciphering substitution cryptograms. Upon selection the following will
be presented to the user:
+-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
| |
| |
| 1. Encipher |
| 2. Encipher With Keyword |
| 3. Decipher With Keyword |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
+-------------------------------------------------------------------------+
| F10=Main Menu|
+-------------------------------------------------------------------------+
- 7 -
4.2.1 Encipher
Choosing the "Encipher" option from the main menu will aid the user in
enciphering substitution cryptograms. Upon selection, the following will be
presented to the user:
+-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
| |
| |
| Enter Plain Text |
| +---------------------------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
+-------------------------------------------------------------------------+
| F10=Stop Editing|
+-------------------------------------------------------------------------+
At this point, the user enters in the plain text that is to be
enciphered. Once all of the text has been entered, press the F10 function
key to stop the editing process and enter the enciphering process. The
following will be displayed:
- 8 -
+-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
| |
| Enter Plain Text |
| +---------------------------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
| |
| |
| |
| |
| |
| |
| |
| |
+-------------------------------------------------------------------------+
|F1=Process F2=Cipher F9=File F10=Exit|
+-------------------------------------------------------------------------+
At this point there are two options. The "Cipher" options, by pressing
F2, will allow the user to create a cryptogram by choosing their own
substitution letters. The following will be presented to the user:
+-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
| |
| Enter Plain Text |
| +---------------------------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
| Plain =ABCDEFGHIJKLMNOPQRSTUVWXYZ |
| Cipher =-------------------------- |
| |
| Plain _ |
| Cipher |
| |
| |
| |
+-------------------------------------------------------------------------+
|F1=Process F2=Cipher F10=Exit|
+-------------------------------------------------------------------------+
- 9 -
The user can choose their own substitution letter by letter. First a
plain text letter and then a cipher letter. As the letters are entered, the
mapping will be displayed above the user entry fields. Once all of the
letters have been mapped, choosing the "Process" option, F1, the ciphered
text will be generated and displayed.
After the F1 key has been pressed and the cryptogram created, the F9
function key can be used to dump the text to a file. The user will be given
the chance to choose their own output file or the default 'crypto.txt' can be
used. Once the file name has been chosen pressing the enter will cause the
file to be created in the current directory. Pressing the 'ESC' key will
cancel the file output option.
4.2.2 Encipher with Keyword
Choosing the "Encipher with Keyword" option from the substitution menu
will aid the user in enciphering substitution cryptograms. The user will be
presented with a window in which to enter the plain text. Once the plain
text has been entered and the F10 key pressed, the user is ready to create
the cipher text. The following will be displayed for the user:
+-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
| |
| Shift: _ |
| Enter Plain Text Keyword: |
| +---------------------------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to come to | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
+-------------------------------------------------------------------------+
|F1=Process F2=Shift F3=Keyword F10=Exit|
+-------------------------------------------------------------------------+
- 10 -
Enciphering a substitution with this option requires the user to enter
a keyword and a shift value. If no keyword or shift values are provided then
the ciphered text will be the same as the plain text.
1) Keyword - Pressing the F3 function key will place the cursor on this
field. The key must contain the letters "A-Z". This is
usually a common word.
2) Shift - Pressing the F2 function key will place the cursor on this
field. This is an integer value between 0 and 26. This
indicate how much to shift the keyword and the rest of
the alphabet to create the cipher map. A value of zero
indicates that the alphabet is NOT to be shifted.
The following is a few examples using a keyword and a shift value:
1) Keyword = MILLER
Shift = 0
Plain =ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher=MILERABCDFGHJKNOPQSTUVWXYZ
In this example not much substitution will take place just where the
keyword is enter into the equation. The shift value of '0' did not
cause a shift in the cipher alphabet.
2) Keyword = MILLER
Shift = 25
Plain =ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher=ZMILERABCDFGHJKNOPQSTUVWXY
In this example 25 out of 26 letter letters were substituted. The
letter "e" happens to map back to the letter "e". If the shift had
been another value no letter would map back onto itself. Notice how
the second 'L' in 'MILLER' has been remove from the keyword.
Once the cipher alphabet has been created, pressing the F1 function key
will create the cryptogram from this alphabet. It will be display in the
lower half of the window.
4.2.3 Decipher with Keyword
Choosing the "Decipher with Keyword" option from the substitution menu
will aid the user in deciphering substitution cryptograms. The user will be
presented with a window in which to enter the cipher text. Once the cipher
text has been entered and the F10 key pressed, the user is ready to recreate
the plain text. The procedures to recreate the plain text are the same as
described in the previous section. Remember the user must know the keyword
and shift value in order for the plain text to be reconstructed. If these
values are not known then using the "substitution helper" will aid in the
reconstruction.
- 11 -
4.3 Railfence
Choosing this option from the main menu will aid the user in enciphering
and deciphering railfence cryptograms. Upon selection, the following will be
presented to the user:
+-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
| |
| |
| 1. Encipher |
| 2. Decipher |
| 3. Decipher Helper |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
+-------------------------------------------------------------------------+
| F10=Main Menu|
+-------------------------------------------------------------------------+
- 12 -
4.3.1 Encipher
Choosing the "Encipher" option from the Railfence menu will aid the user
in enciphering railfence cryptograms. Upon selection the following will be
presented to the user:
+-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
| |
| |
| Enter Plain Text |
| +---------------------------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
+-------------------------------------------------------------------------+
| F10=Stop Editing|
+-------------------------------------------------------------------------+
At this point the user enters in the plain text that is to be enciphered.
Once all of the text has been entered, press the F10 function key to stop the
editing process and enter the enciphering process. The following will be
displayed:
- 13 -
+-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
| |
| Enter Plain Text Height = |
| +---------------------------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
| |
| |
| |
| |
| |
| |
+-------------------------------------------------------------------------+
|F1=Process F2=Height F9=File F10=Exit|
+-------------------------------------------------------------------------+
At this point there are two options. The "Height" options, by pressing
F2, will allow the user to choose a height for their rails. After entering
a height, press the F1 function key to produce the cryptogram. The following
will be presented to the user:
+-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
| |
| Enter Plain Text Height = 5 |
| +---------------------------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
| +---------------------------------------------------------------------+ |
| |NTLNO FUOEI ALETT TOTON WHMRG MOEHD HCTIT EOODC MEIER RSFOO AIY | |
| | | |
| | | |
| | | |
| | | |
| | | |
| +---------------------------------------------------------------------+ |
| |
+-------------------------------------------------------------------------+
|F1=Process F2=Height F9=File F10=Exit|
+-------------------------------------------------------------------------+
- 14 -
4.3.2 Decipher
Choosing the "Decipher" option from the main menu will aid the user in
deciphering railfence cryptograms. The processing and parameters are the
same as in enciphering a railfence cryptogram.
4.3.3 Decipher Helper
Choosing the "Decipher Helper" option from the main menu will aid the
user in deciphering railfence cryptograms. Once the text has been entered
and the F1 function key has been pressed, the following will be presented to
the user:
+-----------------CryptoAnalyzer V1.0 by William Ned Miller---------------+
| Up: ^ |
| Enter Plain Text Down: v Height: 5 |
| +---------------------------------------------------------------------+ |
| |Now is the time | |
| |for all good | |
| |men to come | |
| |to the | |
| |aid | |
| |of their country. | |
| +---------------------------------------------------------------------+ |
| |
| +---------------------------------------------------------------------+ |
| |NTLNO FUOEI ALETT TOTON WHMRG MOEHD HCTIT EOODC MEIER RSFOO AIY | |
| | | |
| | | |
| | | |
| | | |
| | | |
| +---------------------------------------------------------------------+ |
| |
+-------------------------------------------------------------------------+
|F1=Process F9=File F10=Exit|
+-------------------------------------------------------------------------+
Using the up and down arrow keys, the user will be able to go through
heights ranging from 3 to 20. The plain text will be displayed in the lower
window.
- 15 -
5.0 Licensing
* A $8.50 shareware contribution is requested for using the
program.
* The author retains the sole right to sell the program.
* The author grants users the right to copy and distribute
the program within the following constraints:
- All program files remain unaltered and are distributed
together.
- No attempt is made to sell the program, or to make
money from it or any modified version of it.
- The program is not bundled with any other hardware or
software transactions without the author's permission.
- Only the original "non-cloned" version of the program
with the startup time delay is distributed.
- Recognized user groups may charge a maximum $7
duplication or distribution fee.
* Continued use of the program (more than 3 weeks) by any
individual, corporation or institution without a single
user or site license is prohibited.
* Single user licenses are obtained by sending in the $8.50
shareware contribution.
* User that send in the requested contribution will receive
instructions on how to remove the shareware request and
insert their own name and registration number.
* Once CryptoAnalyzer has been registered the registration
follows the program for all future releases of the
program.
- 16 -
6.0 Disclaimer
The author disclaims all warranties expressed or implied as to the
quality or performance of this program. The author will not be held liable
for any lost profits, lost savings or any other direct, indirect,
incidental or consequential damages resulting from the use of this program.
Your use of this program constitutes your agreement to this disclaimer and
your release of the author from any form of liability or litigation.
- 17 -
7.0 Where CryptoAnalyzer Can Be Found
The latest version of CryptoAnalyzer and other products developed by
this author can be found on the following BBS:
The Programmer's Corner
Columbia Maryland
301-596-7692 through 7697
301-995-6873 through 6877
301-621-3424 and 3436
- 18 -
CryptoAnalyzer Version 1.0
Copyright (c) 1993
All Rights Reserved
William Ned Miller
7504 Saffron Court
Hanover MD 21076
(410) 766-2365
Registration Form
Registration Provides:
1) Notification of the next release of CryptoAnalyzer.
2) Instructions on how to remove the shareware contribution request
and insert the users name and registration number. Registration
follows all future release of the program.
To register your copy of CryptoAnalyzer please fill in the following
information and send it along with $8.50 (US) to:
William Ned Miller { Please only send }
7504 Saffron Court { checks drawn on }
Hanover MD 21076 { U.S. banks or }
{ postal money }
{ orders. }
Name: ____________________________________________________________
Address: _________________________________________________________
__________________________________________________________________
Phone: (Optional) ( )______-__________________________________
Where Did You Get CryptoAnalyzer _________________________________
__________________________________________________________________
Comments: ________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________