Research V7 release
[unix-history] / usr / man / man1 / crypt.1
CommitLineData
4ae50aef
RM
1.TH CRYPT 1
2.SH NAME
3crypt \- encode/decode
4.SH SYNOPSIS
5.B crypt
6[ password ]
7.SH DESCRIPTION
8.I Crypt
9reads from the standard input and writes
10on the standard output.
11The
12.I password
13is a key that selects a particular transformation.
14If no
15.I password
16is given,
17.I crypt
18demands a key from the terminal and turns
19off printing while the key is being typed in.
20.I Crypt
21encrypts and decrypts with the same key:
22.PP
23 crypt key <clear >cypher
24.br
25 crypt key <cypher | pr
26.PP
27will print the clear.
28.PP
29Files encrypted by
30.I crypt
31are compatible with those treated by the editor
32.I ed
33in encryption mode.
34.PP
35The security of encrypted files depends on three factors:
36the fundamental method must be hard to solve;
37direct search of the key space must be infeasible;
38`sneak paths' by which keys or cleartext can become
39visible must be minimized.
40.PP
41.I Crypt
42implements a one-rotor machine designed along the lines
43of the German Enigma, but with a 256-element rotor.
44Methods of attack on such machines are known, but not widely;
45moreover the amount of work required is likely to be large.
46.PP
47The transformation of a key into the internal
48settings of the machine is deliberately designed to
49be expensive, i.e. to take a substantial fraction of
50a second to compute.
51However,
52if keys are restricted to (say)
53three lower-case letters,
54then encrypted files can be read by expending only
55a substantial fraction of
56five minutes of machine time.
57.PP
58Since the key is an argument to the
59.I crypt
60command,
61it is potentially visible to users executing
62.IR ps (1)
63or a derivative.
64To minimize this possibility,
65.I crypt
66takes care to destroy any record of the key
67immediately upon entry.
68No doubt the choice of keys and key security
69are the most vulnerable aspect of
70.I crypt.
71.SH FILES
72/dev/tty for typed key
73.SH "SEE ALSO"
74ed(1),
75makekey(8)
76.SH BUGS
77There is no warranty of merchantability nor any warranty
78of fitness for a particular purpose nor any other warranty,
79either express or implied, as to the accuracy of the
80enclosed materials or as to their suitability for any
81particular purpose. Accordingly, Bell Telephone
82Laboratories assumes no responsibility for their use by the
83recipient. Further, Bell Laboratories assumes no obligation
84to furnish any assistance of any kind whatsoever, or to
85furnish any additional information or documentation.