+-----------------------------------------------------------+ Crypto--The Quick File Encrypter | | Version 3.4a | | |-----------------------------------------------------------| Written by | | Jim Leonard | | |-----------------------------------------------------------| Copyright July 12, 1990, All Rights Reserved | | +-----------------------------------------------------------+ This is not free software and may not be sold without ___________________________ the author's express written permission. If you have paid a ShareWare vendor for this program, none of the money you _______________________ paid gets back to the author. _____________________________ If you use this program, YOU MUST REGISTER. Jim ____________________ Leonard will not answer questions, technical or otherwise, from unregistered users. To register, send $20.00 (non-commercial single-user registration fee) or $250.00 (commercial and multi-system site fee) with your name, company name (if applicable), phone number, and address to: +-----------------------------------------------------------+ Jim Leonard Jim Leonard | | 1065 Spruce Street 1065 Spruce Street | | Winnetka, Illinois Winnetka, Illinois | | 60093 60093 | | +-----------------------------------------------------------+ Upon receipt of your registration, you will be sent the most current version of CRYPTO and its accompanying documentation (Please specify disk type). Please read the more detailed registration information at Please read the more detailed registration information at the end of this manual. the end of this manual. +-----------------------------------------------------------+ Table of Contents | | +-----------------------------------------------------------+ Address....................................................1 Quick Start................................................3 Command-line Syntax....................................3 Method of Operation........................................4 Questions and Answers..................................4 Encryption.............................................4 Memory.................................................5 Size...................................................5 Speed..................................................5 Several Files (Selection)..............................6 Things to Remember.........................................7 Mistakes...............................................7 *.COM & *.EXE files....................................7 Techniques.................................................8 Batch File.............................................8 Registration...............................................9 Single user............................................9 Commercial and Multi-system users......................9 BBS SysOps.............................................9 Warranty..................................................10 Warning and Revision Numbers..............................11 Credits...................................................12 Background............................................12 Pascal................................................12 Microsoft Word........................................12 Registration Form.........................................13 Crypto Documentation Printed on July 12, 1990 at 5:52 PM Page 2 +-----------------------------------------------------------+ Quick Start | | +-----------------------------------------------------------+ Crypto is a file encrypter/decrypter. It works on any file of any size. The syntax for Crypto is: CRYPTO [path]filename[.ext] Password where: [path]filename[.ext] is the filename with optional path and extension. Examples: mybook b:tacos.dat c:\word\jim\stuff\secret.txt Password is the password or password-sentence that you wish to use as the key to the file. Crypto uses a toggle method: Run it once with the above parameters to encrypt; run it with the same above parameters to decrypt. If you forget to enter any command-line parameters, Crypto will prompt you for the path, filename/wildcard, and the password you wish to use. Wildcards are accepted in the filename selection. To encrypt all the files under a wildcard or in a di- rectory, press Alt-A while in the filename selection screen. rectory, press Alt-A while in the filename selection screen. Crypto Documentation Printed on July 12, 1990 at 5:52 PM Page 3 +-----------------------------------------------------------+ Method of Operation--Questions and Answers | | +-----------------------------------------------------------+ Quickly, What exactly does Crypto do? Crypto is a file encrypter. It encrypts and decrypts any kind of file, any size--without changing the size of the file. It's also fast. What's Encryption? Encryption is a process that takes any kind of data-- numbers, letters, or words--and scrambles the data so no one can read it. Decryption is the same process, but the other way around: it de-garbles the data, so it is again readable. An example of this is the way spies send messages to each other; the messages are unread- able without a decoder. So Crypto turns files into a secret code? Yes. It reads any file you specify and encrypts it, so that no one can run your program, read your secret files, or whatever. But can't someone figure out what I've done and run Crypto to change it back? No; when you run Crypto, it won't even start encoding or decoding your file unless you enter a password or password-sentence for that particular file. That "key" is the vital element in its coding process. Every key works differently with every file. Can anyone guess the key from looking at the file? No. Crypto wouldn't be effective if that was the case. What if I forget my key? DON'T FORGET YOUR KEYWORD! Without the key, the file DON'T FORGET YOUR KEYWORD! Without the key, the file ___________________________ can never be decrypted correctly. The coding process is so good that no one can decode a file perfectly without the EXACT password. Crypto Documentation Printed on July 12, 1990 at 5:52 PM Page 4 How do I tell Crypto to encode or decode? You don't. The translation process is the same both ways: The encryption process with a key password comes first, then the decryption process is next with the same key password. So if you try to load a file into a word processor and you get an error, or you run a pro- gram and it doesn't do anything, chances are that those files/programs are encrypted and need to be put through Crypto again (with the same password that was used to encrypt them in the first place). Another example is to think of Crypto like a toggle switch: you switch it one way to turn it on, the other way to turn it off; but the process of moving your finger to hit the switch is the same. How much memory do I need? At least 128k available to DOS. What kind of computer do I need? An IBM or compatible. Crypto works with most every- thing, and works well with memory-resident programs. However, Crypto has not been tested with networks (although there is no reason it shouldn't work). Do I need a color/graphics card to see the program run? Crypto has also been written for use on a monochrome or Hercules(Tm) board, but has only been tested on a CPT white/monochrome page-length monitor (not a great test subject), so read your display with caution. Color displays, however, look beautiful. What is the size limit on the file I can encrypt? If you have the memory specified above, then there is no size limit. So if you have the disk space to hold a 32 megabyte file, then Crypto can still handle it. (Crypto has also not been tested to work with DOS 4.0, but provisions have been made to handle single file sizes larger than the earlier 32 MB limit.) How fast is Crypto? Quite swift. During operation, Crypto will pop up a window with what file is being processed, the total file size, and how much is being worked on during its operation. To show you how speedy Crypto is, it will display the time it took when it's finished. In seconds, that is. Crypto Documentation Printed on July 12, 1990 at 5:52 PM Page 5 How do I encrypt several files at once? If you run Crypto from the "menu" mode, you can press Alt-A to select all the files shown on the selection screen to be used during the encoding process. Otherwise, just enter the wildcard at the prompt or DOS prompt; for example, entering C\WORD\>Crypto *.bak Password would process all the files in the WORD directory that end with the BAK extension using the password "Password". Also, if you type \test\*.dbf when the program asks you for a path and filename, hit the key combination "Alt-A" (as noted in the Quick- Start section of the manual) and SallyJesseRaphael when it asks you for the password, Crypto will process it as CRYPTO \test\*.dbf SallyJesseRaphael and would work on all the *.DBF files in the TEST directory using the password "SallyJesseRaphael". Crypto Documentation Printed on July 12, 1990 at 5:52 PM Page 6 +-----------------------------------------------------------+ Things to Remember | | +-----------------------------------------------------------+ 1. NEVER FORGET THE PASSWORD YOU USED TO ENCRYPT THE FILE. 1. NEVER FORGET THE PASSWORD YOU USED TO ENCRYPT THE FILE. If you try to decrypt a file with the wrong password by mistake, don't worry--just "encrypt" it with the mistyped password, and then "decrypt" it with the real one again. For example: Crypto Myfile Jimbo (Encrypted) Crypto Myfile Jimbop (Typing error; Mistakenly encrypted again) Crypto Myfile Jimbop (Decrypted mistake) Crypto Myfile Jimbo (Correctly decrypted file) If you feel threatened that someone is going to try to decrypt your file with a wrong password (that you obvi- ously don't know), then by all means keep a backup of the file you are working with in a very hidden, secret place; preferably, a floppy disk locked in a safe. 2. If you run Crypto on a non-standard monitor, and can't quite see anything, chances are it's working perfectly. Display type has nothing to do with Crypto's method of operation, and it will work just fine. If you wish to see the result of the program's operation, check the exit code at the end of its operation (See "batch file techniques" below). 3. If you encode a *.COM or *.EXE file, please don't run that program intentionally until you decode it. There's a very good chance it will freeze your com- puter. Crypto Documentation Printed on July 12, 1990 at 5:52 PM Page 7 +-----------------------------------------------------------+ Techniques | | +-----------------------------------------------------------+ "The success of encryption relies more on the disciplined use of passwords than on the complexity of the algorithm." --Lewis Perdue --It's understandable that you will want a password you'll remember; but too many people choose passwords that are easy to guess. Remember these important points about choosing a password: Try to avoid: Names, common phrases, slang, inside jokes, birthdays, anniversaries, license numbers, or vital statistics --People tend to use passwords that are too short--six char- acters should be the minimum. --Passwords should be changed frequently. --To avoid forgetting which password you used on which file, try picking one password and using it on all your files. --Try using Crypto in a batch file, like when you want to work on a book that you don't want anyone peeking at. You'd first decrypt the file, work with it, and then encrypt it again. A similar batch file might look like: +-----------------------------------------------------------+ echo off | | cls | | echo Decrypting data... | | CRYPTO C:\jim\document\myfile.txt This is my password | | echo Done. Loading word processor... | | Word c:\jim\document\myfile.txt | | echo Encrypting data... | | CRYPTO C:\jim\document\myfile.txt This is my password | | echo Done! Have a nice DOS! | | echo on | | +-----------------------------------------------------------+ --Experienced batch file users: Crypto exits with the stan- dard DOS exit code (ERRORLEVEL) for a program. If you want to check for Crypto's exit code, here's what the codes mean: 2 = Work file not found or doesn't exist 1 = Required parameters on the command line not found 0 = Normal termination Crypto Documentation Printed on July 12, 1990 at 5:52 PM Page 8 +-----------------------------------------------------------+ Registration | | +-----------------------------------------------------------+ No version of Crypto, including version 3.4a, is public do- main or free software. Crypto is a work copyright (C) 1989 by Jim Leonard. Non-registered users are granted a limited license to use Crypto on a trial basis for the purpose of determining whether Crypto is suitable for their needs (described below). Any other use of Crypto requires regis- tration. Use of non-registered copies of Crypto by any per- tration. Use of non-registered copies of Crypto by any per- son, business, corporation, governmental agency or other in- son, business, corporation, governmental agency or other in- stitution beyond their trial period is morally incorrect, stitution beyond their trial period is morally incorrect, unethical, and strictly forbidden. Besides, It's the Law. unethical, and strictly forbidden. Besides, It's the Law. --Non-commercial Single-User Registration ($20.00) permits a user a license to use Crypto on a single computer. A single registered user may use the program on a different computer, but may not use the program on more than one computer at the same time. --Commercial and Multi-system Site Registration ($250.00) permits one hundred (100) people within a company to use and make copies of Crypto, provided the organization has paid the multi-system fee and the person(s) can prove their affiliation with the organization. --No user may modify Crypto in any way, including but not limited to: reverse compilation, disassembling or other- wise reverse-engineering the program. --All users are granted a limited license to copy Crypto for the trial use of others subject to the above limitations and the following conditions: A. Crypto must be copied in unmodified form, and the full manual must be included with the program. B. No fee, charge, or other compensation may be col- lected for distribution by any licensee. C. Crypto may not be distributed in conjunction with any other product without prior written permis- sion. --Operators of electronic bulletin board systems (SysOps) are encouraged to post Crypto for downloading by their users as long as the above conditions are met. --Distributors of user- supported software are also encour- aged to distribute copies of Crypto only if they agree to the above conditions and if the fee for expenses and han- dling does not exceed $20. Crypto Documentation Printed on July 12, 1990 at 5:52 PM Page 9 +-----------------------------------------------------------+ Warranty | | +-----------------------------------------------------------+ Jim Leonard makes no warranty of any kind, express or im- plied, including, without limitation, any warranties of mer- chantability and/or fitness for a particular purpose. Jim Leonard shall not be liable for any damages or financial losses, whether direct, indirect, special or consequential arising from a failure of this program to operate in the manner desired by the user. Jim Leonard shall not be liable for any damage to data or property which may be caused di- rectly or indirectly by use of the program. IN NO EVENT WILL JIM LEONARD BE LIABLE TO YOU FOR ANY DAM- IN NO EVENT WILL JIM LEONARD BE LIABLE TO YOU FOR ANY DAM- AGES, INCLUDING ANY LOST PROFITS, LOST SAVINGS, LOST DATA OR AGES, INCLUDING ANY LOST PROFITS, LOST SAVINGS, LOST DATA OR OTHER INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF OTHER INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF YOUR USE OR INABILITY TO USE THE PROGRAM, OR FOR ANY CLAIM YOUR USE OR INABILITY TO USE THE PROGRAM, OR FOR ANY CLAIM BY ANY OTHER PARTY. BY ANY OTHER PARTY. Crypto Documentation Printed on July 12, 1990 at 5:52 PM Page 10 +-----------------------------------------------------------+ Warning and Revision Numbers | | IF YOU HAVE TWO VERSIONS OF CRYPTO, USE THE LATEST ONE. _______________________________________________________ | | +-----------------------------------------------------------+ The methods for encryption are different in all versions of Crypto, so use the latest one and delete the older one (AFTER you convert all your files back! Different versions of Crypto do NOT work with each other). +-----------------------------------------------------------+ Whoops! Whoops! | | |-----------------------------------------------------------| As of this printing, Crypto version 3.02 has a compatibil- | | ity bug with some non-IBM machines that sometimes scram- | | bled large files over 61,000 bytes. If you have this ver- | | sion, please discontinue its use--but decrypt all your ______ | | files first (different versions aren't compatible). If files first (different versions aren't compatible). If | | you register, you can receive the latest version; a | | registration form is provided below. | | +-----------------------------------------------------------+ Revision Numbers: 1.0 Initial release. 2.0 Faster algorithm for encryption. 2.1 Added pop-up windows and documentation. 3.0 More secure and faster algorithm for encryption. 3.01 Fixed bug in windows and improved documentation. 3.02 Cut memory requirements down by half, turned off cursor, and improved documentation. 3.1 Fixed screen bug, included a way to see which ver- sion of Crypto was used in some files, and in- creased maximum file size that can be worked on to 2 Gigabytes (but I have yet to see that imple- mented). 3.1a Made screen look prettier and removed the ability to stop the program by hitting Ctrl-Break (it ru- ined the file). 3.3 Added filename and password prompts if no command- line parameters are given. Skipped a revision number to avoid confusion with old Crypto (people might have confused 3.02 with 3.2). 3.4 Added option to encrypt all the files under a wildcard or in a directory. 3.4a Improved filename selection from menu and improved documentation. 3.4b Fixed Bug in wildcard processing. Crypto Documentation Printed on July 12, 1990 at 5:52 PM Page 11 +-----------------------------------------------------------+ Credits | | +-----------------------------------------------------------+ Jim Leonard was a high school student, classical radio DJ with WNTH, first tenor with the New Trier Concert Choir, a computer consultant with Direct Solutions, and an advisor to Vertical Software. He wrote and developed Crypto as a security measure for a client. Jim is pursueing his consulting business for a while and preparing for his edu- cation at Monmouth College. He is majoring in Computer Science and Marketing/Advertising. Crypto was originally written in Turbo Pascal 4.0, switched to Turbo Pascal 5.0, switched again to Quick Pascal 1.0, and as of this printing, was compiled with Turbo Pascal 5.5. Crypto was written on an At&t PC 6300 (8086 running at 7.16 Mhz) with two 360k floppy disk drives. Yes, even the little guys have to start somewhere. This manual was originally written on Microsoft Word 4.0, but this version marks the change to Microsoft Word 5.0. Crypto Documentation Printed on July 12, 1990 at 5:52 PM Page 12 +-----------------------------------------------------------+ REGISTRATION FORM | | +-----------------------------------------------------------+ Please mail with your check or money order for the reg- istration fee ($20.00 for Non-commercial Single-User Regis- tration Fee, $250.00 Commercial and Multi-system Site Regis- tration Fee). Upon registration, you will be sent the latest version of Crypto and its on-disk documentation. This way you can be confident that you have received the latest version bug and virus-free. TECHNICAL SUPPORT IS ONLY AVAILABLE FOR REGISTERED USERS. TECHNICAL SUPPORT IS ONLY AVAILABLE FOR REGISTERED USERS. Name:_______________________________________________________ Company:____________________________________________________ Address:____________________________________________________ City:_______________________________________________________ State:_____________________________ Zip:________________ Phone (optional): (________) ____________________ Fill these remaining options out as best you can. Computer type/name__________________________________________ No. of 5.25 inch drives_______No. of 3.5 inch drives________ No. Hard/Fixed Disk Drives_________Total Capacity (MB)______ Operating System/version___________Total RAM installed______ Monitor/video board type____________________________________ Crypto Documentation Printed on July 12, 1990 at 5:52 PM Page 13 Take as many lines as necessary to express your opinion: What do you like about Crypto version 3.4a? What don't you like about Crypto? How could Crypto be improved? From what source did you acquire your copy of Crypto? MAIL TO: +-----------------------------------------------------------+ Jim Leonard | | 1065 Spruce St. | | Winnetka, Illinois | | 60093 | | U.S.A. | | +-----------------------------------------------------------+ Thank you for registering! Crypto Documentation Printed on July 12, 1990 at 5:52 PM Page 14