AT&T UNIX™PC Unix System V Users Manual - tenox
AT&T UNIX™PC Unix System V Users Manual - tenox AT&T UNIX™PC Unix System V Users Manual - tenox
CRYPT { l ) ( Domestic Version Only ) CRYPT ( l ) NAME crypt - encode/decode SYNOPSIS crypt [ password ] DESCRIPTION This command is available only in the domestic (U.S.) version of the UNIX PC software. Crypt reads from the standard input and writes on the standard output. The password is a key that selects a particular transformation. If no password is given, crypt demands a key from the terminal and turns off printing while the key is being typed in. Crypt encrypts and decrypts with the same key: crypt key cypher crypt key < cypher I pr will print the clear. Files encrypted by crypt are compatible with those treated by the editor ed in encryption mode. The security of encrypted files depends on three factors: the fundamental method must be hard to solve; direct search of the key space must be infeasible; "sneak paths" by which keys or clear text can become visible must be minimized. Crypt implements a one-rotor machine designed along the lines of the German Enigma, but with a ·256-element rotor. Methods of attack on such machines are known, but not widely; moreover the amount of work required is likely to be large. The transformation of a key into the internal settings of the machine is deliberately designed to be expensive, i.e. to take a substantial fraction of a second to compute. However, if keys are restricted to (say) three lower-case letters, then encrypted files can be read by expending only a substantial fraction of five minutes of machine time. Since the key is an argument to the crypt command, it is potentially visible to users executing ps(l) or a derivative. To minimize this possibility, crypt takes care to destroy any record of the key immediately upon entry. The choice of keys and key security are the most vulnerable aspect of crypt. Fll..ES /dev/tty for typed key SEE ALSO ed( l), makekey(l). BUGS If output is piped to nroff and the encryption key is not given on the command line, crypt can leave terminal modes in a strange state (see stty(l)). If two or more files encrypted with the same key are concatenated and an attempt is made to decrypt the result, only the contents of the first of the original files will be decrypted correctly. - 1 -
- Page 203 and 204: BDIFF(l) BDIFF ( 1 ) NAME bdiff - b
- Page 205 and 206: BFS (I) BFS(I) NAME bfs - big file
- Page 207 and 208: BFS (l) BFS (l) could be used to ma
- Page 209: CAL ( 1) CAL(l) NAME cal - print ca
- Page 212 and 213: ' ..
- Page 215 and 216: ;� CC ( l ) cc (1) NAME cc - C co
- Page 217: CC(l) /lib/crts.o /lib/mcrto.o /lib
- Page 221 and 222: CDC ( 1 ) CDC { 1) NAME cdc - chang
- Page 223: CDC (l) CDC (l) SEE ALSO admin( l),
- Page 226 and 227: CFLOW ( 1) CFLOW ( 1) produces the
- Page 228 and 229: CFONT(l) (AT&T UNIX PC only ) CFONT
- Page 231: CHOWN (l) CHOWN ( 1) NAME chown, ch
- Page 234 and 235: .'�
- Page 236 and 237: I I I I I I I I I I I I I I I I I I
- Page 238 and 239: COL(l) COL(l) BUGS Cannot back up m
- Page 240 and 241: COMB(l) COMB(l) FIT..ES s.COMB The
- Page 243 and 244: CP ( 1) CP ( 1) NAME cp, In, mv - c
- Page 245 and 246: CPIO ( 1 ) CPIO ( 1) NAME cpio - co
- Page 247: CPIO ( 1) CPIO ( 1) track of them a
- Page 250 and 251: CPP ( 1) CPP (1) Two special names
- Page 254 and 255: i�
- Page 256 and 257: CSPLIT ( 1) CSPLIT ( l ) Regular ex
- Page 258 and 259: CU ( lC) CU ( lC ) The transmit pro
- Page 261 and 262: CUT ( 1 ) CUT(l) NAME cut - cut out
- Page 263 and 264: CW(l) CW {l) NAME cw, checkcw - pre
- Page 265 and 266: CW (l) HINTS CW(l) The options are:
- Page 267 and 268: CXREF ( l ) CXREF ( l ) NAME cxref
- Page 269 and 270: DATE ( l ) DATE ( 1) NAME date - pr
- Page 271 and 272: DC( l ) DC (1) NAME de - desk calcu
- Page 273: DC(l) DC (1) Out of pushdown for to
- Page 276 and 277: DD (1) DD (I) EXAMPLE This command
- Page 278 and 279: DELTA ( I) DELTA (l) FILES If -m is
- Page 280 and 281: � '\, ) -� · n ·�- .
- Page 283 and 284: DIFF ( 1) DIFF(l) NAME diff - diffe
- Page 285: DIFF ( 1 ) DIFF ( 1) When comparing
- Page 289: DIFFMK ( 1) DIFFMK(l) NAME diffmk -
- Page 293: DU ( l ) DU ( l ) NAME du - summari
- Page 296 and 297: DUMP(l) DUMP (l) -z name,number Dum
- Page 299 and 300: ED (1) ED (I) NAME ed, red - text e
- Page 301 and 302: � I ED ( 1) ED (1) 2.3 A one-char
CRYPT { l ) ( Domestic Version Only ) CRYPT ( l )<br />
NAME<br />
crypt - encode/decode<br />
SYNOPSIS<br />
crypt [ password ]<br />
DESCRIPTION<br />
This command is available only in the domestic (U.S.) version of<br />
the UNIX PC software. Crypt reads from the standard input and<br />
writes on the standard output. The password is a key that selects<br />
a particular transformation. If no password is given, crypt<br />
demands a key from the terminal and turns off printing while the<br />
key is being typed in. Crypt encrypts and decrypts with the same<br />
key:<br />
crypt key cypher<br />
crypt key < cypher I pr<br />
will print the clear.<br />
Files encrypted by crypt are compatible with those treated by the<br />
editor ed in encryption mode.<br />
The security of encrypted files depends on three factors: the fundamental<br />
method must be hard to solve; direct search of the key<br />
space must be infeasible; "sneak paths" by which keys or clear<br />
text can become visible must be minimized.<br />
Crypt implements a one-rotor machine designed along the lines of<br />
the German Enigma, but with a ·256-element rotor. Methods of<br />
attack on such machines are known, but not widely; moreover the<br />
amount of work required is likely to be large.<br />
The transformation of a key into the internal settings of the<br />
machine is deliberately designed to be expensive, i.e. to take a<br />
substantial fraction of a second to compute. However, if keys are<br />
restricted to (say) three lower-case letters, then encrypted files can<br />
be read by expending only a substantial fraction of five minutes of<br />
machine time.<br />
Since the key is an argument to the crypt command, it is potentially<br />
visible to users executing ps(l) or a derivative. To minimize<br />
this possibility, crypt takes care to destroy any record of the key<br />
immediately upon entry. The choice of keys and key security are<br />
the most vulnerable aspect of crypt.<br />
Fll..ES<br />
/dev/tty for typed key<br />
SEE ALSO<br />
ed( l), makekey(l).<br />
BUGS<br />
If output is piped to nroff and the encryption key is not given on<br />
the command line, crypt can leave terminal modes in a strange<br />
state (see stty(l)).<br />
If two or more files encrypted with the same key are concatenated<br />
and an attempt is made to decrypt the result, only the contents of<br />
the first of the original files will be decrypted correctly.<br />
- 1 -