302 lines
16 KiB
Plaintext
302 lines
16 KiB
Plaintext
|
|
~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^
|
|
12/10/92 1.20 RELEASE
|
|
|
|
~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^
|
|
### |~| ### ### |~| ####~\. #####~\. ### /~| #####~\. #####
|
|
### | | ### #### | | ### |_| ### | | ###_/ / ### | | ######
|
|
### | | ### ##### | | ### ### | | ###_/ ### | | ###
|
|
### | | ### ###### | | ### ##### < ### #####_/ ###
|
|
###| | ### ### ###| | ### ### | | ### ### ###
|
|
### | ### ### ### | ### ### | | ### ### ###
|
|
###| ### ### ###| ### |~| ### | | ### ### ###
|
|
### ### ### ### ######' ### |_| ### ### ###
|
|
|
|
~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^
|
|
What GOD's own son Christ would have written, had he been evil.
|
|
|
|
~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^
|
|
|
|
PROGRAM HISTORY
|
|
~~~~~~~~~~~~~~~
|
|
DATE VER DESC
|
|
-------- ---- -------------------------------------------------
|
|
09/11/92 0.10 Began work of original version
|
|
09/23/92 0.25 First working version, would work only on ASCII
|
|
10/06/92 0.32 Modified DES routines to allow 255 charset
|
|
10/19/92 0.59 Implemented RSA public-key routines
|
|
10/28/92 0.70 Implemented Compression routines
|
|
11/27/92 0.83 First working version with compression/encryption
|
|
11/28/92 0.90 Delta release testing begins at selected sites
|
|
12/01/92 0.99 Gamma release w/ VinLynx/Key modes testing
|
|
12/04/92 1.05 Implemented Multiple file option (all modes)
|
|
12/05/92 1.06 Optimized source
|
|
12/06/92 1.07 Found bug with EISA machines, Improved 'M' mode
|
|
12/09/92 1.10 Fixes EISA machine bug
|
|
12/10/92 1.14 Key mode fully implemented
|
|
12/12/92 1.20 Lock mode fully implemented for drives A and B
|
|
-------- ---- -------------------------------------------------
|
|
|
|
WHAT IS VINCRYPT
|
|
~~~~~~~~~~~~~~~~
|
|
Well, basically what Vincrypt is, and was designed to do is keep sensitive
|
|
information protected. There have been many other programs that are out that
|
|
do along the same thing as Vincrypt, but not to the same degree. Vincrypt
|
|
incorporates a modified DES routine, RSA public-key, MPJ encryption, and a
|
|
modified PKware zip based routine. The most signifigant factor about this
|
|
program is the fact that it is a relatively 'dumb' program. Aside from
|
|
identifying whether or not the source file was generated with the program, it
|
|
simply processes the files without any headers of pointers. The reason for
|
|
this is to make it even more difficult to break the routine and bypass the
|
|
encryption due to file common information (such as how all government letters
|
|
say TO: FROM: DEPT:, etc).
|
|
Unlike other programs which use GOVERNMENT APPROVED algorhythms, Vincrypt
|
|
strives to break all laws concerning government regulated security, and is
|
|
not NSA approved. The main point here is that the NSA approved DES and RSA
|
|
for use in the public, but chose not to use the routines for their own
|
|
internal security. What does that tell you? There has been alot of talk
|
|
about what's safe and what's not, and no one is quite sure, so I took it upon
|
|
myself to write this utility.
|
|
|
|
|
|
WHO SHOULD USE VC
|
|
~~~~~~~~~~~~~~~~~
|
|
Everybody. In this day and age where G. Orwell's 1984 looks more like it
|
|
will be 1994, where a democrat can become president, and gun controls just
|
|
lurking around the corner, you must take any and all steps to secure vital
|
|
information against prying eyes. Commercially available security utils are
|
|
a joke, and the public domain ones aren't even worth laughing at, since they
|
|
look at security more as something that stops Joe, your neighbor, from going
|
|
into your dos directory, or maybe from using the format command. I don't
|
|
really care if it is used for evil purposes, although I would prefer it.
|
|
|
|
|
|
WHAT VC HAS BEEN TESTED ON
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
VINCRYPT has undergone extensive testing on the following platforms:
|
|
|
|
486-50 DX ISA 32 MEGS SCSI TYPE DRIVE
|
|
486-33 DX EISA 8 MEGS SCSI TYPE-2 DRIVE
|
|
486-33 DX LB 8 MEGS LOCAL BUS IDE
|
|
486-33 DX ISA 4 MEGS IDE
|
|
386-40 DX ISA 8 MEGS IDE
|
|
386-16 SX ISA 2 MEGS IDE (Wren)
|
|
286-25 DX ISA 2 MEGS IDE
|
|
8088 DX ISA 640 k ST-506
|
|
|
|
VC was even tested on an HP 95LX, although it was slow, it worked!
|
|
|
|
|
|
FILES SUPPORTED
|
|
~~~~~~~~~~~~~~~
|
|
Unlike MUTATi0N and SecureCrypt, Vincrypt will encrypt ANY file... .EXE, .COM
|
|
.TXT, whatever. Where the others either tag crap on the end, or can't process
|
|
non-ascii input, VC excels. Although the compression routine in VC is not
|
|
as good as newer versions of zip, it is a small price to pay for security.
|
|
And since PKware will unzip your password protected .zip files, in case you
|
|
forget your password, I wouldn't recommend relying on it.
|
|
|
|
|
|
THE PASSWORD
|
|
~~~~~~~~~~~~
|
|
VC supports a password of up to 30 chars, which can be numbers, letters,
|
|
symbols, whatever. VC also IS case sensitive, so 'Password' differs from
|
|
'paSsword', or 'PAssword'. This version does not currently support spaces in
|
|
the password, but if demand is enough, later versions will.
|
|
Realize that the password you choose is the key to the security of this
|
|
program. The longer the password, the better; so try to choose a phrase or
|
|
combination of words. Unlike the other 1:1 encryption routines, redundancy in
|
|
the file and a small password are not as damaging. This is due in part to the
|
|
compression and public-key routines.
|
|
|
|
|
|
ENCRYPTION METHODS
|
|
~~~~~~~~~~~~~~~~~~
|
|
VC currently supports two different encryption methods. The primary method
|
|
is called VINCRYPTION, and can be used on any type of file (from .EXE to .TXT).
|
|
It incorporates the VC encryption, with a more advanced compression routine
|
|
and non-ASCII character handling.
|
|
The second mode is 'VINLYNX'. VinLynx mode is exclusively for use with
|
|
text files and ASCII files, and uses a less complex method of compression, but
|
|
with larger savings in space. VinLynx will abort if it detects any non-ASCII
|
|
characters in the input file.
|
|
Both encryption modes are equally secure, and can be used with any of the
|
|
other functions VC allows (such as Lock or Key modes (described below)).
|
|
|
|
|
|
MODES OF OPERATION
|
|
~~~~~~~~~~~~~~~~~~
|
|
VC supports several different modes of encryption in this version. You can
|
|
get a list of commands by typing either 'VC' or 'VC /?'.
|
|
First (and probably the most commonly used) is the primary mode (option
|
|
either 'e' or 'd'). This is the basic encryption/compression routines, with
|
|
one vertical and horizontal 'fold'. To use this option you would use the
|
|
following string:
|
|
|
|
C:\> VC e work.txt work.vin defaultpasswd s
|
|
|
|
This tells VC to encrypt work.txt into the file work.vin, with the password of
|
|
'defaultpasswd', and to show the statistics at the end. The 's' is optional
|
|
and does not impair performance.
|
|
The second and more secure mode is called 'Chained' mode. What this does is
|
|
encrypt the file the same as above, then add duplicate strings in specific
|
|
parts encrypted with a different password (apart from the two you choose).
|
|
The string it duplicates on the other routine is usually a common word such
|
|
as 'the' or 'is'. This is to defeat a brute force attempt using common word
|
|
searches. The file is the encrypted a second time with your other password,
|
|
thus masking everything across the file. To use this feature you would enter:
|
|
|
|
C:\> VC ec work.txt work.vin default passwd sc
|
|
|
|
Like the above example, the in/out files are the same, and 's' is optional.
|
|
In this mode, however, 'c' was also selected. This tells VC to clear the
|
|
screen before encryption or decryption begins, thus hiding the password from
|
|
someone watching. 'default' is the primary password, and 'passwd' is the
|
|
secondary. One note, you can use two 30 char passwords, since it is actually
|
|
encrypting the file twice.
|
|
The third mode is called 'Locked' mode, and is only available when using a
|
|
floppy drive (either A or B). What this does is encrypt the file by your
|
|
password, which is combined with information from the fat table and directory.
|
|
Due to the combination, the password is limited to 25 chars in this mode,
|
|
although the 10 chars of information the program gathers is based off letters
|
|
in the password. So an example is:
|
|
|
|
secretword -> sXe5!cFr0t-w12obr.d
|
|
Secretword -> YSeR@cretx/wom,:r3d
|
|
|
|
Remember that the file CANNOT be decrypted in any way unless you have the EXACT
|
|
floppy it was encrypted on in the drive. This feature is especially nice when
|
|
you want to store sensitive information in a fairly accessible location. You can
|
|
encrypt and decrypt the files on the HD for faster access, but you must always
|
|
use a key disk in A or B. Each keydisk can be used for as many of few files as
|
|
you would like, you can even turn a normal program disk into a key disk and it
|
|
will not look any different. Note that this mode is much like Chained mode, and
|
|
creates duplicate word files between the password and lock encryption sessions.
|
|
The fourth mode is referred to as 'Key' mode. This is based off of the MPJ
|
|
encryption routine, which realized with DES each letter is really only worth
|
|
100 possiblites (36 alphabet lower/36 alphabet upper, 10 numbers, 18 misc
|
|
symbols). This means a four letter password in DES is worth in reality 100^4,
|
|
nothing like 256^4. The numbers which are entered in are then converted to
|
|
their ANSI respective chars, and used as a key, much like Chain mode. Key
|
|
mode still requires a password to be entered, so if you use a four char pass
|
|
and a six numberset key, your possibilies are (100^4) * (256^6). This is
|
|
currently the most secure mode VC offers. When using this mode, the command
|
|
line looks like this:
|
|
|
|
C:\> VC ek work.txt work.vin password scl
|
|
|
|
Then the program responds with this:
|
|
|
|
Numbers must be between 000-255.
|
|
###
|
|
Enter Key :
|
|
|
|
At this point you would enter the key. Remember to always use ALL THREE spaces,
|
|
so don't enter 0 or 45, use this 000 or 045. If you have the screen clear
|
|
option selected (as the above example does), the screen will then clear once
|
|
the key has been entered. For the best possible security, try to use numbers
|
|
above 127, and jump around as much as possible, since these are not used as
|
|
frequently. When you hit enter it will display it's ANSI representation in a
|
|
small box, and prompt for the next. When you've entered all you want, type END.
|
|
The key may be up to 10 numbersets long, so a maximum possible number of 256^10.
|
|
The fifth mode is not really a different mode, but a different session,
|
|
where the program will search a drive and ask if you want files to be encrypted.
|
|
I recommend ending all of your VC'd files with .VIN To use this option type
|
|
this:
|
|
|
|
C:\> VC em *.* password c
|
|
C:\> VC dm password c
|
|
|
|
The [L] toggles are not available in this mode. Also, when decrypting, all
|
|
files must use the same password, and end with a .VIN or the program will
|
|
not list them. Another nice point about the multiple mode, is that it is
|
|
compatible with all the other modes, so you could enter 'emc' for Encrypt
|
|
Multiple files using Chained mode; or 'dmk' for Decrypt Multiple files using
|
|
the Key option. The program prompts with the filename, and asks if you wish
|
|
to encrypt it; at this point you can enter either [Y]es, [N]o, or [Q]uit.
|
|
If you respond no, it will go on to the next file; If yes, it will ask if you
|
|
would like to use VinLynx mode, and then the output filename. The '*.*' is
|
|
the filespec for the directory search, so if you just wanted textfiles, you'd
|
|
enter '*.TXT'. All standard dos flags (like * or ?) are supported. When
|
|
decrypting, do not use the filespec flag.
|
|
Also note that the command line uses the flag 'L' for VINLYNX mode (for use
|
|
with ASCII files). VC defaults to VINCRYPTION. The last command field can
|
|
be entered in any sequence, so 'cl' will work just as well as 'lc' or 'lsc'.
|
|
The program in not case sensitive EXCEPT in the password fields.
|
|
|
|
|
|
STATISTICS DISPLAY
|
|
~~~~~~~~~~~~~~~~~~
|
|
The statistics option really doesn't have any useful application, except in
|
|
debugging, but I left it in anyways. It tells you a general overview of the
|
|
VC session. Here's a sample of what it outputs:
|
|
|
|
VINCRYPT VERSION 1.00 STATISTICS
|
|
|
|
Input Name [triad.1]
|
|
Input Size [19378]
|
|
Output Name [triad.vin]
|
|
Output Size [12476]
|
|
Encryption Type [VINCRYPTION]
|
|
Compression [0.464]
|
|
Completion Time [3.000000]
|
|
Password1 Length [8]
|
|
Password2 Length [0]
|
|
Public-Key [343]
|
|
Fold Horizontal [180]
|
|
Fold Vertical [212]
|
|
Average Block [6205]
|
|
|
|
Everything is pretty self explanatory. The vertical and horizontal folds
|
|
represent the string length based off of the average output block. The public
|
|
key is the RSA routine checksum. Currently VINCRYPTION and VINLYNX are the
|
|
only modes available, although upcoming versions will have more improved
|
|
routines. The stat display in multiple file modes is stripped down and split
|
|
into two locations on the screen. Some information is also left out.
|
|
|
|
|
|
KNOWN BUGS
|
|
~~~~~~~~~~
|
|
VinLynx mode does not always detect and abort a non-ascii file, but simple
|
|
processes it through. The easiest way around this (without slowing the code
|
|
down signifigantly is just don't use it on non-test files.
|
|
|
|
|
|
PROGRAMS FOR THE FUTURE
|
|
~~~~~~~~~~~~~~~~~~~~~~~
|
|
Here's some of the programs to be watching for, from me, in the future:
|
|
|
|
ACTCHK Checks CBI accounts against their algorhythm and verifies
|
|
format validity and extra information.
|
|
[AVAILABLE EARLY 1993]
|
|
CBIDBS A database that sorts and displays all of your credit
|
|
reports. Implements the VC routines real time for
|
|
maximum security. Allows searching for any field, comment
|
|
fields, and ARDT directory.
|
|
[AVAILABLE SUMMER 1993]
|
|
|
|
|
|
CONCLUSION
|
|
~~~~~~~~~~
|
|
If you have any questions, comments, or problems, please report them to me
|
|
on any of the boards listed below or in the program. The greets go out to:
|
|
|
|
DIGITAL HITLER MAXIMUM OVERDRIVE THE WHITE RIDER
|
|
EREKOSE MR. DRUNKFUX GRANDMASTER RATTE'
|
|
BOOTLEGGER CAPT ZAP
|
|
|
|
And always remember...
|
|
|
|
96% of all SS agents who have tried women prefer camels...
|
|
...the other 4% prefer men.
|
|
=============================================================================
|
|
Church/Theives [IBM H/P system running with MNP ] 96 619-789-2235
|
|
Demon Roach [PW: THRASH - NUP: FEAR - cDc - Nuff said ] 24 806-794-4362
|
|
The Stash [My European Connection... Lots of files ] 96 46-498-222113
|
|
The Works [Tons of Files cDc Board Give it a call ] 24 617-861-8976
|
|
=============================================================================
|
|
This concludes another wonderful file by Video Vindicator (C)opyright 1992
|
|
=============================================================================
|
|
|
|
|