102 lines
3.6 KiB
Plaintext
102 lines
3.6 KiB
Plaintext
|
|
|
|
X-CRYPT v1.01áeta (c)1994 ûiroSoft Enterprises, a ûirogen Corporation
|
|
Adjacent Reality BBS 615.586.9515
|
|
Ä8-23-94ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
|
|
|
Welcome to X-CRYPT v1.01 - The first and only encryptor I know of
|
|
that allows the user to fully specify the encryption technique(s).
|
|
By allowing the user to do so, two variables must be considered
|
|
for a possible crack: KEY and ENCRYPTION FORMAT. The cryptanlyst
|
|
must know both to even attempt a brute force or algorithmic approach.
|
|
X-CRYPT is not as secure as the more advanced encryption formats
|
|
such as IDEA or DES, however it can be quite secure depending on the
|
|
combination of encryption technique(s) the user choses.
|
|
|
|
Usage:
|
|
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
|
X-CRYPT [-e|-d] [filespec] [password]
|
|
|
|
Switches:
|
|
"-e" specifies encryption
|
|
"-d" specifies decryption
|
|
|
|
Examples:
|
|
X-CRYPT -e *.* mYpAssWorD
|
|
X-CRYPT -d *.* mYpAssWorD
|
|
X-CRYPT -e c:\stuff\*.exe thisismypasswordrighthereitislong!
|
|
X-CRYPT -e x-crypt.nfo "little bo peep has lost her sheep"
|
|
|
|
|
|
The Configuration File
|
|
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
|
|
|
The configuration file X-CRYPT.CFG must be located in the current
|
|
directory or directory of X-CRYPT.EXE at the time of execution. It's
|
|
format is simple:
|
|
|
|
Line 1=> ENcryption technique(s)
|
|
Line 2=> DEcryption technique(s)
|
|
|
|
The encryption and decryption techniques are:
|
|
|
|
"S" - sequential XOR [each character XORed by successive password char]
|
|
"+" - sequential ADD [each character ADDed by successive password char]
|
|
"-" - sequential SUB [each character SUBed by successive password char]
|
|
"X" - nonconstant XOR [each XOR determined by algorithm derived from pass]
|
|
"x" - constant XOR [each char XORed by sum of all password chars]
|
|
"N" - NOT ['NOT' file - not password sensitive]
|
|
"R" - reverse [REVERSE data in file - not password sensitive]
|
|
|
|
They can be combined in any matter you wish. Examples:
|
|
|
|
---------------
|
|
S+XxNR
|
|
RMxX-S
|
|
---------------
|
|
-XNx+RSNxX-R+
|
|
-R+XxNSR-xNX+
|
|
---------------
|
|
|
|
The decryption algorithm MUST compliment the encryption algorithm,
|
|
you need to reverse the order of encryption techniques, as well as
|
|
exchange "+" with "-" and vice versa.
|
|
|
|
Remember that the longer the list of encryption techniques used,
|
|
the more time it will take to crypt files.
|
|
|
|
|
|
|
|
BeggarWare
|
|
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
|
I'm not gonna throw a bunch of annoying delays or other nags on this
|
|
program, but I would just like to take these few bytes and explain
|
|
that I am a poor 16 year old, forced to whittle away my youth at meager
|
|
jobs instead of developing to my full mental capacity. If you would
|
|
like to send me some cash, because you think I should be liberated from
|
|
financial bonds of enslavment then pleaz do so.. Say, send me $10 and
|
|
I'll give you the TC++ source code. That'z kewl enough .. Here's my
|
|
address:
|
|
|
|
Jeremy Collake
|
|
613 Windridge Ln
|
|
Morristown, TN 37814
|
|
|
|
Pleaz address all letter bombs and harrassing mail to my mother or other
|
|
family memeberz, thanx.
|
|
|
|
|
|
|
|
Enjoy...
|
|
ûirogen
|
|
The AR 615.586.9515
|
|
|
|
|
|
History
|
|
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
|
v1.0 - ? - Original release - non-constant XOR cryption only
|
|
v1.01á - 8-23-94 - Rewrote most everything
|
|
Configurable encryption techniques
|
|
|
|
|