Home of the original IBM PC emulator for browsers.
[PCjs Machine "ibm5160"]
Waiting for machine "ibm5160" to load....
The Confidant is a user-supported program which encodes sensitive data
in order to keep it confidential. The Confidant protects information
transmitted by communications lines from alteration as well as from
unauthorized use by anyone intercepting it or trying to change it.
The Confidant gives a choice of two encryption procedures. The
national Data Encryption Standard (DES) provides very high security.
A faster "privacy" procedure that is somewhat less secure provides
encryption for normal use, where speed is important.
System Requirements: 2 disk drives
How to Start: Consult the voluminous documentation in the four files
marked .DOC. Initiate the program by typing CONFIDE at the DOS prompt.
Suggested Registration: $10.00
File Descriptions:
CONFIDE EXE Main program
CONFIDE HLP Help file
CONFIDE CRY Part of CONFIDE
CONFIDE INV Part of CONFIDE
REFCARD DOC A brief summary of the main commands
DESCRIPT DOC An overall description of the program (24K)
TUTORIAL DOC A step-by-step tutorial (69K)
TYPE ME How to list documentation
REFER DOC A technical reference manual (60K)
PC-SIG Disk No. #230, version v1
The following is a list of the file checksums which should be produced by
the CRCK4 program on disk #9 (and others). If the CRC numbers do not match
you may have a bad file. To use type: CRCK4 <filespec>
CRCK4 output for this disk:
CRCK ver 4.2B (MS DOS VERSION )
CTL-S pauses, CTL-C aborts
--> FILE: CONFIDE .EXE CRC = 11 6B
--> FILE: CONFIDE .HLP CRC = A1 0F
--> FILE: CONFIDE .CRY CRC = FB A9
--> FILE: CONFIDE .INV CRC = 9C 1C
--> FILE: REFCARD .DOC CRC = 7E 8C
--> FILE: TUTORIAL.DOC CRC = EA 13
--> FILE: DESCRIPT.DOC CRC = B7 DD
--> FILE: REFER .DOC CRC = 8D 25
--> FILE: TYPE .ME CRC = 26 C0
---------------------> SUM OF CRCS = 1E A0
DONE
These and other Public Domain and user-supported programs from:
PC Software Interest Group
1125 Stewart Ct Suite G
Sunnyvale, CA 94086
(408) 730-9291
* * * * * *
* *************** * *************** *
* * * * * *
* *
* THE CONFIDANT (tm) *
* USER GUIDE *
* *
* * * * * *
* *************** * *************** *
* * * * * *
*
* *
*
Copyright (C) 1983, 1984 by Data Sage
Yale Station 2902
New Haven, CT 06520
THE CONFIDANT(tm)
Version 2.00 - June 1984
User-Supported Encryption Software
for the IBM Personal Computer
Copyright (C) 1983, 1984 by Data Sage. All rights reserved.
TRADEMARK NOTICE
The Confidant is a trademark of Data Sage. IBM is a
registered trademark of the International Business Machines
Corporation.
AN IMPORTANT MESSAGE
The Confidant is a user-supported or "shareware"
program. User-supported software is an experiment in
software distribution based on three principles:
1. You can best assess the utility of a program on your
own computer. Only by using it can you see whether it meets
your needs. If it doesn't, you shouldn't have to pay for it.
2. The creation of personal computer software can and
should be supported by the computing community. If you use
someone else's work, we think you will want to contribute a
small share of the cost, just as someone who uses your work
should do for you.
If you are using this program and find it of value, we ask
you to contribute to its support by donating $10 (suggested)
to:
Data Sage
Yale Station 2902
New Haven, CT 06520
Companies and other organizations are asked to donate $10
for each building where The Confidant will be used.
3. Copying and sharing software is a good thing that
should be encouraged rather than restricted.
Data Sage grants permission to individuals and
organizations to copy the program and documentation for The
Confidant (tm), provided that neither the program nor the
documentation is modified in any way, and that no fee or
consideration is charged. However, a club may charge a
small fee for the distribution cost of the diskette,
provided that it informs its members of the user-supported
concept and encourages them to support the program with
their donations.
INTRODUCTION
Congratulations on choosing The Confidant. We believe
you will find it a faithful friend which can provide you
with privacy and security.
We want The Confidant to work for you. So we have
supplied you with what we believe is the best documentation
available. Several files on the diskette containing The
Confidant bear the extension label .DOC. Together they
comprise the USER GUIDE, including:
* A full Table of Contents, contained in this file
(DESCRIPT.DOC), to all the documentation, so you can find
what you want when you want it. This description also tells
how to start The Confidant and what equipment you need.
* A casebook-style Tutorial to make learning more
effective and more enjoyable. It is contained in the file
TUTORIAL.DOC.
* A detailed Reference manual, in REFER.DOC.
* A Quick Reference Card, found in REFCARD.DOC.
We recommend that you print a copy of the documentation
by COPYing each of the four .DOC files to your printer.
What Does The Confidant Do?
Here is a quick overview of what The Confidant can do
for you:
The Confidant encodes sensitive data, such as personnel
information, payroll and income data, health records,
examinations, test scores, survey data, or business plans,
in order to keep them confidential.
The Confidant prevents undetected accidental alteration
of data, and permits only authorized persons to make
intentional alterations.
The Confidant protects information transmitted by
communications lines from alteration as well as from
unauthorized use by anyone intercepting it or trying to
change it.
The Confidant gives a choice of two encryption
procedures. The national Data Encryption Standard (DES)
provides very high security. A faster "privacy" procedure
[The Confidant Description (C) 1983, 1984 Data Sage - page D-2]
that is somewhat less secure provides encryption for normal
use, where speed is important.
The Confidant also provides the ability to enter data
into the computer, to copy files, and to print files. Input
to the program may come from either a disk file or the
keyboard of the console. Output may be directed to a file,
the screen of the console, or a printer.
Who Uses The Confidant?
Most persons needing occasional or routine data
security should find The Confidant useful. Examples are:
* Businessmen and executives who need to protect
business plans and data.
* Professionals, such as physicians, lawyers, or
accountants who must protect the privacy of clients.
* Computer users who need to transmit sensitive
information over public communcations lines.
* Educators with grades and examinations online.
* Social and behavioral scientists who have collected
sensitive data and are concerned about the subjects' right
to privacy.
* Individuals who want to maintain the privacy of their
own personal information.
The Confidant is intended for use by individuals and
organizations for "normal" encryption. That is, it is meant
to protect and keep confidential the routine information
that individuals and companies produce.
The Confidant is NOT meant to replace hardware devices
where these are required. For example, Government standards
require hardware encryption for Federal agencies. The
American Banking Association requires hardware encryption of
fund transfers between financial institutions. In addition,
hardware encryption is better for "volume" encryption.
If you are an individual, The Confidant will most
likely meet your needs. If you are a company, or other
organization, it will probably meet many of your needs. But
you should check with your organization's security officers
or in some other way make sure that software encryption
meets the requirements you have.
Having said this much, we think you will find The
Confidant an invaluable tool. We hope you find a good deal
of pleasure in using it.
[The Confidant Description (C) 1983, 1984 Data Sage - page D-3]
Enjoy Using The Confidant
The Confidant is friendly and easy to use. It is also
easy to learn. We hope you will begin by examining this
USER GUIDE, including the Table of Contents and the Index,
so you will know where to find information when you need it.
Then turn to the TUTORIAL file and get started.
We are always anxious to improve the program and the
documentation. Please write us if you have comments or
suggestions.
Disclaimer
We have done everything we can to make The Confidant
work well for you. However, we cannot be responsible in the
event of problems. In using The Confidant, you agree that
in no event will you hold Data Sage liable for any damages,
actual or consequential, that may arise from use of this
product.
* * *
[The Confidant Description (C) 1983, 1984 Data Sage - page D-4]
THE CONFIDANT USER GUIDE
TABLE OF CONTENTS
DESCRIPTION (DESCRIPT.DOC)
Introduction .................................... D-2
Table of Contents of the entire USER GUIDE ..... D-5
What You Need to Use The Confidant .............. D-6
Getting Started with The Confidant ............ D-7
Index to the DESCRIPTION ........................ D-11
TUTORIAL (TUTORIAL.DOC)
The Confidant and the Secret Formula ........... T-1
What is There to Protect? ..................... T-1
Encryption Vs. Passwords ...................... T-2
What is Encryption? ........................... T-3
A Little Background ........................... T-3
Copying the Master Diskette ................... T-4
Using The Confidant ........................... T-7
Getting HELP .................................. T-7
The SOURCE .................................... T-9
The DESTINATION ............................... T-9
Choosing a PASSWORD ........................... T-10
Hiding the PASSWORD ........................... T-11
Starting Encryption ........................... T-11
Fixing Mistakes ............................... T-14
"Flipping" SOURCE and DESTINATION ............. T-15
Copying ....................................... T-15
Privacy ....................................... T-18
Directory and Erase SOURCE ...................... T-19
Using The Confidant to Transmit Data Over the
Telephone .................................. T-19
Index to the TUTORIAL ........................... T-25
REFERENCE (REFER.DOC)
How to Use the Reference ........................ R-1
Copy ............................................ R-2
DES Decipher .................................... R-3
DES Encipher .................................... R-4
The DESTINATION ................................. R-6
Directory ....................................... R-8
End ............................................. R-9
Erase SOURCE .................................... R-10
Flip ............................................ R-11
HELP ............................................ R-12
Hide ............................................ R-13
The Keyboard .................................... R-14
Maintaining Security ............................ R-16
The PASSWORD .................................... R-17
Privacy ......................................... R-19
PROBLEM Reports ................................. R-21
The SOURCE ...................................... R-23
Index to the REFERENCE .......................... R-25
[The Confidant Description (C) 1983, 1984 Data Sage - page D-5]
WHAT YOU NEED
TO USE THE CONFIDANT
Required
* IBM Personal Computer or BIOS-compatible computer
* 64K bytes of RAM
* One 5.25 inch double sided double density disk drive
* An IBM-compatible color or monochrome display capable
of showing 80 columns. If your display is set to 40
columns, the program will set it to 80 columns with
your consent, otherwise the program will terminate.
Optional
* A serial or parallel printer
* Additional hard, floppy or RAM disk drives
* Additional floppy diskettes for saving data
Required Software
* PC-DOS 1.1 or higher
* The Confidant, which consists of nine files:
* CONFIDE.EXE (The Program)
* CONFIDE.HLP (Online Help File)
* CONFIDE.CRY (For Use with the Tutorial)
* TYPE.ME (Explains Documentation files)
* DESCRIPT.DOC (Description Document)
* TUTORIAL.DOC (Tutorial Document)
* REFER.DOC (Reference Document)
* REFCARD.DOC (Quick Reference Card)
* CONFIDE.INV (Invoice form)
[The Confidant Description (C) 1983, 1984 Data Sage - page D-6]
GETTING STARTED
with The Confidant
The best way to get started with The Confidant is to
get acquainted with this USER GUIDE before you try to use
the program. It will be worth your time to examine the
Table of Contents and then read the TUTORIAL section.
The TUTORIAL will lead you in a step-by-step manner
through using The Confidant. It will teach you about
security. It will also entertain you, in a mild sort of
way. When you read the TUTORIAL, work along with it. Put
yourself in Anne Lambert's or David Lyon's place, and do
what they do.
But if you are impatient to try out the program, as
most people are, decide which of the three systems below is
most like yours. Then follow the steps outlined. You'll be
using it in no time.
SYSTEM 1: A hard drive and a floppy drive
Step 1. Boot your computer system in the normal way. If
you are using DOS 2.0, use the PATH command to set the
subdirectory where you want The Confidant to reside.
Step 2. Place the original copy of The Confidant in the
floppy drive.
Step 3. At the DOS prompt, type:
Copy A:*.* C:
and press the <RETURN> key. (This assumes the floppy disk
drive is your A: drive and the hard disk is your C: drive.
If that is not correct, substitute the correct letters for
the drives.)
Step 4. When the copy is finished, remove the original copy
of The Confidant from the A: drive and store it in a safe
place.
Step 5. At the DOS prompt, log your hard disk by typing:
C:
(Again, assuming your hard disk is the C: drive.)
[The Confidant Description (C) 1983, 1984 Data Sage - page D-7]
Step 6. At the DOS prompt, type:
Confide
and press the <RETURN> key.
SYSTEM 2: Two floppy drives
Step 1. Boot your computer system in the normal way. If
you are using DOS 2.0, use the PATH command to set the
subdirectory where you want The Confidant to reside.
Step 2. Place the original copy of The Confidant in the A:
drive.
Step 3. Place a blank, formatted diskette in the B: drive.
Step 4. At the DOS prompt, type:
Copy A:*.* B:
and press the <RETURN> key.
Step 5. When the copy is finished, remove the original copy
of The Confidant from the A: drive and store it in a safe
place.
Step 6. Remove the copy of The Confidant from the B: drive
and put it into the A: drive.
Step 7. At the DOS prompt, log your A: drive by typing:
A:
Step 8. At the DOS prompt, type:
Confide
and press the <RETURN> key.
SYSTEM 3: One floppy drive
Step 1. Boot your computer system in the normal way. If
you are using DOS 2.0, use the PATH command to set the
subdirectory you want The Confidant to reside under.
Step 2. Place the original copy of The Confidant in the A:
drive.
[The Confidant Description (C) 1983, 1984 Data Sage - page D-8]
Step 3. At the DOS prompt, type:
Copy A:*.* B:
and press the <RETURN> key.
Step 3. In response to the prompt, insert a blank, formatted
diskette in the B: drive. Press the <RETURN> key to start
copying the first file. Exchange the original and copy
diskettes in response to the prompts until all files on the
original diskette have been copied.
Step 4. When the copying is finished, store the original
copy of The Confidant in a safe place.
Step 5. Press the <RETURN> key. At the DOS prompt, log
your A: drive by typing:
A:
Step 6. At the DOS prompt, type:
Confide
and press the <RETURN> key.
Now you're started. Press <F9> for help. We hope you
enjoy using The Confidant. And we suggest that you still
study the tutorial and reference guide when you get a
chance.
[The Confidant Description (C) 1983, 1984 Data Sage - page D-9]
ACKNOWLEDGEMENTS
The Confidant(tm) was conceived and written by Stan W.
Merrill, Ph.D. He also wrote the documentation. John B.
Roeder, Ph.D. edited the documentation, added indexes, and
in other ways prepared the program for distribution.
JoLynn Bennett helped test it.
Several persons not affiliated with Data Sage gave
valuable feedback. Our thanks to David Colesworthy, Morris
Effron, Claudia LaRock, Gene Lyman, Helena Merrill, and Gary
J. Mulligan.
[The Confidant Description (C) 1983, 1984 Data Sage - page D-10]
INDEX to the DESCRIPTION (DESCRIPT.DOC)
C
Copying The Confidant programs and documentation, 1, 7ff
D
Disk drives, various configurations of, 6, 7ff
Display, number of columns in, 6
Documentation, 2
H
Hardware encryption, The Confidant does not replace, 4
Hardware needed to use The Confidant, 6
I
Improvements, suggestions for, 4
O
Optional hardware devices in using The Confidant, 6
P
Purpose of The Confidant, 2, 3
R
Reference manual, 2
Reference card, 2
Required hardware devices in using The Confidant, 6
S
Starting out, 7
T
Tutorial, 2, 7
U
User-supported software, 1
W
Who uses The Confidant, 3
[The Confidant Description (C) 1983, 1984 Data Sage - page D-11]
THE CONFIDANT (tm)
QUICK REFERENCE CARD
Copyright (C) 1983, 1984 by Data Sage
TO START THE CONFIDANT:
Place The Confidant in the logged drive and type: CONFIDE
TO USE THE CONFIDANT:
Fill in the SOURCE, DESTINATION, and PASSWORD boxes. Choose the
function you want from the list at the bottom of the screen and press the
corresponding Function Key.
The DESTINATION tells The Confidant where to send the text it
processes.
The SOURCE tells The Confidant where to take its text FROM for
processing.
The Confidant combines the PASSWORD with the text in the SOURCE to
create encrypted or decrypted text. The PASSWORD may consist of any
characters you can generate from the keyboard, except for the special
editing keys.
FUNCTIONS
<F1> DES Encipher: causes the text in the SOURCE to be encrypted, using
the Data Encryption Standard (DES) algorithm.
<F2> DES Decipher: causes the text in the SOURCE to be decrypted, using
the Data Encryption Standard (DES) algorithm.
<F3> Privacy: causes the text in the SOURCE to be encrypted (or decrypted),
using a special algorithm that is much faster than the Data Encryption
Standard (DES), though not as secure.
<F4> Copy: causes the text in the SOURCE to be copied to the DESTINATION.
<F5> Flip: exchanges the names in the SOURCE and DESTINATION fields.
<F6> Hide: hides (and reveals) the information in the PASSWORD, SOURCE and
DESTINATION fields.
<F7> Directory: will display a directory listing of all files that match
those specified in the SOURCE field of The Confidant's main menu.
<F8> Erase SOURCE: will erase the file or files specified in the SOURCE
field of The Confidant's main menu.
<F9> Help: provides a brief explanation of The Confidant's functions.
<F10> End: will stop The Confidant at any time and return you to the place
at which you you gave the last command.
EDITING KEYS
Name of Key Purpose
~~~~ ~~ ~~~ ~~~~~~~
Backspace Move backward one space
Left arrow
Right arrow Move forward one space
Return Move to next box, using a downward
rotation. while entering text from
the CONSOLE, send the line to the
computer for encrypting.
Down arrow Move to next box, using a downward
rotation. Does not work when entering
text from the CONSOLE
Up arrow Move to next box, using an upward
rotation. Does not work when entering
text from the CONSOLE
Home Move to the top (SOURCE) box. While
entering text from the CONSOLE, move
to beginning of the line.
End Move to the bottom (DESTINATION) box.
While entering text from the CONSOLE,
move to beginning of the line.
Ins Toggle between insert and type-over modes
Del Delete the character above the cursor
SHIFT PrtSc Print a copy of the screen on the printer.
Ctrl-Num Lock Stop scrolling of screen temporarily
* * * * * *
* *************** * *************** *
* * * * * *
* *
* THE CONFIDANT (tm) *
* REFERENCE *
* *
* * * * * *
* *************** * *************** *
* * * * * *
Copyright (C) 1983, 1984 by Data Sage
Yale Station 2902
New Haven, CT 06520
CONTENTS
How to Use the Reference ........................ R-1
Copy ............................................ R-2
DES Decipher .................................... R-3
DES Encipher .................................... R-4
The DESTINATION ................................. R-6
Directory ....................................... R-8
End ............................................. R-9
Erase SOURCE .................................... R-10
Flip ............................................ R-11
HELP ............................................ R-12
Hide ............................................ R-13
The Keyboard .................................... R-14
Maintaining Security ............................ R-16
The PASSWORD .................................... R-17
Privacy ......................................... R-19
PROBLEM Reports ................................. R-21
The SOURCE ...................................... R-23
Index to the Reference ......................... R-25
HOW TO USE THE REFERENCE
The REFERENCE for The Confidant is meant to provide all
the essential information about each of the The Confidant's
features. It provides somewhat more detail than the
TUTORIAL.
The REFERENCE is organized alphabetically by topic.
To find all the information about Password, for example,
look in the Table of Contents or the Index for the page
number, or thumb through the pages until you come to the
"P's ."
Most of the topics are organized into three main
sections:
* Purpose
* How to Use
* Explanation
The Purpose and How to Use sections describe briefly
what you need to know to make The Confidant work. The
Explanation section provides quite a bit of detail about the
design and use of The Confidant.
COPY
Purpose
The Copy key, <F4>, causes the text in the SOURCE to be
copied to the DESTINATION.
How to Use
Type the file or device names for the SOURCE and the
DESTINATION in the appropriate fields. A PASSWORD is not
needed. Then press the <F4> key. You may stop copying at
any time by pressing the END (<F10>) key.
Explanation
The Copy key will copy any file, including executable,
encrypted, or other files that no longer contain ASCII text.
It will not copy FROM the PRINTER or SERIAL port, but it
will copy TO them. It will also copy TO and FROM the
CONSOLE.
Although Copy is useful for copying text from one file
to another, or from a file to the printer, its main purpose
in The Confidant is for viewing text that has just been
encrypted to make sure it looks encrypted. It is also used
quite often for looking through files in order to find a
specific one that requires encrypting. When used for
viewing text, the DESTINATION is usually left as the CONSOLE.
If you Copy from the CONSOLE to the parallel PRINTER or
a SERIAL printer, you may want to set the printer for AUTO
LINEFEED because The Confidant does not send linefeed
characters at the end of lines to tell the printer to
advance a line unless those characters are in the file
itself.
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-2]
DES DECIPHER
Purpose
The DES Decipher key, <F2>, causes the text in the
SOURCE to be decrypted using the Data Encryption Standard
(DES) algorithm. It places the decrypted text in the
DESTINATION. The decryption is based on the PASSWORD
supplied.
How to Use
Type the file or device names for the SOURCE and the
DESTINATION in the appropriate fields. Type in your
PASSWORD. Then press the <F2> key. You may stop decryption
at any time by pressing the End (<F10>) key.
Explanation
The DES Decipher function is the opposite (inverse) of
the DES Encipher function. (Theoretically, you could first
Encipher using the Decipher function and then Decipher using
the Encipher function, instead of the other way around. For
the most part, Decipher just encrypts "backwards." However,
The Confidant is not intended to be used in this way, and
may not work correctly if you do so.)
For more information about the DES algorithm used by
The Confidant, please see the reference section for DES
Encipher.
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-3]
DES ENCIPHER
Purpose
The DES Encipher key, <F1>, causes the text in the
SOURCE to be encrypted, using the Data Encryption Standard
(DES) algorithm. It places the encrypted text in the
DESTINATION. The encryption is based on the PASSWORD
supplied.
How to Use
Type the file or device names for the SOURCE and the
DESTINATION in the appropriate fields. Type in your
PASSWORD. Then press the <F1> key. You may stop encryption
at any time by pressing the End (<F10>) key.
Explanation
The Data Encryption Standard is an "algorithm," a
procedure or set of rules, for encoding data. It was
originally developed at IBM, and then was approved by the
United States Government for use by government agencies. It
is the only procedure approved for routine government agency
use. It is also used by many banks for transferring funds,
and by many businesses for protecting privacy as well as
proprietary information. As far as is known, no one has
succeeded in "cracking" or deciphering text encrypted with
the DES. (It may be theoretically possible to do so,
however, at very great expense.)
As with most things in electronics, it is possible to
implement the DES algorithm using either hardware or
software. Hardware is much faster, and the government
standard calls for its agencies to use only hardware
implementations. Software, on the other hand, is usually
less expensive. It also does not require alterations to
your computer system. It is adequate for many tasks, such
as the encoding of reports or data before they leave a
company's office, and the encoding of personal data. The
Confidant is a software implementation.
The DES works by combining eight characters of data
with eight characters of password at a time. In most
computers, each character of data is stored in a code called
American Standard Code for Information Interchange (ASCII,
pronounced: AS-key). A character is stored in the
computer's memory. The space to store it (called a byte) is
made up of eight 1's or 0's (called bits).
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-4]
The DES uses rules to mix up the bits in a block of
eight bytes (sixty-four bits), combine them with the bits in
the password, and then mix them up some more. The
mathematical rules used make the results of these mixings
and combinations virtually impossible to unravel without the
password used to do them in the first place. For this
reason, the password is the most important part of the
encryption. If someone knows the password, he or she can
decrypt the text. If someone forgets a password, the text
can, essentially, never be decrypted.
The DES makes it hard for anyone to tamper with data so
encrypted. If even a single bit in the password or the data
is changed, the encrypted text in the block in which the
change occurs cannot be decrypted.
For more information about the DES algorithm, you can
purchase a copy of the Data Encryption Standard from:
The National Technical Information Service
U.S. Department of Commerce
Springfield, VA 22161
Ask for:
Data Encryption Standard
Federal Information Processing Standards Publication 46
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-5]
The DESTINATION
Purpose
The DESTINATION tells The Confidant where it is to send
the text it has processed.
How to Use
If you want want to send text to the CONSOLE, leave the
word CONSOLE in the DESTINATION field. Otherwise, highlight
the field by moving to it with the special cursor editing
keys. (See the Keyboard section for more information about
cursor keys.) Then type over the word CONSOLE with the name
of a file or with the words PRINTER (for parallel printer)
or SERIAL (for serial printer or modem).
Explanation
The DESTINATION may be the CONSOLE, a file, the
(parallel) PRINTER or SERIAL (printer).
If you choose the CONSOLE as the DESTINATION, a box
labeled "Destination" will appear when you select one of the
encryption options (<F1> - <F4>). The text will show up in
the box as it is being processed. If you want to halt the
text temporarily, to look at it, press the <Ctrl> and <Num
Lock> keys simultaneously. To restart processing, press any
key.
If you decide to use a file as the DESTINATION, type a
filename in the DESTINATION field on the main menu.
Filenames follow standard DOS conventions. The disk drive
where The Confidant is to look for the text may be any legal
drive name (A, B, ...) on your system, followed by a colon.
You must provide a file name that is from one to eight
characters long. An optional extension is preceded by a
period, and may be zero to three characters long, using the
same characters that are allowed for the filename. Paths
for DOS 2.0 are not supported. If you are using DOS 2.0
with subdirectories, be sure to set the PATH before using
The Confidant. (See the DOS reference manual for further
information on filenames.)
Remember that The Confidant will assume you know what
you are doing when you give it a DESTINATION filename. If a
file already exists with that name, it will write over it
without asking. If you don't know whether a file exists,
use the Directory <F7> key to get a list of your files.
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-6]
If you select the PRINTER, be sure it is attached and
ready. Otherwise, the computer will stop processing.
If you select the SERIAL port, you must make sure you
have set it up properly before using The Confidant. To do
so, use the DOS MODE command to set the characteristics of
COM1. For example, if you are using a DIABLO or a NEC
Spinwriter at 300 baud (30 characters per second), you would
issue the following command before using The Confidant.
MODE COM1:300,N,8,1,P
(See the DOS reference manual for further information on the
MODE command.)
You may also send output to a modem through the SERIAL
port. But since The Confidant has no telecommunications
features, it is probably wisest in most cases to encrypt a
file to disk first, and then use a telecommunications
package to send it to another computer. When using such a
package to send an encrypted file, treat the encrypted text
as "object code" that has special characters in it. Some
programs have an option especially for object code. If you
cannot ship object files, you probably won't be able to ship
encrypted files successfully.
On occasion, you may want to view Enciphered text,
either to verify that a file has indeed been encrypted, or
just out of curiosity. For viewing text you are better off
to use the CONSOLE as the DESTINATION, or to use your
system's text editor, than to send the encrypted text to a
printer. The encrypted text usually contains characters
that will make the printer behave unpredictably.
While The Confidant processes your text, it
continuously displays the number of eight-character blocks
it has processed. When used for DES encryption, it must use
blocks this size, so if your text does not have eight
characters in the final block, The Confidant will add its
own characters. Therefore, the size of a DESTINATION file
will sometimes differ from that of a SOURCE file. This size
disparity is nothing to worry about, since The Confidant
knows these characters are its own, and it will remove them
when you Decipher the file.
To end processing at any time, remember you can press
the End <F10> key.
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-7]
DIRECTORY
Purpose
The Directory key, <F7>, will display a directory
listing of all files that match those specified in the
SOURCE field of The Confidant's main menu.
How to Use
Type a file name in the SOURCE field of the main menu.
Press the <F7> key. A listing of any files matching the
file description you gave in the SOURCE field will appear on
the screen.
Explanation
When you cannot remember the name of a file you want to
encrypt or decrypt, the directory listing will help you find
it. It is a good idea to make sure that no file exists with
the name you use as the DESTINATION, unless you want to
write over it. The Confidant assumes you want to write over
files, rather than proliferate copies by backing them up.
The file description you type in the SOURCE field
follows the standard DOS rules for file descriptions. That
is, a description consists of a disk drive, a file name, and
a file extension. The wild card characters, '*' and '?',
may be used to specify ambiguous references. Under DOS 2.0,
pathnames are NOT provided for. It is a good idea to set
your subdirectories before using The Confidant. (For more
information, see your DOS manual.)
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-8]
END
Purpose
The End key, <F10>, will stop The Confidant at any time
and return you to the place at which you you gave the last
command. By pressing the End key from one to four times,
depending on what The Confidant is doing, you can end The
Confidant completely and return to the operating system.
How to Use
Press the <F10> key. Press it up to four times, if
necessary, to return to the operating system.
Explanation
Whenever you want to end what The Confidant is doing,
press the End key. Pressing the End key four times in
succession will assure that the program returns you to the
operating system quickly.
If you are writing text to a file or printer, The
Confidant will finish the line you are on before quitting.
If you want faster response, press the End key again quickly
to interrupt it.
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-9]
ERASE SOURCE
Purpose
The Erase SOURCE key, <F8>, will erase the file or
files specified in the SOURCE field of The Confidant's main
menu.
How to Use
Type a file name in the SOURCE field of the main menu.
Press the <F8> key. A message will appear showing the file
description you gave in the SOURCE field. The message will
ask you to press <F8> one more time if you still want to
delete the file or files specified. If you do NOT want to
erase the files, press any other key.
Explanation
The Erase SOURCE function allows you to delete files of
plain text or cipher text that you no longer want to store
on disk. You may use it to get rid of plain text you don't
want others to see. You may also use it to erase files you
don't need anymore in order to make more room on a diskette
before using the encryption and decryption functions.
The file description you type in the SOURCE field
follows the standard DOS rules for file descriptions. That
is, a description consists of a disk drive, a file name, and
a file extension. The wild card characters '*' and '?' may
be used to specify ambiguous references. Under DOS 2.0
pathnames are not provided. It is a good idea to set your
subdirectories before using The Confidant. (For more
information, see your DOS manual.)
* * * W A R N I N G * * *
Erasing a file does NOT mean the information it holds
is gone forever. The operating system simply marks the
directory entry that it uses to find the file with a special
character. This character is a message to itself that the
file has been erased. The data still remain on diskette,
and a sophisticated computer user can still retrieve the
file. Devices evidently exist for reading information that
has been overwritten as many as a half-dozen or more times.
So if your data are likely to be the target of intense
effort by cryptographers, destroy any plaintext copies by
burning or mutilating the diskettes that hold them.
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-10]
FLIP
Purpose
The Flip key, <F5>, exchanges the names in the SOURCE
and DESTINATION fields.
How to Use
Press the <F5> key.
Explanation
Frequently, you will use the CONSOLE to enter text that
will be encrypted and then written into a disk file.
Afterward, you will probably want to examine the encryption
by either Copying or Deciphering the text in the file back
to the CONSOLE. In that way you can verify that the
encryption was successful. There are other occasions, too,
when at least one of the two fields needs to be switched.
This process occurs often enough to justify simplifying
it. Without the Flip key, it would be necessary to highlight
the SOURCE and DESTINATION boxes separately and type the
file name and CONSOLE designations into them. The Flip key
reduces the effort involved to a single keystroke.
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-11]
HELP
Purpose
The HELP key, <F9>, provides a brief explanation of the
functions provided by The Confidant.
How to Use
Press the <F9> key. Then select the topic you want to
know more about and press the corresponding function key to
view information about it.
Explanation
The HELP files are meant to do two things:
* Provide a quick introduction to The Confidant so
that you can get started with it right away.
* Refresh your memory about a particular function
if you haven't used it in a long time.
The HELP files are NOT intended to replace the Users
Guide.
For some users, the HELP files will provide sufficient
information about The Confidant and how to use it that they
will only read the Users Guide when a question comes up.
But most users will benefit from the additional information
in the manual.
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-12]
HIDE
Purpose
The Hide key, <F6>, hides the information in the
PASSWORD, SOURCE and DESTINATION fields, in order to protect
it from discovery by unauthorized persons who may be present
during encryption or decryption.
How to Use
Press the <F6> key. Press it again to re-display the
information in the fields.
Explanation
Normally, you will want to see the file names and the
password when you provide them to The Confidant. That way,
you can be certain that you have typed the correct
information.
However, when persons who are not authorized to encrypt
or decrypt a protected text are present it is important to
protect the password as well as the names of the files
involved. The Hide key allows you to use The Confidant
without revealing this information.
You should HIDE your password and file names whenever
someone is present who is unauthorized, and whenever there
is a chance that such a person will arrive during the
encryption process.
When you enter Hide mode by pressing the <F6> key, the
cursor size increases. When you exit Hide mode by pressing
the <F6> key again, the cursor returns again to its normal
size.
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-13]
THE KEYBOARD
This section describes the use of special keys on the
keyboard with The Confidant. Any keys not listed perform as
regular "typewriter" keys where appropriate, or do nothing
at all.
Editing Keys
The special editing keys on the keyboard have the
following functions. Note that some keys do something
slightly different while entering text from the CONSOLE than
they do at the main menu.
Name of Key Purpose
~~~~ ~~ ~~~ ~~~~~~~
Backspace Move backward one space
Left arrow
Right arrow Move forward one space
Enter Move to next box, using
a downward rotation. While
entering text from the
CONSOLE, send the line to the
computer for encrypting, then
move to the beginning of a
new blank line.
Down arrow Move to next box, using
Pg Dn a downward rotation. Does
Tab not work when entering plain
text from the CONSOLE
Up arrow Move to next box, using
Pg Up an upward rotation. Does
SHIFT Tab not work when entering plain
text from the CONSOLE
Home Move to the top (SOURCE)
box. While entering text
from the CONSOLE, move to
beginning of the line.
End Move to the bottom
(DESTINATION) box. While
entering text from the
CONSOLE, move to beginning
of the line.
Ins Toggle between insert and
type-over modes. Cursor size
increases slightly.
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-14]
Name of Key Purpose
~~~~ ~~ ~~~ ~~~~~~~
Del Delete the character above
the cursor
SHIFT PrtSc Print a copy of the screen
on the printer
Ctrl-Num Lock Stop scrolling of screen
temporarily
Function Keys
The function keys on the keyboard have the following
functions:
Name of Key Purpose
~~~~ ~~ ~~~ ~~~~~~~
F1 Begin DES Encipher
F2 Begin DES Decipher
F3 Begin Privacy encryption
or decryption
F4 Copy the SOURCE to the
DESTINATION
F5 Flip the SOURCE and
DESTINATION
F6 Hide the SOURCE,
DESTINATION, and PASSWORD
F7 Display a Directory of
files as specified
in the SOURCE field
F8 Erase the file(s) listed
in the SOURCE field
F9 Display HELP files
F10 End the current process
and return to the previous
one
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-15]
MAINTAINING SECURITY
Here are a couple of rules for assuring that encrypted
text remains safe and secure.
1. Don't leave plain text versions of an encrypted
text in unsecure places. There are three kinds of plain
text versions:
* Paper, microfiche, or other "hard" copies of a text.
It is easy to leave a copy of a text on your desk, in your
files, in the wastebasket, at the printer's, in the mail
room at your office, between other papers in a folder or
briefcase. Be scrupulously certain that no unencrypted
hardcopies exist where unauthorized persons may find them.
* Plain text versions on disk, that you have not
erased. These are easy for people to find, use, and even
change.
* Plain text versions on disk that HAVE been erased.
When the computer erases a file, it doesn't really erase it.
It just places a special mark in front of the file's name in
the directory. Then, if space on the disk is needed later
on, the computer will write over the top of the "erased"
text. But a skilled programmer could "unerase" the file,
just by changing the mark in front of its name. It's that
easy. Also, devices evidently exist for reading text that
has been overwritten a half-dozen times or more. Destroy
diskettes that have plain text versions of extremely
sensitive data, or lock them up securely.
2. Guard your PASSWORD. Do not leave copies of the
PASSWORD lying around, even "hidden" copies such as those
made by the indentation of a pen on the second sheets of a
pad of paper. Retain the PASSWORD in your head, or lock it
in a safe place. Share the PASSWORD only with those who
absolutely NEED to know it.
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-16]
The PASSWORD
Purpose
The Confidant combines the PASSWORD mathematically with
the text in the SOURCE to create encrypted or decrypted
text.
How to Use
Highlight the PASSWORD field by moving to it with the
special cursor editing keys (see The Keyboard section for
more information about cursor keys). Then type in a
PASSWORD that you create. The PASSWORD may consist of any
characters you can generate from the keyboard, including
"control" characters, except for the special editing keys.
Explanation
Among encryption professionals the PASSWORD is often
called the KEY. The word "key" emphasizes the central
importance of the PASSWORD to the security of an encrypted
text. Without the PASSWORD, experts assert, no current
computer can decode a text encrypted with the Data
Encryption Standard (DES) algorithm.
No default password comes with The Confidant. You must
create and take care of your own. The PASSWORD should be as
close to sixteen characters long as possible. The longer
your PASSWORD, the more secure it is. It may contain
spaces, control characters, or any other characters you can
enter from the keyboard, including those available with the
ALT key. However, The Confidant ignores leading blanks.
Also, The Confidant does not distinguish between upper and
lower case.
Examples of PASSWORDS are:
FINNISH MAY DAY
|||\\\---+++))))
0123456789ABCDEF
a!b@c#d$ Pretty
Some people may find it important to know that a
PASSWORD with a fairly "random" bit pattern is more secure
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-17]
than otherwise. For this reason, The Confidant extracts the
second, fourth, sixth, and remaining even bits from the
PASSWORD, and compresses them in reverse order into a new
password that it uses internally for the DES. Therefore,
text that has been encrypted using The Confidant could not
be decrypted using the same PASSWORD with any other software
or hardware implementation of the Data Encryption Standard.
If you forget your PASSWORD or PASSWORDs, you are in
the same situation as anyone else who wants to decrypt your
text -- out of luck. So take precautions to remember your
PASSWORD. Avoid "obvious" PASSWORDs, however, such as names
or birthdates of family members and other close friends or
associates, personal characteristics or hobbies you are
known for, and license plate and social security numbers.
Anyone who knows you very well will try these first. If you
become worried that a PASSWORD has become compromised, you
should re-encrypt the data with a different one.
In a situation where more than one person needs to know
a PASSWORD, it is essential to maintain high security. If
the PASSWORD is written anywhere, it should be kept under
lock and key. If a PASSWORD is used for several texts, or
for all texts within a certain time period by a group of
users, the PASSWORD should be changed at random intervals to
limit the likelihood that unauthorized users will obtain it,
or having obtained it will be able to use it for several
texts.
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-18]
PRIVACY
Purpose
The Privacy key, <F3>, causes the text in the SOURCE to
be encrypted (or decrypted), using a special algorithm that
is much faster than the Data Encryption Standard (DES),
though not as secure. It places the encrypted (or
decrypted) text in the DESTINATION. The encryption is based
on the PASSWORD supplied.
How to Use
Type the file or device names for the SOURCE and the
DESTINATION in the appropriate fields. Type in your
PASSWORD. Then press the <F3> key. You may stop
encryption/decryption at any time by pressing the End
(<F10>) key.
Explanation
If a file has been previously encrypted with the
PASSWORD you supply, it will be decrypted when you use
Privacy. Otherwise, it will be encrypted. This is because
Privacy uses a procedure that reverses itself each time it
is used on the same text with the same password.
For much encryption, it is not necessary that no one
ever reads the text that was encrypted. Rather, it is
desirable to keep the text from being read for a certain
amount of time. Or it is desirable to keep merely curious
people from looking at the text, yet it is not worth the
time and effort to make the text impossible to decode.
Privacy is good for this kind of protection. It is much
like the locks on most people's houses. A determined
burglar could break in, but most people who don't have a key
won't get in.
A text encrypted with the Privacy algorithm is
difficult to decode. For most people it will be impossible,
because they don't know how. A trained cryptographer,
however, has a toolkit of statistical procedures that may
allow him to break it, probably overnight. For most things,
Privacy will be perfectly adequate, and much faster, than
the DES algorithm. But YOU must decide which is better in a
given circumstance.
One interesting use of Privacy is a process called
"superencipherment", or double coding. You first code data
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-19]
with the DES algorithm. Then you code it again with
Privacy. (You can also use DES twice or Privacy twice, of
course.) This makes for even safer text, though in the case
of DES it is probably unnecessary. If you use
superencipherment, remember to decode by applying the
procedures in reverse order. That is, if you used DES
first, then Privacy to encrypt, you must use Privacy first,
then DES to decrypt.
The algorithm, or procedure, which Privacy uses is
deliberately not presented here, as knowledge of the
algorithm might make it easier to "crack."
The use of ASCII NUL characters at the beginning of a
plaintext file should be avoided. Use the <space bar>
rather than the right arrow key when you want to leave
blanks at the beginning of a file.
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-20]
PROBLEM REPORTS
As the old saying goes, "there are two kinds of
troubles in this world: those you've gotta worry about and
those you don't." The Confidant has two kinds of problems
too: EASY ones and HARD ones. (Some programs call problems
"errors," but The Confidant simply sees its troubles as
problems that need to be overcome.)
The Confidant will give you a message when it can
detect a problem and figure out what went wrong (EASY
problem). For certain hardware problems, however, it gives
up and returns you temporarily to the operating system (HARD
problem). This section describes what to do in either case
to fix the problem and continue with the task at hand.
EASY Problems
Whenever The Confidant confronts a problem that it can
identify, it clears the screen and gives you a PROBLEM
Report. Then it will wait until you press a key before it
returns to a point at which you can correct the problem.
Here is a list of the problems, along with suggestions about
how to cope with them.
Report: The PASSWORD is missing.
Solution: The program cannot find a password in the
PASSWORD field. You should type in a password and then try
again. Remember, the first character cannot be a space.
Report: The SOURCE file cannot be used. Please check it.
Solution: The program probably could not find a file on the
disk with the name you typed into the SOURCE field. You
should check what you typed to make sure it is correct. If
it looks alright, use the <F7> Directory key to make sure
the file is on your disk. If you are using DOS 2.0, be sure
the file is in the current subdirectory.
Report: The DESTINATION file cannot be used. Please check
it.
Solution: The program could not create a file with the name
you gave it. You should check to make sure you entered a
valid DOS filename.
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-21]
Report: The file 'CONFIDE.HLP' is not on the default drive.
Solution: When you asked for HELP by pressing <F9>, The
Confidant could not find the file that contains the help
information. Make sure the file CONFIDE.HLP is on the disk
in your logged drive. If you are using DOS 2.0, be sure
the file is also in the current subdirectory.
Report: The file(s) you want to erase is/are not there.
Solution: The program probably could not find a file on the
disk with the name you typed into the SOURCE field. You
should check what you typed to make sure it is correct. If
it looks alright, use the <F7> Directory key to make sure
the file is on your disk. If you are using DOS 2.0, be sure
the file is in the current subdirectory.
HARD Problems
The list of hardware problems that The Confidant does
not know how to handle includes the following:
* A disk is full.
* A disk is write-protected.
* A disk has gone bad.
* A drive is not ready.
* A device is not available.
When The Confidant encounters such an error, which is
very seldom, it will return you temporarily to DOS. You
will see this message on the screen:
Abort, Retry, Ignore?
You should fix the problem before answering this question.
Usually, fixing the error means replacing the disk you are
using with a new, formatted disk.
When you have corrected the problem, press the <R> key
(for Retry). Then The Confidant will continue. If you
press the Abort key, you will return to the operating system
permanently. If you choose Ignore instead, you will get the
same problem report as before.
If problems occur other than those mentioned here,
please let Data Sage know. We would like to fix them.
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-22]
The SOURCE
Purpose
The SOURCE tells The Confidant where it is to take its
text FROM for processing.
How to Use
If you wish to enter text from the CONSOLE, leave the
word CONSOLE in the SOURCE field. Otherwise, highlight the
field by moving to it with the special cursor editing keys.
(See The Keyboard section for more information about cursor
keys.) Then type over the word CONSOLE with the name of a
file containing the text that you want to encrypt, decrypt,
or Copy.
Explanation
The SOURCE may be the CONSOLE, or a file that contains
either plain text or cipher text.
If you decide to use a file as the SOURCE, type a
filename in the SOURCE field on the main menu. Filenames
follow standard DOS conventions. The disk drive where The
Confidant is to look for the text may be any legal drive
name (A, B, ...) on your system, followed by a colon. You
must provide a file name that is from one to eight
characters long. An optional extension is preceded by a
period, and may be zero to three characters long, using the
same characters that are allowed for the filename. Paths for
DOS 2.0 are not implemented. If you are using DOS 2.0 with
subdirectories, be sure to set the PATH before using The
Confidant. (See the DOS reference manual for further
information on filenames.)
If you choose the CONSOLE as the SOURCE, a box labeled
"Source" will appear when you select one of the encryption
options (<F1> - <F4>). You type your text in the box. At
the end of each line you must press the <RETURN> key to tell
The Confidant that you are finished with the line so it can
process it.
Any time before pressing the <RETURN> key you can edit
the line using the editing keys described in The Keyboard
section. You can backspace, delete characters, replace
characters by typing over them, insert characters in the
middle of the line, and so forth. If while in insert mode
you push characters beyond the end of the line, which has a
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-23]
maximum length of 77 characters, the characters will be
lost. You don't need to be at the end of the line to press
<RETURN>; if you are editing in the middle of the line and
want to process the text you may press it then.
To end text entry from the CONSOLE, press the End <F10>
key.
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-24]
INDEX to the Reference
A
ASCII (code), 4
B
Bits, 4, 5
Block, 5
display of number being processed, 7
added characters in final block under DES, 7
Byte, 4
C
Case, upper not distinguished from lower in PASSWORD, 17
CONSOLE as DESTINATION, 6, 11
as SOURCE, 23
copying to and from, 2
used to view files, 7
Copy key, <F4>, 2
Copying, 2
executable or encrypted files, 2
to a printer, 2
Cursor, moving the, 14
size indicates Hide and Insert modes, 13, 14
D
Data Encryption Standard (DES) procedure, 3, 4f
hardware vs. software implementations, 4
Deleting text or characters, 14
DES Encipher key, <F1>, 4
DES Decipher key, <F2>, 3
use for encryption, 3
DESTINATION, 6f
file size larger than SOURCE size, 7
file unusable, 21
hiding the, 13
of copied text, 2
of decrypted (plain) text, 3, 11, 19
of encrypted (cipher) text, 4, 19
Directory key, <F7>, 8
used to avoid overwriting files, 6, 8
Disk errors, 22
Double coding, 19f
E
Editing keys, 14f
Encrypted text, viewing, 7
End key, <F10>, 7, 9
Enter key, when processing text from CONSOLE, 22
Erase SOURCE key, <F8>, 10
Erasing files on diskette not adequate security, 10
Errors, 21f
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-25]
F
File(s) as DESTINATION, 6
as SOURCE, 10, 23
description, 8, 10, 23
directory, 8
missing, 21f
overwriting, 6, 8
size variation using DES procedure, 7
Flip key, <F5>, 11
Function keys, summary, 15
H
Halting text processing temporarily, 6
HELP key, <F9>, 12
Hide key, <F6>, 13
Highlighting fields on the main display, 6, 14, 17
I
Inserting text or characters, 14
K
Key, 17
Keyboard, 14
L
Line length when entering text from CONSOLE, 22
M
Main display (menu, form), 8, 13
printing, 15
Modem, output to using SERIAL port, 7
O
Object code, treating transmitted encrypted text as, 7
Operating system, returning to, 9
P
PASSWORD, 17
automatic conversion to internal password, 18
choosing a good, 18
combined with block of text in DES procedure, 5, 17
compromised, 18
for DES Decipher, 3
for DES Encipher, 4
for Privacy procedure, 19
hiding the, 13
length, 17
missing, 21
not needed for copying, 2
permissible characters in, 17
security of, 13, 16, 18
Pathnames under DOS 2.0, 8, 10, 23
PRINTER option requires ready printer, 7
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-26]
Printer, 6
erratic behavior when printing encrypted text, 7
halting output, 9
parallel, as DESTINATION, 6
serial, 6
used to print screen display, 15
Privacy encryption procedure, 19f
Privacy key, <F3>, 19
Problems, 21f
easy, 21
hard, 22
S
Scrolling, halting, 6, 15
Security, 16f, 18
of "erased" files on diskette, 10, 16
of PASSWORD, 13, 16, 18
of Privacy procedure compared to DES, 19
of unencrypted files, 16
proportional to length of PASSWORD, 17
SERIAL port as DESTINATION, 6
set up before using The Confidant, 7
SOURCE, 23f
editing the field, 23
file unusable, 21
hiding the, 13
line length of, during encryption of CONSOLE text, 22
of copied text, 2
of encrypted (cipher) text, 3, 11
of unencrypted (plain) text, 4
Superencipherment, 19f
T
Telecommunications software to send text, 7
V
Verifying encryption, 11
Viewing files, using Copy, 2
using CONSOLE as DESTINATION, 7, 11
W
Wildcard characters in file descriptions, 8, 10
[The Confidant Reference (C) 1983, 1984 Data Sage - page R-27]
* * * * * *
* *************** * *************** *
* * * * * *
* *
* THE CONFIDANT (tm) *
* TUTORIAL *
* *
* * * * * *
* *************** * *************** *
* * * * * *
Copyright (C) 1983, 1984 by Data Sage
Yale Station 2902
New Haven, CT 06520
CONTENTS
The Confidant and the Secret Formula ........... T-1
What is There to Protect? ..................... T-1
Encryption Vs. Passwords ...................... T-2
What is Encryption? ........................... T-3
A Little Background ........................... T-3
Copying the Master Diskette ................... T-4
Using The Confidant ........................... T-7
Getting HELP .................................. T-7
The SOURCE .................................... T-9
The DESTINATION ............................... T-9
Choosing a PASSWORD ........................... T-10
Hiding the PASSWORD ........................... T-11
Starting Encryption ........................... T-11
Fixing Mistakes ............................... T-14
"Flipping" SOURCE and DESTINATION ............. T-15
Copying ....................................... T-15
Privacy ....................................... T-18
Directory and Erase SOURCE ...................... T-19
Using The Confidant to Transmit Data Over the
Telephone .................................. T-19
Index to the Tutorial .......................... T-25
THE CONFIDANT AND THE SECRET FORMULA
A Tutorial on How to Use
The Confidant
Anne Lambert pressed the intercom button on her
desk.
As Vice President of Finance for the small Icey
Beverage Company, she faced more than the usual number
of problems. The one that worried her now was the
security of the data on her firm's new microcomputers.
It was hardly a major problem, but she sensed that it
had the potential for becoming one. And she knew
better than to let it.
"See if you can get David Lyons, the computer
consultant, will you?" she said to her secretary over
the intercom.
What is There to Protect?
While she waited for the call to go through, Anne
considered what she wanted to protect and why.
First, there were the payroll records. A curious
employee might look at the records of others. If he
spread word of what he found, the morale of other
employees could suffer.
Next, there were management reports, and
projections produced by her office. If someone got
hold of a prerelease copy of the firm's quarterly
report, for instance, they could use that information
to manipulate sales of the company's stock.
And there were Icey's plans for a new soft drink
marketing strategy. How valuable those would be to a
competitor! And how easy to convince an employee to
print off a copy from the computer after hours, or for
someone to intercept a copy when it was being
transmitted over the telephone to the Midwest office.
She wasn't the only one concerned, either.
Earlier today, Frank Vitale, the company's Director of
Personnel, had mentioned he would like to keep a
computerized record of the experimental alcoholism
treatment program his office was offering to a small
number of employees. But one of the enrollees had
balked when he brought it up. "I don't want anyone
else knowing I'm in the program," he told Frank. "If
you put my name in the computer, someone will find out
for sure."
During the same discussion, Aaron Abrams, the
marketing manager, mentioned a mailing list he was
preparing as part of a compaign to increase the number
of dealers selling the company's products. "I'd sure
hate it if our competition got hold of this," he said.
"They'd mess us up for sure." He was worried because a
similar list was stolen at the company he worked for
previously.
Getting access to the microcomputers was very
easy. Since the computers were located in different
offices in the building, physical security was low.
And some of the computers were connected by a local
area network, so that a user of one computer could look
at data on another computer without the user of the
other computer even knowing.
Encryption Vs. Passwords
Anne's thoughts were cut short by the buzz of the
intercom. "Mr. Lyons is on the line," said her
secretary.
"David," she said, when she picked up the
telephone, "a salesman was here last week, trying to
get us to buy a security system for our microcomputers.
I'm afraid I wasn't too impressed with what he was
offering, but the matter has been preying on my mind
ever since." She briefly outlined the concerns she had
just gone over in her head.
"What didn't you like about what the salesman was
offering you?" asked David, when she was finished.
"He was selling a password protection system, you
know, where every user has a password that he uses to
get onto the system. But we already have that kind of
protection with the local area network, and I thought
you said it was not very secure."
"That's right," answered the consultant. "The
passwords are kept in a file on the disk. A clever
employee or other user could find the password file
with a little work, and could then use any account he
wished. Passwords are useful. But they are seldom
totally secure."
"Maybe these computers aren't as useful as I
thought they were going to be," said Anne. "An awfully
lot of the information we want to use them for is
sensitive."
"I think I have a solution to the problem,"
answered David. "I suggest that you encrypt the data."
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-2]
What Is Encryption?
"Encrypt it? Isn't that what CIA agents and spies
do -- change text into a secret code or something?
"Yes, the same techniques can be used to protect
confidential data on a computer," David explained.
"All data in a computer are stored in special codes
made up of numbers. The usual code for microcomputers
is called ASCII, which stands for American Standard
Code for Information Interchange. ASCII is a code that
most programmers and computer designers and
manufacturers know. When you encrypt data, you change
the code. That way, no one knows it. The change in
code is based on a password that is combined
mathematically with the ASCII code to produce a new
code."
"That sounds complicated," replied Anne. "I need
something simple to use or no one will do it."
"It's actually quite straightforward," David
assured her. "The computer does all the work, and
it does it relatively fast. The only thing you do is
supply the password."
"Well, I am interested in knowing more," said
Anne. "Will you be able to show me?"
"Let's see," David said, scanning his appointment
book. "I could come Friday morning, about nine a.m.
It will take us about an hour."
"Fine," agreed Anne. "I'll see you then." As she
hung up the phone, she said aloud to herself,
"Encryption. That certainly sounds intriguing."
* * *
A Little Background
On Friday morning Anne Lambert met David Lyons
promptly at nine a.m. in her office. Each inquired
politely how the other was doing and then they got down
to business.
"I had my secretary pick up a couple of books and
articles on encryption at the university library," said
Anne, "and I've been reading something about it. I'm
afraid I don't understand it all, but it has a
fascinating history."
David sifted through the pile of literature on her
desk. There were titles like:
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-3]
Codes, Ciphers, and Computers, by Bruce Bosworth,
Hayden Publishing Co., 1982
"Privacy and Authentication: An Introduction to
Cryptography," by Whitfield Diffie and Martin E.
Hellman, from the Proceedings of the IEEE, 1979.
The Codebreakers by David Kahn, Macmillan Co., 1967.
Most were classics in the field of cryptology, or
modern articles about it. The last one was a good non-
technical introduction, but it was too old to cover
computer cryptography very well.
"For the most part, those are pretty technical,"
said David, who was thinking Anne's secretary had the
rare aptitude of a good reference librarian. "It's no
wonder they were difficult to follow. What did you
learn?"
"Well, that people have been using secret codes at
least since the Egyptian pharoahs. Also, that some
codes are easier to break than others. There are two
coding systems that are used a lot today, the Data
Encryption Standard and Public Key Encryption. They
are considered fairly safe. There are also other good
systems. Finally, I learned that encryption is not
just for espionage. Government and business use it to
protect privacy, and to ensure the security of
financial and other operations."
"All quite accurate," agreed David. "What do you
think about trying it out?"
"I'm willing," replied Anne. "At least I'd like
to see it work."
"I have a program here called The Confidant," said
David, pulling a diskette and manual from his
briefcase. "You can use it to encrypt your files, and
then use it to decrypt them back to their original
form."
Copying the Master Diskette
"The first thing we'll do," continued David, "is
make a copy of the master diskette, for everyday use.
That way, if something happens to the copy, we can
always make another one. If we don't make a copy, but
use the master, any damage to the master puts us out of
commission. And damage can happen pretty easily, as
someone who uses computers very much soon finds out."
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-4]
"I think I've heard that before. What causes
damage to diskettes?" asked Anne.
"Getting dust or finger prints on the diskette,
bending it, or setting a heavy object on top of it.
Sometimes when you walk across a carpet, static
electricity will zap it. Cigarette smoke getting on
the diskette is another danger. There are lots of ways
to destroy one."
"I know how to make a copy," said Anne. "First,
you take your DOS diskette and place it in drive A."
She opened the door of the drive and inserted the
diskette that contained the computer's operating system
software. "Then I place a new diskette in drive B."
David handed her a brand new diskette from a box
on her desk. She slid it into the right-hand drive,
then closed both drive doors. She typed
FORMAT B:/S <RETURN>
and watched while the computer formatted the new
diskette and wrote a copy of the system software on it.
At last the message
Format Another (Y/N)?
appeared on the screen. She pressed <N> to indicate
she was finished. She took the DOS diskette out of
drive A, and placed it in its sheath.
"Now I need the master diskette for The
Confidant," she said, taking it from David. She
inserted it in the A drive and closed the door. She
typed:
COPY A:*.* B: <RETURN>
The screen showed the message
confide.exe
confide.hlp
confide.cry
confide.inv
refcard.doc
tutorial.doc
descript.doc
refer.doc
type.me
9 file(s) copied
When the copying process finished she removed both
diskettes and put them in their envelopes.
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-5]
Meanwhile David had written a label saying:
The Confidant (tm)
Copyright 1983, 1984 by Data Sage
Copy
which he gave to Anne. She affixed it to the diskette
and also placed a silver write-protect tab over the
write-protect notch of the diskette.
"There," she smiled, placing the copy in the A
drive. "Now I'm curious to see how it works."
------------------------------------------------------------
DOING IT
Take time to make a copy of The Confidant on a
formatted diskette, if you haven't already done so. Be sure
to place the original copy in a safe place.
------------------------------------------------------------
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-6]
Using The Confidant
"Type CONFIDE and press the <RETURN> key,"
prompted David.
In response to Anne Lambert's command the screen
of the computer cleared and a "shareware" notice
appeared. As she read the notice, David commented,
"The company that wrote The Confidant distributes it
freely and asks anyone who uses it to contribute ten
dollars towards its support."
"That certainly sounds fair," said Anne. "I'll
see to it that we send the money right away." She
pressed the space bar and a form appeared.
David pointed to the screen. "The boxes on the
right are for telling the computer what you want to
encrypt or decrypt -- 'crypt' for short -- as well as
what you want to do with the text once it has been
processed. There is also a box for your PASSWORD,
which you make up. As I mentioned before, the computer
combines the password with your text to create a secret
code."
"What are these numbers at the bottom of the
screen?" asked Anne. "I suppose they refer to the
function keys on the keyboard." David nodded.
Getting HELP
Anne smiled a little self-consciously. "If at
first you don't know what to do, read the
instructions," she said. "It looks like pressing the
<F9> key will give me some help."
She pressed the <F9> key. Another form appeared on
the screen. This time, it was a list of topics for
which help was available. One by one, Anne pressed the
function keys that gave access to the topics, so that
after about five minutes she had read them all.
"That's a lot of stuff to keep in my head after
just one reading," she said. "But let's see if I
understand what I should do next."
She pressed the <F10> key that took her back to
the main form. The box meant for information about the
SOURCE of the text was highlighted, and the cursor
rested in the box. "I guess I tell it where the text
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-7]
is I want to encrypt," she said after studying the
screen for a moment.
------------------------------------------------------------
DOING IT
Load The Confidant into your computer and start it up
by typing CONFIDE <RETURN>. Then read through the HELP
files by pressing the <F9> key.
------------------------------------------------------------
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-8]
The SOURCE
"Yes. The first thing you must decide," said
David, "is what text you are going to process. The
Confidant can encrypt text, decrypt it, and even just
copy it from one file to another without making any
changes in it. You must tell it where to get the text
from and where you want it to go to. The SOURCE box is
the from part."
"I can either type the text in from the keyboard,
meaning the 'CONSOLE' as it says here, or else use text
that already exists in a file," said Anne.
"Exactly," said David. "Why don't you start by
entering from the keyboard. That will give you a
better 'feel' for the way the program works. Since the
program selects the CONSOLE by default, you just have
to press the <RETURN> key to move to the DESTINATION
field."
The DESTINATION
When Anne pressed the key, the SOURCE box turned
dark and the DESTINATION box lit up. "I assume the
same idea holds for the DESTINATION," said Anne.
"Yes," said David. "Except that you have more
options. You can send the text to a parallel or serial
printer as well as to a file or the console."
"It doesn't make sense to print encrypted text on
the printer," said Anne. "Who is going to read it?"
"Exactly," replied David. "The printer is usually
chosen as DESTINATION only when you are decrypting
text."
"I'd like to try the program out a little," said
Anne. "If I let the DESTINATION be the CONSOLE too,
will I be able to see what I am encrypting?"
"Yes," replied David. "Ordinarily, you would want
to save encrypted text in a disk file so you can get it
back again later. Most often you use the console as
the destination when you want to look at decrypted text
on the screen. But while you're getting used to The
Confidant it would be a good idea to see what encrypted
text looks like. An easy way to do that is by choosing
the CONSOLE as the DESTINATION."
Anne pressed the <RETURN> key, and the computer
highlighted the PASSWORD box. "You said the password
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-9]
is what makes the data secure," said Anne. "But you
also said that password protection systems are usually
not secure, at least on microcomputers. I'm a little
confused."
"What we normally mean when we say 'password
security system' is that a user must enter a password
before he or she can use the computer, or a certain
file on the computer. The data in the file are not
changed. The problem is, a list of passwords must be
kept by the computer, and very often that list is open
to inspection by skilled programmers. Even if someone
can't read the password list he can often get around
the software that is responsible for security. But
encryption changes the data in the file, so that even
if someone can look at the file he won't understand
what is in it."
Choosing a PASSWORD
"How do I decide what password to use?" asked
Anne.
"You have to make it up," said David. "But some
passwords are better than others."
Anne nodded for him to continue.
"Certain passwords are obvious to someone who
knows you very well. They include names and birthdates
of family members or close friends, personal
characteristics or hobbies for which you are known, and
license plate or social security numbers. A smart
person will try those first if he wants to decrypt your
text."
"I probably shouldn't use 'rootbeer' or 'soda
pop' then," said Anne, showing she understood.
"On the other hand," said David, "the password
must be something you will remember. Or else you must
write it down and keep it in a secure place. If you
forget your password, you are in the same situation as
anyone else who wants to decrypt your text -- out of
luck. By the way, the password doesn't have to be a
word; it can be a phrase, or nonsense, or a random
number. But you should try to make it as close to
sixteen characters long as you can, because longer
passwords are more secure."
Anne pondered a minute. Then she typed in the
words:
A PENNY SAVED
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-10]
"Does it matter whether it is capital or lower
case letters?" she asked. David shook his head no.
"What if I enter more than sixteen characters into
the PASSWORD box?" Anne persisted.
"Then the first fifteen characters of your
password will be the first fifteen characters you
entered, and the last character of your password will
be the last character you entered," answered David.
Hiding the PASSWORD
"Now here is a useful trick," he added. "See the
bottom of the screen, where it says:
F6 Hide
Press the <F6> key and watch what happens."
As Anne pressed the key, the SOURCE, DESTINATION,
and PASSWORD fields suddenly went blank.
"That key hides the password and file information,
so if someone else is looking over your shoulder they
cannot discover your password or the files you are
using. You can even press the Hide key before you
enter your password or the file names. Then the
characters you type won't appear on the screen, so that
no one can see them as you enter them."
Anne pressed the <F6> key again, and the
information reappeared in the boxes.
Starting Encryption
"Now, how do I get it to actually encrypt
something?" Anne asked. "I gather from the list of
function keys at the bottom of the screen that I just
press the <F1> key."
"That's right," David acknowledged.
Anne pressed the <F1> key. The form she had just
filled out disappeared and a new one was displayed on
the screen. It had two large rectangular boxes
stretching across the screen. The top box was labeled
"Source" and the bottom one "Destination."
"Now, just start typing something," said David.
Anne typed:
Benjamin Franklin became frugal after his brother
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-11]
The text appeared in the box labeled "Source."
After the word "brother" she pressed the <RETURN> key.
In the "Destination" box little chunks of nonsense text
started to appear. "My goodness, so that is what
encrypted text looks like," she exclaimed.
When the encrypted text stopped appearing she
typed in the second line:
made fun of him for spending money on a tin whistle.
Again, when she pressed <RETURN>, the encrypted
text appeared in the "Destination" box.
"I think I understand," Anne said. "I type my
text in English. The computer transforms it into
apparent nonsense and then prints it back out for me to
read."
"That's right," said David.
"What does it mean at the bottom of the screen
when it says 'Block being processed: 14 of ???'?"
"The computer encodes the data in chunks that are
eight characters long," explained David. "Each chunk
is called a block. The Confidant tells you how many
blocks it has processed so you will be aware at all
times of the status of the encryption."
"To stop, I just press the <F10> key, is that
right?" said Anne. She touched the key and a message
appeared at the bottom of the screen:
The Confidant finished...Press any key to return to
Main Menu.
Anne pressed the space bar, and the familiar form
where she entered her password returned.
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-12]
------------------------------------------------------------
DOING IT
Make up some text of your own and type it into The
Confidant so you can see how The Confidant works. Start by
making up a password -- Anne Lambert's password, A PENNY
SAVED, is useful if another one doesn't come to mind. Then
press <F1> and type your text into the "Source" box.
At the end of each line, remember to press the <RETURN>
key and wait until the line is processed before you resume
typing. If you want a sample of text to try out, here is
one about passwords, or "keys," from "Guidelines for
Implementing and Using the NBS Data Encryption Standard,"
Federal Information Processing Standards Publication 74,
available from the U.S. Government Printing Office.
KEY MANAGEMENT
Management of the cryptographic keys used to protect
data is of utmost importance to the security of the data...
A new key should be generated and used when any
event occurs that may have compromised the existing key. A
new key should also be generated and used periodically in
the event that an undetected compromise has occurred...
Unencrypted keys must always be physically protected
to prevent unauthorized individuals from gaining knowledge
of their values...
------------------------------------------------------------
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-13]
Fixing Mistakes
"The next thing is to try a file as the
DESTINATION," recommended David. "Move to the
DESTINATION box by pressing the <RETURN> key twice."
Anne did so. "Now I just type the name of my file
over the top of the word CONSOLE," she said.
"Right," agreed David. "As you recall, a file
description has three parts: the drive, the file name,
and the file extension."
"Yes," said Anne. "The drive is a single letter
followed by a colon. The file name is one to eight
characters. The extension is a period followed by one
to three characters. Only I don't have to use an
extension if I don't want to. And I only have to type
the drive name if I want to use a drive that is not the
'default' drive."
She typed in:
B:FIZLE.TXT
"Oh," she smiled. "That should be FIZZLE. Now
you can see why I would never make it as a secretary.
I can't type."
"A perfect opportunity to point out the use of
some other keys on the keyboard," responded David. "I
suggest you move your cursor beneath the Z in FIZLE and
then press the <INS> key on the keyboard. It will
switch you into "insert mode" so you can insert
characters into the text. All you need to do is type
in a second 'Z'."
"It works," said Anne as she did it. "Also, I
noticed that the cursor changed size when I pressed the
<INS> key."
"To let you know you are in insert mode. Press
<INS> again to switch back into regular mode."
She did. "What other keys have special functions?"
she asked.
"All the keys do what the labels on them say they
do," said David. "The <DEL> key deletes the character
at the cursor position, the <HOME> key takes you to the
start of your text or your form, and so forth."
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-14]
"Now that I have the right file name, I can try
encryption again," said Anne. "I'll use the same
password as before."
She pressed the <F1> key and the screen changed.
This time there was only one rectangular box, the one
marked "Source." Anne typed in:
Franklin won his way into American hearts <RETURN>
with his aphorisms in Poor Richard's Almanac. <RETURN>
When she pressed <RETURN> at the end of each line,
no text appeared at the bottom of the screen. But she
knew the program was working because it displayed the
block number it was processing. When the numbers
stopped incrementing, she pressed the <F10> key to end.
Then she pressed it again to return to the main menu.
"How do I know it encrypted my text?" Anne asked.
"Can I see it?"
"Flipping" SOURCE and DESTINATION
"Certainly," said David. "First, I'm going to
show you a nice little convenience called the 'Flip'
key. In order to see the file you just created, you
would normally have to type its name in the SOURCE box
and the word CONSOLE in the DESTINATION box. But the
flip key does that for you, by just switching the
SOURCE and the DESTINATION around!"
He reached in front of Anne and pressed the <F5>
key so she could see what he meant. The words in the
SOURCE and DESTINATION boxes did change places.
Copying
"Now," continued David, "press the Copy key, <F4>,
to look at what is in your file. The Copy key takes a
copy of whatever is in the SOURCE and puts it into the
DESTINATION. So it will take a copy of FIZZLE.TXT and
show it on the console so you can see it."
The screen cleared as Anne pressed the <F4> key.
The familiar screen with the rectangular boxes
returned, but with only the bottom box this time. In
that box, the same kind of nonsense appeared that she
had seen before. The line at the bottom of the screen
showed how many blocks had been copied. When the
program was finished, the prompt telling her how to get
back to the main menu appeared, so she pressed the
space bar and was back at the first form.
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-15]
"To get back my original text --" Anne began.
"By the way," David interrupted, "the original
text is called 'plain text' and the encrypted text is
called 'cipher text.'"
"To get back my plain text," continued Anne, "I
don't have to change anything on the screen now. I
just press the key marked DES Decipher and it will
decipher it?"
"That's right," agreed David, watching as she
pressed the <F2> key.
Again, the bottom rectangular box appeared, just
as when Anne used the copy function. But this time,
the text was plain text. No more nonsense.
When she got back to the main menu screen, Anne
pressed the <RETURN> key to highlight the DESTINATION
box. "This time, I'm going to decrypt the cipher text
into a file, so I can edit it with my word-processing
software," she declared.
She typed the file name:
FLAT.TXT
over the word CONSOLE, then pressed the <F2> key again,
to decrypt the cipher text in FIZZLE.TXT.
When the decryption finished, she left The
Confidant by pressing the <F10> key several times.
Then she used her word-processing software to look at
FLAT.TXT.
Satisfied that the text looked just as she
expected, she typed in some more sentences about
Franklin. She saved them and exited back to the
operating system.
"Now, I can encrypt this text," she said, typing
in the command CONFIDE and pressing the <RETURN> key.
"Yes," said David. "Just remember that a word-
processing program may insert some non-alphabetic
characters into your text file. When The Confidant
decrypts an encrypted version of such a text file onto
your console, the text may not look as it did when you
typed it in. To view it the way you typed it in, you
should decrypt the text to a file, then examine that
file using the same word-processing program you used to
create the original file."
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-16]
Anne entered the file name FLAT.TXT into the
SOURCE box. She left the DESTINATION box as it was with
the word CONSOLE, and used her old password again.
------------------------------------------------------------
DOING IT
Practice entering encrypted text into a file, then
"flipping" the SOURCE and DESTINATION and looking at it.
Look at it with both the COPY and the DECRYPT options.
Here is some text to try:
Active wiretapping means that someone intercepts your
message while you are transmitting it. He changes it
quickly, then sends it on. The receiver never suspects that
the message he receives from you is not the one you sent.
Encryption helps make active wiretapping almost impossible.
------------------------------------------------------------
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-17]
Privacy
"Are you going to try out the Privacy
function?" David inquired.
"I wanted to ask about that." said Anne. "What
does it do, anyway?"
"Try it," suggested David.
She pressed the <F3> key. The destination box
filled up rapidly with nonsensical cipher text.
"It looks the same as when I used the DES Encipher
key," exclaimed Anne. "Only it's considerably faster."
"Precisely," said David. "Most people would never
be able to tell that it was not produced by the DES
algorithm, which is an extremely safe way of encoding
data. A trained cryptologist would be able to tell the
difference, after several hours of study. And he
might be able to break the Privacy code. As far as I
know, he would not be able to break the DES code."
"So this is not as safe," said Anne.
"No," said David. "But it is still very safe.
The vast majority of people will never figure out what
it produces. It is useful for encoding data that don't
have to be kept extremely secret, but that you don't
want everyone to see. That is probably 98% of the
stuff you do. So you save time by using the PRIVACY
code when you don't need the extreme protection offered
by DES."
------------------------------------------------------------
DOING IT
Try out PRIVACY. Notice how much faster it is than the
DES option. An extra use of PRIVACY is for
superencipherment, or encrypting your data twice, making it
extra hard to decode.
Use PRIVACY to encrypt a file you have Enciphered with
DES. Then decrypt it, using first Privacy, then DES
Decipher. You must decrypt in the REVERSE order you
encrypted, or decryption won't work.
------------------------------------------------------------
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-18]
Directory and Erase SOURCE
"I noted there are function keys for 'Directory'
and 'Erase SOURCE'," said Anne. "What do those keys
do?"
"As you probably guessed," said David, "the <F7>
or Directory key lists the files you have, in case you
forget the name of a file or want to check what you
have done so far. It will find just the file whose
name is in the SOURCE box, or if the SOURCE box is
empty or has the word CONSOLE in it, it will list all
the files on the default disk. The <F8> or Erase
SOURCE key erases the file whose name appears in the
SOURCE box."
"That is pretty much what I assumed," Anne said.
"I should mention that both functions allow you to
use so-called 'wildcard' characters," said David.
"That means if you have several files with similar
names, you can refer to all of them with just one
name."
"I think I know about wildcards," replied Anne.
"If I have three files, FIZZLE1, FIZZLE2, and FIZZLE3,
and I want to see a directory for all of them, I type
in
FIZZLE?
in the SOURCE box. The question mark on the end tells
the computer to find every file that starts with FIZZLE
and has any other character in the position where I put
the question mark. Then I press the <F7> key."
"And an asterisk or 'star' can be used too," added
David, "to mean 'all the positions in the file
description from here to the end.' For example, if you
want to erase all the files that start with 'FI' as the
first two letters, and end with an extension of TXT,
you would type
FI*.TXT
in the SOURCE box and press the <F8> key.
Using The Confidant to Transmit Data Over the Telephone
"I think I understand," Anne said, "Now, I want
to try --"
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-19]
At that moment two heads poked through the
doorway into Anne's office. One was Barry Crocker, the
director of the company's cafeteria, who was cherished
by everyone for his superb pastries. The other was J.
Atwood Powers, president of Icey Beverage Co.
"Hey Doc!" Crocker hollered out to David. "It
came to me the other day that Icey is really a software
firm."
The other three people in the room stared at him,
puzzled.
"Yeah, you know, our wares are soft drinks, get
it? Soft wares." He laughed boisterously and waved
his hand as he left the office, leaving the others
chuckling.
"I was hoping to see you," Powers addressed David.
"Anne told me you were bringing some encryption
software. Could it be used to send data over the
telephone?"
"What do you have in mind?" asked David.
"My wife and I are flying to Finland tomorrow,
ostensibly for a vacation. They have wonderful lakes,
and their famous saunas, you know. But the real reason
for the visit is that our scouts have discovered a
recipe for a natural soft drink that the Finns drink
during their May Day celebrations. I intend to test it
out, get the recipe, and bring it back to see if we
want to start bottling it."
"Where does encryption fit in?" asked David.
"You know how fierce the competition is in the
soft drink bottling industry. I'm sure that other
companies will be keeping an eye open to find out my
plans and even to obtain a copy of the formula if
possible."
"So you want to encrypt the formula in order to
make it incomprehensible to them," said David.
"Exactly."
"But you mentioned something about the telephone,"
said Anne.
"Laura and I are going to be away for three
weeks," said Powers. "I thought it would speed things
up considerably if I could send the recipe over the
telephone. I don't want to sound alarmist, but it is a
well-known fact that some companies will gladly stoop
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-20]
to a bit of industrial espionage if needed. And just
in case, I'd rather play safe with something as
important as the formula for a new soft drink."
"I don't see that it will create any problem at
all," said the consultant. "You can take along a
portable computer that is compatible with the ones you
use here. Add a modem to that, some communications and
word-processing software, and The Confidant and you
should have no fear."
"Can you arrange the necessary equipment and
software?"
"Sure. But you'll need some time to get
acquainted with them. When do you leave?" asked David.
"Not until evening. But I have a full schedule.
The only time open is early morning. Can you meet me
here at six a.m.?"
David groaned. "And on a Saturday, too."
"I'll arrange for us to have breakfast while we're
at it. Can you be here too, Anne? You're the obvious
person to handle the transmission on this end."
"No problem," she said. "I'll do anything for
some of Barry's pastries."
"I'm going home for some sleep," kidded David.
"Even if it is only ten in the morning now," he
laughed. "See you in the morning," he said as he left.
Atwood Powers and Anne Lambert laughed too as they
went back to their other work.
* * *
David was unloading a portable computer and a
second copy of The Confidant from his car when Anne
Lambert drove up in the morning.
"Looks like Woody is already here," she said,
pointing to another car in the lot. "Hope Barry put
together something nice for us."
Inside, they found Powers reading through the User
Guide for The Confidant, and trying it out on Anne's
computer.
"There's really nothing to this," he said. "A
child could do it once he understood the basic idea.
How about if we run through the procedure we will use
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-21]
to encrypt and transfer the soft drink formula. I
don't want to leave it anything to chance."
"Good idea," agreed David. "I think I'll have you
set up this computer and modem in your office, Woody.
Then you can go through the steps of entering the
formula, encrypting it, and sending it from there.
Anne can receive it from here, and decrypt it."
In his office, Powers plugged in the portable
computer, attached the modem cables, and switched it
on. Then he inserted his word-processing diskette in
the A drive and a blank, formatted diskette in the B
drive.
"I'll just type in a make-believe formula," he
said to David and Anne, who had followed him to his
office. In a few moments, he had created a reasonable
looking formula. "Maybe we should 'leak' this to our
competitors," he laughed. "It probably tastes awful."
Powers saved the text on the diskette in his B:
drive. "Alright," he said. "To encrypt this, I remove
my word-processing software and replace it with The
Confidant, right?"
Both David and Anne nodded.
"Then I type:
CONFIDE
and press <RETURN>. Now what?"
"Type the name of the file containing the
formula into the SOURCE box," said David.
Powers typed:
B:FORMULA.TXT
and pressed <RETURN>.
"Choose a name for the DESTINATION," Anne prompted.
Powers typed in:
B:FORMULA.CRY <RETURN>
"And then I make up a password," he said, pausing.
"Uh, David, I hope you won't feel badly. But the fewer
people who know the password for the new formula, the
better. Will you mind if I just show Anne. You can
stand behind the computer while I type it in."
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-22]
David moved back. Anne bent forward to view the
password used by Powers. When she was sure she
remembered it, she nodded. Powers pressed the <F6> key
and the password disappeared.
"Alright David," he said. "It's all clear now."
"I can tell you have the right idea about
security," said David. "The Confidant cannot do it
all. Protecting your password is the best bet."
Powers pressed the <F1> key to encrypt his
formula. When the job was finished, he pressed the
<F5> key to "flip" the SOURCE and DESTINATION. Then he
pressed <F2> to look at the decrypted version. Just to
make sure, he finished up by pressing <F4> to look at a
copy of the encrypted file. As he expected, it was
nonsensical cipher text.
"Now," said Powers, "the next step is to transmit
it to Anne's computer. Then she can decrypt it." He
removed The Confidant from his diskette drive and
replaced it with some file transfer and communications
software that was capable of sending binary files.
"Anne, make sure your machine is ready to receive, will
you?"
Anne left the room. Powers lifted the receiver of
his phone and dialed her number. "All set?" he asked
when she answered.
"Okay," she replied.
Powers placed the receiver into his modem. Then
he used the telecommunications software to transfer
B:FORMULA.CRY to Anne's machine.
"All done," he said a few minutes later. "Now we
shall see how successful this was."
Atwood Powers and David Lyons marched into Anne
Lambert's office. She had already disconnected her
modem and replaced the communications software with The
Confidant.
As she typed in the name of the source file and
the password, hidden by the <F6> key, everyone waited
expectantly.
"Here we go," she said, pressing <F2> to decrypt.
A little shout of "Hurrah" went up from all three
watchers as The Confidant displayed the correct
decrypted text on the screen.
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-23]
"I think we are going to have a very profitable
vacation," said Powers.
"Hey Doc," somebody said from behind the trio.
"I'm in the software business too, you know."
Everyone turned to look at Barry Crocker.
"Yeah," he continued. "My wares are very soft."
And he handed them a tray of fresh-baked pastries.
* * *
------------------------------------------------------------
DOING IT
By now, you should be ready for your graduation
exercise. Actually, it's a graduation gift. You have
earned a look at the secret formula that Atwood and Laura
Powers discovered in Finland. It is still in the original
form he sent back to Anne Lambert.
Powers didn't take time to convert its measurements for
production use by his company. It is still suitable for
homemade use. So if you want a head start on Icey, you
might make up a batch of your own.
If you have followed along with David Lyons, Anne
Lambert, and Atwood Powers, you should know how to decrypt
the formula. We will simply tell you that the file is named
CONFIDE.CRY. And the password is: FINNISH MAY DAY.
------------------------------------------------------------
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-24]
INDEX to the TUTORIAL
A
ASCII (code), 3
B
Block, 12, 15
C
Case, upper/lower in PASSWORD, 11
Cipher text, 16
Communications software to transmit encrypted text, 21, 23
CONSOLE, 9
Copying the SOURCE to the DESTINATION, 15
Cryptology, 4
Cursor, moving the, 14
D
Data Encryption Standard (DES) procedure, 4, 18
Deciphering, using DES procedure from a file, 16
Deleting text or characters, 14
DESTINATION of cipher text in encryption, 9, 22
of plain text in decryption, 15ff
of copied text, 15
Directory of existing files, 19
Diskette, copying and care of, 4
Disk drive, placing text on other than default, 14
Display (form), main, 7
encryption, 11,, 15
E
Enciphering using DES procedure, to the CONSOLE, 11
to a file, 14
Encryption, 3, 11
Ending encryption, 12
Erasing the SOURCE file, 19
F
File description, 14, 19
Flipping the SOURCE and DESTINATION names, 15
H
HELP displays, 7
Hiding the PASSWORD on the display, 11
I
Inserting text or characters, 14
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-25]
P
Password, management, 13, 23
as used in encryption, 3, 7
PASSWORD for The Confidant, 9, 10
Password protection system, insecure, 2, 10
Plain text, 16
Privacy encryption procedure, 18
Protection of information, 1
S
SOURCE of plain text for encryption, 9, 11, 22
of cipher text for decryption, 15ff
of copied text, 15
as specifier for Directory search, 19
Starting encryption, 11
T
Transmission of encrypted information, 20f, 23
W
Wildcard characters in file descriptions, 19
Word-processing software changes appearance of text, 16
[The Confidant Tutorial (C) 1983, 1984 by Data Sage - page T-26]
Volume in drive A has no label
Directory of A:\
CONFIDE CRY 1600 8-18-84 11:31a
CONFIDE EXE 35200 8-24-84 4:47p
CONFIDE HLP 7426 8-18-84 12:20p
CONFIDE INV 2432 8-24-84 5:20p
CRC TXT 982 11-16-84 7:10a
CRCK4 COM 1536 10-21-82 7:54p
DESCRIPT DOC 24091 8-21-84 11:34a
REFCARD DOC 4098 8-18-84 7:49a
REFER DOC 59903 8-18-84 7:48a
TUTORIAL DOC 69139 8-21-84 10:51a
TYPE ME 882 8-18-84 12:19p
11 file(s) 207289 bytes
109568 bytes free