X-CRYPT v1.01áeta (c)1994 ûiroSoft Enterprises, a ûirogen Corporation Adjacent Reality BBS 615.586.9515 Ä8-23-94ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ Welcome to X-CRYPT v1.01 - The first and only encryptor I know of that allows the user to fully specify the encryption technique(s). By allowing the user to do so, two variables must be considered for a possible crack: KEY and ENCRYPTION FORMAT. The cryptanlyst must know both to even attempt a brute force or algorithmic approach. X-CRYPT is not as secure as the more advanced encryption formats such as IDEA or DES, however it can be quite secure depending on the combination of encryption technique(s) the user choses. Usage: ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ X-CRYPT [-e|-d] [filespec] [password] Switches: "-e" specifies encryption "-d" specifies decryption Examples: X-CRYPT -e *.* mYpAssWorD X-CRYPT -d *.* mYpAssWorD X-CRYPT -e c:\stuff\*.exe thisismypasswordrighthereitislong! X-CRYPT -e x-crypt.nfo "little bo peep has lost her sheep" The Configuration File ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ The configuration file X-CRYPT.CFG must be located in the current directory or directory of X-CRYPT.EXE at the time of execution. It's format is simple: Line 1=> ENcryption technique(s) Line 2=> DEcryption technique(s) The encryption and decryption techniques are: "S" - sequential XOR [each character XORed by successive password char] "+" - sequential ADD [each character ADDed by successive password char] "-" - sequential SUB [each character SUBed by successive password char] "X" - nonconstant XOR [each XOR determined by algorithm derived from pass] "x" - constant XOR [each char XORed by sum of all password chars] "N" - NOT ['NOT' file - not password sensitive] "R" - reverse [REVERSE data in file - not password sensitive] They can be combined in any matter you wish. Examples: --------------- S+XxNR RMxX-S --------------- -XNx+RSNxX-R+ -R+XxNSR-xNX+ --------------- The decryption algorithm MUST compliment the encryption algorithm, you need to reverse the order of encryption techniques, as well as exchange "+" with "-" and vice versa. Remember that the longer the list of encryption techniques used, the more time it will take to crypt files. BeggarWare ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ I'm not gonna throw a bunch of annoying delays or other nags on this program, but I would just like to take these few bytes and explain that I am a poor 16 year old, forced to whittle away my youth at meager jobs instead of developing to my full mental capacity. If you would like to send me some cash, because you think I should be liberated from financial bonds of enslavment then pleaz do so.. Say, send me $10 and I'll give you the TC++ source code. That'z kewl enough .. Here's my address: Jeremy Collake 613 Windridge Ln Morristown, TN 37814 Pleaz address all letter bombs and harrassing mail to my mother or other family memeberz, thanx. Enjoy... ûirogen The AR 615.586.9515 History ÄÄÄÄÄÄÄÄÄÄÄÄÄÄ v1.0 - ? - Original release - non-constant XOR cryption only v1.01á - 8-23-94 - Rewrote most everything Configurable encryption techniques