Category : Science and Education
Archive   : TPL.ZIP
Filename : PRIVATE.DOC
Output of file : PRIVATE.DOC contained in archive : TPL.ZIP
THE PRIVATE LINE: (TM)
A User's Guide to a MS-DOS
Data Encryption Standard
Implementation
Version 5.0
by
Surry P. Everett
August 21, 1987
_________________________________________________________________
EVERETT Enterprises, 7855 Wintercress Lane, Springfield, VA 22152
Copyright (c) 1985, 1986, 1987 by Everett Enterprises.
All rights reserved worldwide. No part of this
publication may be reproduced, transmitted, transcribed,
stored in a retrival system, or translated into any
language or computer language, in any form or by any
means, electronic, mechanical, magnetic, optical,
chemical, manual or otherwise, without the prior written
permission of Everett Enterprises, 7855 Wintercress Lane,
Springfield, VA 22152.
Non-registered users are granted a limited license to use
this product on a trial basis for evaluation purposes, and to
copy the program for trial use by others subject to the
following limitations:
The program is distributed in unmodified form, complete
with documentation.
No fee, charge or other consideration is required or
accepted.
The program is not distributed in conjunction with any
other product.
ii
Single CPU License
Registration of The Private Line (TM) licenses you to
use the product on one CPU.
DISCLAIMER
Everett Enterprises makes no representations or
warranties with respect to the contents hereof and
specifically disclaims any implied warranties of
merchantability or fitness for any particular
purpose. Further, Everett Enterprises reserves the
right to revise this publication and to make changes
from time to time in the content hereof without
obligation of Everett Enterprises to notify any
person of such revision or changes.
TRADEMARKS
CP/M is a registered trademark of Digital Research.
CompuServe is a trademark of CompuServe Inc.
EasyLink is a service mark of Western Union Telegraph Company.
MS-DOS is a registered trademark of Microsoft Corp.
PROCOMM is a trademark of PIL Software Systems.
QMODEM is a trademark of the Forbin Project.
WORDSTAR is a registered trademark of MicroPro Intl Corp.
The Private Line (TM) is a trademark of Everett Enterprises.
iii
REGISTRATION
------------
The Private Line is distributed as User-Supported Software.
We encourage you to try the program and share it with
anyone as long as:
The program is distributed complete and unchanged,
accompanied by the documentation.
No fee, charge or other compensation is requested or
received except by Everett Enterprises.
The Private Line is not distributed in conjunction
with any other product.
If you use our program for anything other than evaluation
purposes, you are required to register such use. You
may register by sending a check or money order for $30.00
to:
Everett Enterprises
7855 Wintercress Lane
Springfield, VA 22152
Program disks are not included in the registration fee.
If you or your company need an invoice in order to generate
payment, one is included in this manual.
iv
Privacy, like freedom, is not missed until it's not there.
v
The Private Line (TM) is dedicated to
Dorothy Everett
who shares her friend with a machine or two.
vi
We have enclosed invoice and order forms to simplify
processing your orders. Use the order form to place
an order with us. Use the invoice within your
organization to generate payment for The Private Line
registrations.
We are now providing the program on disk for your
convenience. Please note that the $10 disk fee covers
media costs, postage and handling only. It does not
cover registration. If you are using the program for
other than evaluation purposes, you are required to
register.
Business, commercial or governmental use of non-registered
copies of The Private Line is strictly forbidden. Write
for details of site or corporate licensing.
vii
Invoice Form
Remit to: Everett Enterprises
7855 Wintercress Lane
Springfield, VA 22152
Sold to: Ship to:
-------------------- --------------------
-------------------- --------------------
-------------------- --------------------
============================================================
Date: PO #:
============================================================
Quan Description Unit Extended
------------------------------------------------------------
| | |
| The Private Line Registration | $30.00 | $
-----| | |
| The Private Line Evaluation Disk | $10.00 | $
-----| | |
------------------------------------------------------------
Total: $
Orders outside the U.S.: Add $15, send check drawn on U.S.
bank in U.S. dollars, or international money order
in U.S. dollars.
viii
Order Form
Make check Everett Enterprises
payable to: 7855 Wintercress Lane
Springfield, VA 22152
============================================================
Date: PO #:
============================================================
Quan Description Unit Extended
------------------------------------------------------------
| | |
| The Private Line Registration | $30.00 | $
-----| (does not include disk) | |
| | |
| The Private Line Evaluation Disk | $10.00 | $
-----| (current version, manual on | |
| disk) | |
| | |
------------------------------------------------------------
Total: $
Payment by: ( ) Check ( ) Money Order
Name:
------------------------------------------------
Addr:
------------------------------------------------
:
------------------------------------------------
Orders outside the U.S.: Add $15, send check drawn on U.S.
bank in U.S. dollars, or international money order
in U.S. dollars.
Orders may also be placed using CompuServe: 70320,107 or
Telex II #: 5101011171.
ix
Information Request
Mail to: Everett Enterprises
7855 Wintercress Lane
Springfield, VA 22152
Please send information regarding corporate and site licenses.
Name:
-------------------------------------------------
Title:
-------------------------------------------------
Company:
-------------------------------------------------
Addr:
-------------------------------------------------
:
-------------------------------------------------
City:
-------------------------------------------------
State:
-------------------------------------------------
Zip:
-------------------------------------------------
Day Phone:
-------------------------------------------------
Estimated copies needed:
-----------------------------------
Possible uses:
---------------------------------------------
---------------------------------------------
---------------------------------------------
---------------------------------------------
Questions:
-------------------------------------------------
-------------------------------------------------
-------------------------------------------------
-------------------------------------------------
-------------------------------------------------
x
Table of Contents
Section Page
I. Introduction 1
A. What is it? 1
B. Who needs it? 1
II. Operating The Private Line (TM) 2
A. Receiving The Private Line (TM) 2
1. Making a back-up copy 2
2. Floppy disk system 2
3. Hard disk system 3
B. Using The Private Line (TM) 3
1. Single file encryption 3
2. Single file decryption 9
3. Displaying files 9
4. Purging files 10
5. Displaying disk directories 12
6. Double file decryption/encryption 13
7. Converting files to ASCII format 14
8. Converting files to binary format 15
9. Printing files 15
10. Disk write verify toggle switch 16
11. Key entry echo toggle switch 17
12. Creating a sub-directory 18
13. Changing the current sub-directory 19
14. Removing a sub-directory 19
15. Erasing a file from a sub-directory 20
16. Verification of compliance with the
Data Encryption Standard 21
17. Selecting Alphabetic or Hexidecimal keys 26
18. Changing Purging Status 26
19. Saving Switch Settings 28
20. Selecting Command Line exit action 29
21. Changing File Re-use Status 29
C. Command Line execution 30
1. Encryption 30
2. Decryption 31
D. Other Aspects of the Private Line (TM) 31
1. Selection of keys 31
2. Protection of keys 31
3. Destruction of unencrypted data 32
xi
III. Requirements 33
IV. References 34
V. Problem Report 35
VI. Changes and Updates 36
VII. Index 38
xii
August 21, 1987
I. Introduction
A. What is The Private Line?
The Private Line (TM) is a software implementation of the Data
Encryption Algorithm using the Data Encryption Standard (DES)
published by the National Bureau of Standards, U.S. Department of
Commerce (NBS). The Private Line (TM) will decrypt files and
messages encrypted by either hardware or other software
implementations of the DES which meet NBS specifications. Files
of either text or object code may be easily encrypted or
decrypted.
The Private Line (TM) provides a secure means of transmitting and
storing messages and MS-DOS files without the danger of having an
uninvited person read them. It provides a remedy to that age-old
fear of having some one, be it a too nosy neighbor on a party
line, hackers breaking a computer bulletin board's safeguards, or
your 'friendly' big brother, reading your private material.
In order for a file which has been encrypted by The Private
Line (TM) to be transmitted to another user, a communications package,
such as XMODEM by Ward Christensen (which is in the public domain),
PROCOMM or QMODEM and a modem may be needed. The Private Line (TM)
works without them but it will not allow one to up or download files
from CompuServe or the Source. By using the expansion option of The
Private Line, one may send encrypted messages on EasyLink, telegraph
networks and other standard telecommunications networks and
bulletin boards such as CompuServe and the Source in ASCII form.
B. Who needs The Private Line?
Anyone who transmits MS-DOS files of messages, data, or executable
programs that are subject to be read, viewed, copied or otherwise
accessed by people other than the intended recipient.
Users who communicate by bulletin board or other electronic
systems such as Telex or EasyLink may wish to use The Private Line.
Writers who submit articles over networks such as CompuServe or the
Source should consider using The Private Line. Anyone who has
sensitive data laying around on a diskette should encrypt it in order
to prevent unauthorized access. People who develop software in teams
and communicate by leaving messages on networks should use The Private
Line. People such as doctors and lawyers who keep personal financial
or other sensitive records on diskettes, or on line, either on hard
disks, bulletin boards, or otherwise, should use The Private Line.
In short anyone should use The Private Line who has something
that the user does not want to share, be it a message, a program, or
just personal data.
1
August 21, 1987
II. Operating The Private Line
A. Receiving The Private Line.
1. Making a back-up copy. It will arrive on a diskette
readable by your computer system. Before using The Private Line
you should, for your own protection, make a back-up work copy of
the distribution diskette and store the original in a safe place.
Remember that the User's License allows you to make as many
copies as you need for backup purposes only (if you registered
your use of The Private Line) or to give away for evaluation
purposes. Use a file copy program, such as MS-DOS's COPY, to
make the copy and verify that it is accurately copied. A MS-DOS
command such as COPY A: B: will copy all files on The Private
Line original diskette. Remember that The Private Line does not
have a copy of the MS-DOS operating system on it and that the
backup diskette must be formatted before it can be used to store
a copy of The Private Line. If you need additional help, refer
to your MS-DOS system documentation on FORMAT and COPY or refer
to one of the MS-DOS references listed in Section V of this
manual. In short, take the following steps to make a back-up
copy:
a. Format a blank diskette and copy MS-DOS to it using
FORMAT.
b. Put the new diskette containing MS-DOS on Drive A: and
put The Private Line original diskette on Drive B:.
c. Execute the command COPY B:*.* A:. All files on The
Private line will be copied to your backup copy. The following
files are on The Private Line diskette:
(1) PRIVATE.EXE - The heart of The Private Line. This
is the executable program which one uses.
(2) MSG.DAT - additional information and a sample
message in clear text and
(3) MSG.ENC - sample message in encrypted form.
(4) Read.me - any last minute information from
Everett Enterprises.
d. Execute the command COMP A: B:. All files on The
Private line original diskette will be compared to your backup copy.
e. Put The Private Line original diskette in a secure, safe
place.
2. Floppy disk system. Begin using The Private Line by
inserting the diskette containing the work copy of The Private
Line into a disk drive and by typing 'X:PRIVATE' after the MS-DOS
prompt and pressing RETURN. 'X' is the letter designator of the
2
August 21, 1987
disk drive in which you inserted the diskette. The Private Line
will begin execution just like any other executable MS-DOS file.
The Private Line will provide easy, clear and user-friendly
instructions as it is used.
3. Hard disk system.
a. Create a subdirectory called 'C:\tpl' using the MS-DOS
command, MKDIR.
b. Insert the working copy of The Private Line into
drive A and type: copy a:*.* C:\tpl. Press RETURN and all files
contained on the diskette will be copied to the correct sub-
directory.
c. Edit or create the autoexec.bat file contained on the
root directory on the boot drive so that it will include a path
command which requires the operating system to check the sub-
directory, 'C:\tpl'. The path line in the autoexec.bat file will
look similar to: 'path C:\tpl'. If there are multiple entries in
the path command, each entry is separated with a semi-colon.
d. After editing the autoexec.bat file, reboot the
system by pressing the CNTL, ALT, and DEL keys at the same time.
e. Begin using The Private Line by typing 'PRIVATE'
after the MS-DOS prompt and pressing RETURN. The Private Line
will begin execution just like any other executable MS-DOS file.
The Private Line will provide easy, clear and user-friendly
instructions as it is used.
B. Using The Private Line.
1. Single file encryption:
a. Insert the diskette containing the work copy of The
Private Line into a disk drive. If the disk drive is not the
currently logged disk drive, type the letter designator (A-P) of the
disk drive being used, followed by a colon. Press RETURN.
b. Type 'PRIVATE' after the MS-DOS prompt and press RETURN.
(Note: some keyboards use ENTER or CARRIAGE RETURN, rather than
RETURN). The Private Line will begin execution by displaying a
copyright notice which will quickly be replaced by the master menu for
The Private Line (see Figure 1).
c. Press the letter 'A' (either upper or lower case) to
encrypt a file.
3
August 21, 1987
____________________________________________________________________________
THE PRIVATE LINE
MASTER MENU
A. Single File Encryption G. Convert File to ASCII
B. Single File Decryption H. Convert File to Binary
C. Return to MS-DOS I. Double File Encryption
D. Display File in Hex Format J. Double File Decryption
E. Purge File from Disk K. Print Disk File
F. Display Disk Directory L. Additional Options
Enter the letter of your choice:
____________________________________________________________________________
Current Switch Selections
Key type: Alphabetic Disk verify after write: On
Automatic Purging (after encryption): No Purge Prompt (after encryption): Yes
(after decryption): NO (after decryption): Yes
Times purged file overwritten: 1 Command Line: Exit
Re-use existing files: Prompt Key Entry Echo: On
____________________________________________________________________________
(C) Everett Enterprises, 7855 Wintercress Ln, Springfield, VA 22152
____________________________________________________________________________
Figure 1.
d. The Private Line will ask for the name of the file to
be encrypted (see Figure 2). Enter the file name in the MS-DOS
format, filename.filetype, if the file to be encrypted is on the
currently logged disk drive and in the current directory. The
currently logged disk drive is the drive which appears with the
MS-DOS prompt symbol, such as A> or B>. Otherwise, use the form
X:\pathname\filename.filetype where 'X' is a disk drive (A-P) that
exists on your system; \pathname is a valid pathname; filename is a
1-8 character filename; filetype is a 3 character file type, such as
ASM, BAS, COM, DAT, HEX, PAS, or PRN. Either lower or upper case
characters may be used, but all characters are changed to upper case.
If the file to be encrypted is not on the same disk as The Private
Line, insert that diskette into another disk drive before entering the
name of the file. If the disk drive does not exist or the file can
not be found, The Private Line will tell you to press the RETURN key
and will then ask you to enter the file name. If at any time you wish
to cancel the current operation and to return to either the master
menu or the additional options menu, simply press the CONTROL key and
the letter 'R' at the same time (CNTL-R) whenever The Private Line is
waiting for input from the terminal.
4
August 21, 1987
_______________________________________________________________
THE PRIVATE LINE
WHAT IS THE NAME OF THE FILE TO BE ENCRYPTED?
(DISK:FILENAME.FILETYPE)
_______________________________________________________________
Figure 2.
_______________________________________________________________
THE PRIVATE LINE
WHAT IS THE NAME OF THE FILE TO BE ENCRYPTED?
(DISK:\PATHNAME\FILENAME.FILETYPE)
FILE NOT FOUND
(PRESS RETURN TO RE-ENTER)
_______________________________________________________________
Figure 3.
e. After entering the file name, The Private Line will
open a file to contain the encrypted data. The file will be placed
on the chosen disk. The file name of the encrypted file will be
the same as that of the file to be encrypted. The file type,
however, will be 'ENC'. For example, if the file to be encrypted is
'A:SECRET.DAT', then the file to hold the encrypted data will be
X:SECRET.ENC' where 'X' is the disk drive you selected. If the user
did not enter a disk drive, the currently logged disk drive is used.
If the file can not be found, a message (see Figure 3) is
displayed, and the user is instructed to press the RETURN key.
(1) The Private Line will attempt to open the new file
if there is room on the chosen disk. If there is not enough room
to open the file or if there is another error, a message will be
displayed. Press RETURN to return to the master menu.
(2) The Private Line will also check to see if the
file to contain the encrypted data already exists on the selected
disk. If it does and the user has not changed the settings of
the file re-use switch (default=prompt), the user will be asked
if it should be overwritten (see Figure 4). The user should
press either 'Y' for yes or 'N' for no. If yes, The Private Line
continues. If no, The Private Line asks if the user wants to
return to the master menu or if the user wants to enter a new
file name to contain the encrypted data (see Figure 5). The
user should press either 'A' or 'B'. If 'A' is pressed, The
Private Line returns to the master menu. If 'B'
5
August 21, 1987
_______________________________________________________________
THE PRIVATE LINE
WHAT IS THE NAME OF THE FILE TO BE ENCRYPTED?
(DISK:\PATHNAME\FILENAME.FILETYPE)
ENTER THE LETTER DESIGNATOR (A-P) OF THE DISK ON WHICH THE
ENCRYPTED FILE IS TO BE PLACED:
FILE ALREADY EXISTS. DO YOU WANT TO OVERWRITE IT (Y/N)?
_______________________________________________________________
Figure 4.
is selected, the user is asked for the name of the file to contain
the encrypted data (see Figure 6). Any valid MS-DOS \pathname\
filename.filetype on any valid disk drive may be used. If the
file re-use switch has been set to re-use, the file will
automatically be overwritten.
f. After the file to be encrypted and the file to hold the
encrypted data have been selected and opened, The Private Line will
ask for the key to be used (see Figure 7). The key will be
echoed to the terminal as it is entered. If the user desires to
disable the key entry echo feature, see para 11, 'Key Entry Echo
Toggle Switch.'
_______________________________________________________________
THE PRIVATE LINE
OPTIONS
A - RETURN TO THE MASTER MENU.
B - ENTER A NEW NAME FOR THE NEW FILE.
ENTER THE LETTER OF YOUR CHOICE:
_______________________________________________________________
Figure 5.
_______________________________________________________________
THE PRIVATE LINE
WHAT IS THE NAME OF THE FILE TO BE CREATED?
(DISK:\PATHNAME\FILENAME.FILETYPE)
_______________________________________________________________
Figure 6.
6
August 21, 1987
_______________________________________________________________
THE PRIVATE LINE
Enter the alphabetic key to be used (1-8 characters):
(FOR EXAMPLE: aBcdeFGh)
_______________________________________________________________
Figure 7.
(1) The user should enter 1-8 characters in the
format in Figure 7 and press RETURN. After entering 8
charcters, the user will be allowed only to enter a character
editing key such as left-arrow or back-space or to press RETURN.
If less than 8 characters are entered when RETURN is pressed, the
key is right-filled with blanks (hex value 20H). Please note
that key characters are case specific, i.e., there is a
difference between an uppper and lower case letter.
(2) After pressing RETURN, The Private Line will
display the key which you entered (see Figure 8) and ask if it
is correct. Press a 'Y' or 'N' for yes or no. If 'Y' is
pressed, The Private Line continues. If 'N' is pressed, The
Private Line again asks for the key to be used. Remember, CNTL-R
will return the user to the master menu. If the key entry echo
feature has been turned off, the verification step will be
bypassed.
_______________________________________________________________
THE PRIVATE LINE
LISTED BELOW IS THE KEY YOU ENTERED:
aBcdeFGh
IS IT CORRECT (Y/N)?
_______________________________________________________________
Figure 8.
g. After the key has been verified, The Private Line
begings to read the input file, encode it and write the encrypted
file to the output disk. As a reminder the names of the encrypted
file and the file being encrypted are displayed. A counter is
displayed and incremented as each 256 bytes of data is processed.
h. After the file has been encrypted, the user may be asked
if the plain text source file should be purged (overwritten with
binary zeros and then removed from the directory). If the answer is
no, the user is returned to the master menu. If the answer is 'yes',
then after confirmation, the file is purged before the user is
returned to the master menu (see Figures 9 and 10). When the file has
7
August 21, 1987
been purged, the user will be notified and told to press RETURN to
continue (see Figure 11). The user will then be returned to the
master menu. The default setting for the automatic purge after
encryption is NO. The default setting for the purge prompt is YES.
If the automatic purge switch has been set to automatic, the source
file will automatically be purged, regardless of the purge prompt
switch setting.
_______________________________________________________________
THE PRIVATE LINE
ENCRYPTING: X:FILENAME.FILETYPE
ENCRYPTED FILE IS: X:FILENAME.ENC
DO YOU WANT TO PURGE THE ABOVE PLAIN TEXT SOURCE FILE (Y/N)?
_______________________________________________________________
Figure 9.
_______________________________________________________________
THE PRIVATE LINE
ENCRYPTING: X:FILENAME.FILETYPE
ENCRYPTED FILE IS: X:FILENAME.ENC
DO YO WANT TO PURGE THE ABOVE PLAIN TEXT SOURCE FILE (Y/N)?
PHYSICALLY ERASING: X:FILENAME.FILETYPE
_______________________________________________________________
Figure 10.
_______________________________________________________________
THE PRIVATE LINE
ENCRYPTING: X:FILENAME.FILETYPE
ENCRYPTED FILE IS: X:FILENAME.ENC
CONFIRM PURGE OF X:FILENAME.FILETYPE (Y/N)?
PHYSICALLY ERASING: X:FILENAME.FILETYPE
FILE OVERWRITTEN WITH BINARY ZEROS AND THEN DELETED
PRESS RETURN TO CONTINUE
_______________________________________________________________
Figure 11.
8
August 21, 1987
2. Decrypting files:
Files may be decrypted using the same procedures as in
encryption. However, press 'B' for decryption when the master menu
is displayed, and then continue exactly as for encryption in
accordance with the instructions contained in paragraph B1c thru
B1h. Remember, the same key which was used in the encryption
process must be used for decryption.
3. Displaying files:
Normally there is no need to display files which have been
encrypted or are to be encrypted. Displaying COM files certainly
does not reveal anything, but it can be done by using utilities such
as DUMP and Cntl-P. Text files which are in the clear may be
displayed using utilities such as TYPE or text editors such as
WORDSTAR. However, for the few times that one may want to review a
file, The Private Line provides the capability. It should be
understood that an encrypted text file is not a text file.
a. From the master menu of The Private Line, press 'D'. The
Private Line will ask for the name of the file to be displayed (see
Figure 12). It must be contained in the current or specified
directory. The existence of the file will be checked. If an error is
found, the user will be prompted (see Figure 13) for corrective
action.
_______________________________________________________________
THE PRIVATE LINE
WHAT IS THE NAME OF THE FILE TO BE DISPLAYED?
(DISK:\PATHNAME\FILENAME.FILETYPE)
_______________________________________________________________
Figure 12.
_______________________________________________________________
THE PRIVATE LINE
WHAT IS THE NAME OF THE FILE TO BE DISPLAYED?
(DISK:\PATHNAME\FILENAME.FILETYPE)
FILE NOT FOUND
(PRESS RETURN TO RE-ENTER)
_______________________________________________________________
Figure 13.
b. The Private Line will read the desired file and display
a CRT screen of data and then pause. The user will be prompted to
choose between viewing the next screen of data (see Figure 14) by
pressing RETURN or returning to the master menu by pressing CNTL-R.
Each byte will be printed in hex format (two hex digits). In
addition, all displayable bytes (hex value 20H thru 7EH) will be
displayed. Nondisplayable bytes are represented by a period.
9
August 21, 1987
c. After the end of the file has been reached, the user
will be informed and asked to press the RETURN key (see Figure 15).
This allows the user to view the last screeen of data in the file.
_______________________________________________________________
THE PRIVATE LINE
00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F ................
20 21 22 23 24 25 26 27 28 29 2A 2B 2C 2D 2E 2F !"#$%&'()*+,-./
30 31 32 33 34 35 36 37 38 39 3A 3B 3C 3D 3E 3F 0123456789:;<=>?
40 41 42 44 44 45 46 47 48 49 4A 4B 4C 4D 4E 4F @ABCDEFGHIJKLMNO
50 51 52 55 54 55 56 57 58 59 5A 5B 5C 5D 5E 5F PQRSTUVWXYZ[ ]^-
60 61 62 66 64 65 66 67 68 69 6A 6B 6C 6D 6E 6F 'abcdefghijklmno
70 71 72 77 74 75 76 77 78 79 7A 7B 7C 7D 7E 7F pqrstuvwxyz{|}~.
20 21 22 23 24 25 26 27 28 29 2A 2B 2C 2D 2E 2F !"#$%&'()*+,-./
30 31 32 33 34 35 36 37 38 39 3A 3B 3C 3D 3E 3F 0123456789:;<=>?
40 41 42 44 44 45 46 47 48 49 4A 4B 4C 4D 4E 4F @ABCDEFGHIJKLMNO
50 51 52 55 54 55 56 57 58 59 5A 5B 5C 5D 5E 5F PQRSTUVWXYZ[ ]^-
20 21 22 23 24 25 26 27 28 29 2A 2B 2C 2D 2E 2F !"#$%&'()*+,-./
30 31 32 33 34 35 36 37 38 39 3A 3B 3C 3D 3E 3F 0123456789:;<=>?
PRESS RETURN FOR NEXT SCREEN, CNTL-R FOR MASTER MENU
_______________________________________________________________
Figure 14.
_______________________________________________________________
THE PRIVATE LINE
00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F ................
01 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F ................
20 21 22 23 24 25 26 27 28 29 2A 2B 2C 2D 2E 2F !"#$%&'()*+,-./
50 51 52 55 54 55 56 57 58 59 5A 5B 5C 5D 5E 5F PQRSTUVWXYZ[ ]^-
END OF FILE REACHED. PRESS RETURN TO CONTINUE.
_______________________________________________________________
Figure 15.
4. Purging files:
After a file has been encrypted or decrypted, it may be
necessary, for security purposes, to purge the original file. When
MS-DOS erases a file, only the name is removed from the disk
directory, the data remains on the disk (see para 15, 'Erasing
Files'). With patience and a little effort, some one could
reconstruct the file thought to be erased. Therefore, a means is
provided in which the file to be erased is overwritten with binary
zeros before it is purged from the MS-DOS disk directory. It also
should be noted that because of the manner in which backup files are
created by text editors such as WORDSTAR and EDLIN, care should be
exercised to avoid leaving backup files (file type: BAK) available for
general access. Please note that the default settings of the
automatic purge and purge prompt switches are 'no' and 'prompt'
10
August 21, 1987
respectively. This means that unless the user changes the default
settings, the user will be prompted after a file is encrypted. In
order to completely purge a file, follow these steps:
a. From The Private Line master menu, press the letter 'E'
(either upper or lower case) to purge a file.
b. The Private Line will ask for the name of the file to be
purged (see Figure 16). The file to be purged must be in the current
or specified directory. If the file can not be found, The Private
Line will tell you to press the RETURN key and will then ask you to
enter the file name (see Figure 25). If at any time you wish to
return to the master menu, simply press the CONTROL key and the letter
'R' (CNTL-R) at the same time whenever The Private Line is waiting for
input from the terminal. The master menu will then re-appear.
_______________________________________________________________
THE PRIVATE LINE
WHAT IS THE NAME OF THE FILE TO BE PURGED?
(DISK:\PATHNAME\FILENAME.FILETYPE)
_______________________________________________________________
Figure 16.
_______________________________________________________________
THE PRIVATE LINE
WHAT IS THE NAME OF THE FILE TO BE PURGED?
(DISK:\PATHNAME\FILENAME.FILETYPE)
FILE NOT FOUND
(PRESS RETURN TO RE-ENTER)
_______________________________________________________________
Figure 17.
c. If the file is found, the user will be asked to verify
that the file is to be purged by pressing 'Y' or 'N' (see Figure
18). If 'Y' is pressed, purging begins and the data will be
destroyed (see Figure 19). If 'N' is pressed, the user will be
returned to the master menu. After the file has been purged, the
user will be informed that the file has been overwritten with
binary zeros and deleted. The user is then instructed to press
RETURN to continue (see Figure 20). After pressing RETURN, the
user is returned to the master menu. The file will be
overwritten 1-9 times before the file name is removed from the
directory. The default number is 1; it may be changed from the
Additional Options Menu.
11
August 21, 1987
_______________________________________________________________
THE PRIVATE LINE
Confirm PURGE of x:\pathname\filename.filetype (y/n)?
_______________________________________________________________
Figure 18.
_______________________________________________________________
THE PRIVATE LINE
Confirm PURGE of x:\pathname\filename.filetype (y/n)?
PHYSICALLY ERASING X:\PATHNAME\FILENAME.FILETYPE
_______________________________________________________________
Figure 19.
_______________________________________________________________
THE PRIVATE LINE
Confirm PURGE of x:\pathname\filename.filetype (y/n)?
PHYSICALLY ERASING X:\PATHNAME\FILENAME.FILETYPE
FILE OVERWRITTEN WITH BINARY ZEROS AND DELETED
PRESS RETURN TO CONTINUE
_______________________________________________________________
Figure 20.
5. Displaying disk directories:
a. From The Private Line master menu, press the letter 'F'
(either upper or lower case) to list a disk directory.
b. The Private Line will ask for the pathname of the
directory which is to be displayed (see Figure 21). Type any valid
disk drive,pathname and use any valid wildcard characters. You
may simply press RETURN for the default directory (*.*).
c. The Private Line will then display the pathname which
you entered. The filenames contained in that directory will be
printed in alphabetical order in one to four columns. Directory
entries will be marked with an asterisk. If there are more than
fifty-six entries a message will be shown which will instruct the
user to press RETURN for more listings. When there are no more
listings, a message indicating the end of the listings will be
shown and the user will be instructed to press RETURN to return
to the master menu (see Figure 22).
12
August 21, 1987
_______________________________________________________________
THE PRIVATE LINE
Enter the pathname of the desired directory:
(disk:\pathname\filename.filetype, RETURN = *.*)
_______________________________________________________________
Figure 21.
_______________________________________________________________
THE PRIVATE LINE
Directory of - A:\ROOT\SUB1
PROG1 ASM :
PROG1 HEX :
PROG1 PRN :
SUB11 * :
TEST DAT :
TEST HEX :
* DIRECTORY ENTRIES
END OF DIRECTORY LISTINGS. PRESS RETURN TO RETURN TO MASTER MENU.
_______________________________________________________________
Figure 22.
6. Double file decryption and encryption:
a. Single file encryption generally is secure enough for
most users. However, some people feel that it is too vulnerable and
suggest double encryption. Double encryption involves encrypting
an encrypted file, preferrably with a different key. Even the most
doubtful critic of the Data Encryption Standard admits that a file
doubly encrypted with two different keys, will be secure from brute
force solution for at least five to ten years!
b. Options 'I' and 'J' on the master menu will automatically
double encrypt or decrypt a file. When either option is selected, the
user will be prompted to enter a second key after providing the first
key if hexidecimal keys are used. If alphabetic keys are used, only
one key consisting of 1-16 characters is entered. The default key
type is alphabetic. Of course double encryption takes more time than
single encryption, but it is less than twice as much. Remember, for
decryption the same keys must be entered in the same order as for the
encryption process. Thus, the 1st key for encryption also is the 1st
key for decryption. Note: if single decryption is used twice to
decrypt a double encrypted file, then the key entered second in the
encryption process must be used first in the decryption process.
Other than being prompted to enter a second key, double encryption and
decryption proceed as in para 1, 'Encrypting files.' Remember that
alphabetic keys of length 9 to 15 characters are right-filled with
13
August 21, 1987
blanks (hex value 20H).
7. Converting files to ASCII format:
a. An encrypted file contains binary data, i.e., values from
00H thru 0FFH or 0 thru 255 decimal. Thus, a communications program
such as XMODEM normally is required to transfer an encrypted file.
However, for the people who desire to send encrypted files
over Western Union, E-Mail, or similar services, ASCII files are
required. ASCII files do not contain control characters. Option
'G' will expand any file into an ASCII file with a normal file type
of EXP. It will be about 37% larger than the original file. Carriage
returns and line feeds are inserted after each 64 characters in the
expanded file.
b. The file to be expanded must be in the current or
specified directory of the selected disk.
c. Press the letter 'G' (either upper or lower case) to
expand a file.
d. The Private Line will ask for the name of the file to be
expanded (see Figure 23).
_______________________________________________________________
THE PRIVATE LINE
WHAT IS THE NAME OF THE FILE TO BE EXPANDED?
(DISK:\PATHNAME\FILENAME.FILETYPE)
_______________________________________________________________
Figure 23.
e. After entering the file name, The Private Line will
open a file to contain the expanded data. The file will be placed
on the chosen disk using its current or specified directory. The
file name of the expanded file will be the same as that of the file
to be expanded. The file type, however, will be 'EXP'. For
example, if the file to be expanded is 'A:SECRET.DAT', then the file
to hold the expanded data will be X:SECRET.EXP' where 'X' is the
disk drive you selected. If the user did not enter a disk drive,
the currently logged disk drive is used.
(1) The Private Line will attempt to open the new file
if there is room on the chosen disk. If there is not enough
room to open the file or if there is another error, a message
will be displayed. Press RETURN to return to the master
menu.
(2) The Private Line will also check to see if the file to
contain the expanded data already exists on the selected diskette.
If it does, the user will be asked if it should be overwritten (see
Figure 24). The user should press either 'Y' for yes or 'N' for no.
If yes, The Private Line continues. If no, The Private Line asks if
14
August 21, 1987
the user wants to return to the master menu or if the user wants to
enter a new file name to contain the expanded data (see Figure 5).
The user should press either 'A' or 'B'. If 'A' is pressed, The
Private Line returns to the master menu. If 'B' is selected, the
user is asked for the name of the file to contain the expanded data.
The file will be placed on the selected disk using its current or
specified directory.
_______________________________________________________________
THE PRIVATE LINE
WHAT IS THE NAME OF THE FILE TO BE EXPANDED?
(DISK:\PATHNAME\FILENAME.FILETYPE)
FILE ALREADY EXISTS. DO YOU WANT TO OVERWRITE IT (Y/N)?
_______________________________________________________________
Figure 24.
f. After the file to be expanded and the file to hold the
expanded data have been selected and opened, The Private Line will
read the input file, expanded it, and write it to the expandsion
file. As a reminder, the names of the expanded file and the file
being expanded are displayed. The user will be returned to the
master menu upon completion of the expansion.
8. Converting files to binary format:
a. Option 'H' will contract any file into a binary file
with a normal file type of CON. Carriage returns and line feeds
inserted by Option 'G' are discarded. It will not make sense to use
Option 'H' on any file other than a file of type EXP. The same
checks are made for overwriting existing files as in the expansion
option.
b. Files may be contracted using the same procedures as in
the expansion process. However, press 'H" for converting a file
into binary format when the master menu is displayed, and then
continue as for expansion in accordance with the instructions in
para 7, 'Converting files to ASCII format.'
9. Printing Files.
a. Option 'K' will print a selected file on the MS-DOS PRN
device. Remember, only ASCII files can be printed. Thus, encrypted
files can not be printed. However, you could encrypt a file, use
Option 'G' to convert it to an ASCII file, and then print the new
file using Option 'K'. If a file with a file type of EXE, COM, CON,
or ENC is selected for printing, a warning message will be displayed
and the user will be allowed to continue or to return to the master
menu. During print, an 'S' will stop/start the printing process.
A CNTL-R will return the user to the master menu.
15
August 21, 1987
b. The file to be printed must be in the current or
specified directory prior to option 'K' being selected.
10. Disk Write Verify switch:
a. If the disk write verify toggle switch is on, a verify
is performed during write operations to the disk drive to insure
that data was written correctly. Although more time is required
with the verify switch on, a higher degree of confidence in the data
written is obtained. The additional time required is very small.
Therefore, it is recommended that the verify switch be left on. The
default condition is ON.
b. To change the disk write verify toggle switch, select
'L', ADDITIONAL OPTIONS, on the master menu. The additional options
menu (see Figure 25), will appear. Press 'A' and the verify toggle
switch will be displayed (see Figure 26).
c. Press 'A' to turn the switch on. The switch will be
turned on and the display updated to reflect the new condition.
Press 'C' to return to the additional options menu.
____________________________________________________________________________
THE PRIVATE LINE
ADDITIONAL OPTIONS MENU
A. Disk Write Verify Toggle Switch H. Select Alphabetic / Hex Keys
B. Key Entry Echo Toggle Switch I. Change Purging Status
C. Create Sub-Directory J. Save Switch Settings to Disk
D. Change Current Sub-Directory K. Command LineExit Status
E. Remove Sub-Directory L. Change FileRe-use Status
F. Erase File M. Return to Master Menu
G. Return to Master Menu
____________________________________________________________________________
Current Switch Selections
Key type: Alphabetic Disk verify after write: On
Automatic Purging (after encryption): No Purge Prompt (after encryption): Yes
(after decryption): NO (after decryption): Yes
Times purged file overwritten: 1 Command Line: Exit
Re-use existing files: Prompt Key Entry Echo: On
____________________________________________________________________________
(C) Everett Enterprises, 7855 Wintercress Ln, Springfield, VA 22152
____________________________________________________________________________
Figure 25.
16
August 21, 1987
_______________________________________________________________
THE PRIVATE LINE
DISK WRITE VERIFY TOGGLE SWITCH
CURRENT STATUS: ON
A. TURN VERIFY SWITCH ON
B. TURN VERIFY SWITCH OFF
C. RETURN TO OPTIONS MENU
_______________________________________________________________
Figure 26.
d. Press 'B' to turn the switch off. The switch will be
turned off and the display updated to reflect the new condition.
Press 'C' to return to the additional options menu.
11. Key Entry Echo toggle switch:
a. If the key entry toggle switch is on, the key is
displayed as it is entered during the encryption and decryption
process. If the switch is turned off, the cursor will move as each
character is entered, but only the commas will be shown and the
verify step will be skipped. The default condition is ON.
b. To change the key entry echo toggle switch, select
'L', ADDITIONAL OPTIONS, on the master menu. The additional options
menu (see Figure 41), will appear. Press 'B' and the key entry toggle
switch will be displayed (see Figure 27).
c. Press 'A' to turn the switch on. The switch will be
turned on and the display updated to reflect the new condition.
Press 'C' to return to the additional options menu.
_______________________________________________________________
THE PRIVATE LINE
KEY ENTRY ECHO TOGGLE SWITCH
CURRENT STATUS: ON
A. TURN VERIFY SWITCH ON
B. TURN VERIFY SWITCH OFF
C. RETURN TO OPTIONS MENU
_______________________________________________________________
Figure 27.
17
August 21, 1987
12. Creating a sub-directory:
a. Creating a sub-directory is the same as the MKDIR
function in MS-DOS.
b. To create a sub-directory, choose option 'L' on the
master menu in order to obtain the additional options menu.
c. Press 'C' when the additional options menu appears. The
user will be asked to enter the disk drive on which the new sub-
directory is to be created (see Figure 28).
d. Press any letter (A-P) lower or upper case, which
represents a disk drive on your system. Again The Private Line will
check to determine if the entered disk drive actually exists. It it
does not exist, a message will be displayed. It it exists, but is
not the default drive, a message will be displayed which instructs
the user to insert the desired diskette and to press RETURN.
e. The current directory pathname of the selected disk drive
will be displayed and the user will be prompted to enter the name of
the sub-directory to be created (see Figure 29). You have to enter
the backslash followed by the name of the sub-directory to be
created. Press RETURN.
_______________________________________________________________
THE PRIVATE LINE
ENTER THE LETTER DESIGNATOR (A-P) OF THE DISK DRIVE
ON WHICH THE SUB-DIRECTORY SHOULD BE CREATED?
_______________________________________________________________
Figure 28.
_______________________________________________________________
THE PRIVATE LINE
CURRENT DIRECTORY:
X:
WHAT IS THE PATHNAME OF THE SUB-DIRECTORY TO BE CREATED?
_______________________________________________________________
Figure 29.
f. The sub-directory will be created and the user returned
to the additional options menu. If an error occurs, a message will
be displayed and the user will be instructed to press RETURN to
return to the additional options menu.
18
August 21, 1987
13. Changing the current sub-directory:
a. Changing the current sub-directory is the same as the CHDIR
function in MS-DOS.
b. To change the current sub-directory, choose option 'L'
on the master menu in order to obtain the additional options menu.
c. Press 'D' when the additional options menu appears. The
user will be asked to enter the disk drive on which the current sub-
directory is to be changed (see Figure 30).
d. Press any letter (A-P) lower or upper case, which
represents a disk drive on your system.
e. The current directory pathname of the selected disk
drive will be displayed and the user will be prompted to enter the
name of the new current sub-directory (see Figure 31). You have to
enter the backslash followed by the name of the sub-directory to be
changed. Press RETURN.
f. The current sub-directory will be changed and the user
returned to the additional options menu. If an error occurs, a
message will be displayed and the user will be instructed to press
RETURN to return to the additional options menu.
_______________________________________________________________
THE PRIVATE LINE
ENTER THE LETTER DESIGNATOR (A-P) OF THE DISK DRIVE
OF WHICH THE SUB-DIRECTORY SHOULD BE CHANGED?
_______________________________________________________________
Figure 30.
_______________________________________________________________
THE PRIVATE LINE
CURRENT DIRECTORY:
X:
WHAT IS THE PATHNAME OF THE NEW SUB-DIRECTORY?
_______________________________________________________________
Figure 31.
14. Removing a sub-directory:
a. Removing a sub-directory is the same as the RMDIR
function in MS-DOS.
19
August 21, 1987
b. To remove a sub-directory, choose option 'L'
on the master menu in order to obtain the additional options menu.
c. Press 'E' when the additional options menu appears. The
user will be asked to enter the disk drive on which the sub-
directory is to be removed (see Figure 32).
d. Press any letter (A-P) lower or upper case, which
represents a disk drive on your system.
e. The current directory pathname of the selected disk
drive will be displayed and the user will be prompted to enter the
name of the sub-directory to be removed (see Figure 33). You have
to enter the backslash followed by the name of the sub-directory to
be removed. Press RETURN.
f. The sub-directory will be removed and the user
returned to the additional options menu. If an error occurs, a
message will be displayed and the user will be instructed to press
RETURN to return to the additional options menu.
_______________________________________________________________
THE PRIVATE LINE
ENTER THE LETTER DESIGNATOR (A-P) OF THE DISK DRIVE
OF WHICH THE SUB-DIRECTORY SHOULD BE REMOVED?
_______________________________________________________________
Figure 32.
_______________________________________________________________
THE PRIVATE LINE
CURRENT DIRECTORY:
X:
WHAT IS THE PATHNAME OF THE SUB-DIRECTORY TO BE REMOVED?
_______________________________________________________________
Figure 33.
15. Erasing a file from a sub-directory:
a. Erasing a file from a sub-directory is the same as using
the 'del' command in MS-DOS.
b. From The Private Line master menu, choose option 'L'
in order to obtain the additional options menu.
c. When the additional options menu appears, press 'F'
(either upper or lower case) to erase a file from the directory.
20
August 21, 1987
d. The Private Line will ask for the name of the file to
be erased (see Figure 34). The file to be erased must be in the
current or specified directory of the selected drive.
_______________________________________________________________
THE PRIVATE LINE
WHAT IS THE NAME OF THE FILE TO BE ERASED?
_______________________________________________________________
Figure 34.
The Private Line will then attempt to find the desired file. If
the file is found, the user will be asked to verify that the file
is to be erased by pressing 'Y' or 'N' (see Figure 35). If 'Y'
is pressed, the filename will be removed from the directory. If
'N' is pressed, the user will be returned to the additional
options menu. After the filename has been erased, the user will
be informed that the filename has been removed from the
directory. The user is then instructed to press RETURN to
continue. After pressing RETURN, the user is returned to the
additional options menu.
_______________________________________________________________
THE PRIVATE LINE
Confirm Erasure of x:\pathname\filename.filetype (y/n)?
_______________________________________________________________
Figure 35.
16. Verification of Compliance with Data Encryption Standard.
Another feature is provided for those who desire more proof
that The Private Line actually works in compliance with the
requirements of the Data Encryption Standard contained in NBS
Special Publication 500-20. Listed below are the hexidecimal
values of the test keys, plain text, and ciphers used by the
National Bureau of Standards in order to determine if an
encryption algorithm produces the correct output. You may check
these by selecting Option G, Test DES Compliance, on the
Additional Options Menu. As each of the 171 tests are performed,
The Private Line will display the test key, test plain text,
expected cipher code and the generated cipher. The expected
cipher will be compared to the cipher generated by The Private
Line and the results of the comparison will be displayed for each
test. These tests are also performed each time that The Private
Line is started, as part of the initialization process, however,
no indication is given unless one of the tests fail. If one of
the tests fail, the only thing a user can do is to copy the
source diskette of The Private Line in order to obtain a good
copy. If that does not work, something has damaged or destroyed
21
August 21, 1987
the data contained on the diskette. You will need to obtain
another copy by downloading it or by requesting another disk from
Everett Enterprises at a nominal handling/postage charge of $10.
KEY PLAIN TEXT CIPHER TEXT
IP and E tests
1. 01,01,01,01,01,01,01,01 95,F8,A5,E5,DD,31,D9,00 80,00,00,00,00,00,00,00
2. 01,01,01,01,01,01,01,01 DD,7F,12,1C,A5,01,56,19 40,00,00,00,00,00,00,00
3. 01,01,01,01,01,01,01,01 2E,86,53,10,4F,38,34,EA 20,00,00,00,00,00,00,00
4. 01,01,01,01,01,01,01,01 4B,D3,88,FF,6C,D8,1D,4F 10,00,00,00,00,00,00,00
5. 01,01,01,01,01,01,01,01 20,B9,E7,67,B2,FB,14,56 08,00,00,00,00,00,00,00
6. 01,01,01,01,01,01,01,01 55,57,93,80,D7,71,38,EF 04,00,00,00,00,00,00,00
7. 01,01,01,01,01,01,01,01 6C,C5,DE,FA,AF,04,51,2F 02,00,00,00,00,00,00,00
8. 01,01,01,01,01,01,01,01 0D,9F,27,9B,A5,D8,72,60 01,00,00,00,00,00,00,00
9. 01,01,01,01,01,01,01,01 D9,03,1B,02,71,BD,5A,0A 00,80,00,00,00,00,00,00
10. 01,01,01,01,01,01,01,01 42,42,50,B3,7C,3D,D9,51 00,40,00,00,00,00,00,00
11. 01,01,01,01,01,01,01,01 B8,06,1B,7E,CD,9A,21,E5 00,20,00,00,00,00,00,00
12. 01,01,01,01,01,01,01,01 F1,5D,0F,28,6B,65,BD,28 00,10,00,00,00,00,00,00
13. 01,01,01,01,01,01,01,01 AD,D0,CC,8D,6E,5D,EB,A1 00,08,00,00,00,00,00,00
14. 01,01,01,01,01,01,01,01 E6,D5,F8,27,52,AD,63,D1 00,04,00,00,00,00,00,00
15. 01,01,01,01,01,01,01,01 EC,BF,E3,BD,3F,59,1A,5E 00,02,00,00,00,00,00,00
16. 01,01,01,01,01,01,01,01 F3,56,83,43,79,D1,65,CD 00,01,00,00,00,00,00,00
17. 01,01,01,01,01,01,01,01 2B,9F,98,2F,20,03,7F,A9 00,00,80,00,00,00,00,00
18. 01,01,01,01,01,01,01,01 88,9D,E0,68,A1,6F,0B,E6 00,00,40,00,00,00,00,00
19. 01,01,01,01,01,01,01,01 E1,9E,27,5D,84,6A,12,98 00,00,20,00,00,00,00,00
20. 01,01,01,01,01,01,01,01 32,9A,8E,D5,23,D7,1A,EC 00,00,10,00,00,00,00,00
21. 01,01,01,01,01,01,01,01 E7,FC,E2,25,57,D2,3C,97 00,00,08,00,00,00,00,00
22. 01,01,01,01,01,01,01,01 12,A9,F5,81,7F,F2,D6,5D 00,00,04,00,00,00,00,00
23. 01,01,01,01,01,01,01,01 A4,84,C3,AD,38,DC,9C,19 00,00,02,00,00,00,00,00
24. 01,01,01,01,01,01,01,01 FB,E0,0A,8A,1E,F8,AD,72 00,00,01,00,00,00,00,00
25. 01,01,01,01,01,01,01,01 75,0D,07,94,07,52,13,63 00,00,00,80,00,00,00,00
26. 01,01,01,01,01,01,01,01 64,FE,ED,9C,72,4C,2F,AF 00,00,00,40,00,00,00,00
27. 01,01,01,01,01,01,01,01 F0,2B,26,3B,32,8E,2B,60 00,00,00,20,00,00,00,00
28. 01,01,01,01,01,01,01,01 9D,64,55,5A,9A,10,B8,52 00,00,00,10,00,00,00,00
29. 01,01,01,01,01,01,01,01 D1,06,FF,0B,ED,52,55,D7 00,00,00,08,00,00,00,00
30. 01,01,01,01,01,01,01,01 E1,65,2C,6B,13,8C,64,A5 00,00,00,04,00,00,00,00
31. 01,01,01,01,01,01,01,01 E4,28,58,11,86,EC,8F,46 00,00,00,02,00,00,00,00
32. 01,01,01,01,01,01,01,01 AE,B5,F5,ED,E2,2D,1A,36 00,00,00,01,00,00,00,00
33. 01,01,01,01,01,01,01,01 E9,43,D7,56,8A,EC,0C,5C 00,00,00,00,80,00,00,00
34. 01,01,01,01,01,01,01,01 DF,98,C8,27,6F,54,B0,4B 00,00,00,00,40,00,00,00
35. 01,01,01,01,01,01,01,01 B1,60,E4,68,0F,6C,69,6F 00,00,00,00,20,00,00,00
36. 01,01,01,01,01,01,01,01 FA,07,52,B0,7D,9C,4A,B8 00,00,00,00,10,00,00,00
37. 01,01,01,01,01,01,01,01 CA,3A,2B,03,6D,BC,85,02 00,00,00,00,08,00,00,00
38. 01,01,01,01,01,01,01,01 5E,09,05,51,7B,B5,9B,CF 00,00,00,00,04,00,00,00
39. 01,01,01,01,01,01,01,01 81,4E,EB,3B,91,D9,07,26 00,00,00,00,02,00,00,00
40. 01,01,01,01,01,01,01,01 4D,49,DB,15,32,91,9C,9F 00,00,00,00,01,00,00,00
41. 01,01,01,01,01,01,01,01 25,EB,5F,C3,F8,CF,06,21 00,00,00,00,00,80,00,00
42. 01,01,01,01,01,01,01,01 AB,6A,20,C0,62,0D,1C,6F 00,00,00,00,00,40,00,00
43. 01,01,01,01,01,01,01,01 79,E9,0D,BC,98,F9,2C,CA 00,00,00,00,00,20,00,00
44. 01,01,01,01,01,01,01,01 86,6E,CE,DD,80,72,BB,0E 00,00,00,00,00,10,00,00
45. 01,01,01,01,01,01,01,01 8B,54,53,6F,2F,3E,64,A8 00,00,00,00,00,08,00,00
46. 01,01,01,01,01,01,01,01 EA,51,D3,97,55,95,B8,6B 00,00,00,00,00,04,00,00
22
August 21, 1987
KEY PLAIN TEXT CIPHER TEXT
IP and E tests (continued)
47. 01,01,01,01,01,01,01,01 CA,FF,C6,AC,45,42,DE,31 00,00,00,00,00,02,00,00
48. 01,01,01,01,01,01,01,01 8D,D4,5A,2D,DF,90,79,6C 00,00,00,00,00,01,00,00
49. 01,01,01,01,01,01,01,01 10,29,D5,5E,88,0E,C2,D0 00,00,00,00,00,00,80,00
50. 01,01,01,01,01,01,01,01 5D,86,CB,23,63,9D,BE,A9 00,00,00,00,00,00,40,00
51. 01,01,01,01,01,01,01,01 1D,1C,A8,53,AE,7C,0C,5F 00,00,00,00,00,00,20,00
52. 01,01,01,01,01,01,01,01 CE,33,23,29,24,8F,32,28 00,00,00,00,00,00,10,00
53. 01,01,01,01,01,01,01,01 84,05,D1,AB,E2,4F,B9,42 00,00,00,00,00,00,08,00
54. 01,01,01,01,01,01,01,01 E6,43,D7,80,90,CA,42,07 00,00,00,00,00,00,04,00
55. 01,01,01,01,01,01,01,01 48,22,1B,99,37,74,8A,23 00,00,00,00,00,00,02,00
56. 01,01,01,01,01,01,01,01 DD,7C,0B,BD,61,FA,FD,54 00,00,00,00,00,00,01,00
57. 01,01,01,01,01,01,01,01 2F,BC,29,1A,57,0D,B5,C4 00,00,00,00,00,00,00,80
58. 01,01,01,01,01,01,01,01 E0,7C,30,D7,E4,E2,6E,12 00,00,00,00,00,00,00,40
59. 01,01,01,01,01,01,01,01 09,53,E2,25,8E,8E,90,A1 00,00,00,00,00,00,00,20
60. 01,01,01,01,01,01,01,01 5B,71,1B,C4,CE,EB,F2,EE 00,00,00,00,00,00,00,10
61. 01,01,01,01,01,01,01,01 CC,08,3F,1E,6D,9E,85,F6 00,00,00,00,00,00,00,08
62. 01,01,01,01,01,01,01,01 D2,FD,88,67,D5,0D,2D,FE 00,00,00,00,00,00,00,04
63. 01,01,01,01,01,01,01,01 06,E7,EA,22,CE,92,70,8F 00,00,00,00,00,00,00,02
64. 01,01,01,01,01,01,01,01 16,6B,40,B4,4A,BA,4B,D6 00,00,00,00,00,00,00,01
KEY PLAIN TEXT CIPHER TEXT
PC1 AND PC2 TESTS
65. 80,01,01,01,01,01,01,01 00,00,00,00,00,00,00,00 95,A8,D7,28,13,DA,A9,4D
66. 40,01,01,01,01,01,01,01 00,00,00,00,00,00,00,00 0E,EC,14,87,DD,8C,26,D5
67. 20,01,01,01,01,01,01,01 00,00,00,00,00,00,00,00 7A,D1,6F,FB,79,C4,59,26
68. 10,01,01,01,01,01,01,01 00,00,00,00,00,00,00,00 D3,74,62,94,CA,6A,6C,F3
69. 08,01,01,01,01,01,01,01 00,00,00,00,00,00,00,00 80,9F,5F,87,3C,1F,D7,61
70. 04,01,01,01,01,01,01,01 00,00,00,00,00,00,00,00 C0,2F,AF,FE,C9,89,D1,FC
71. 02,01,01,01,01,01,01,01 00,00,00,00,00,00,00,00 46,15,AA,1D,33,E7,2F,10
72. 01,80,01,01,01,01,01,01 00,00,00,00,00,00,00,00 20,55,12,33,50,C0,08,58
73. 01,40,01,01,01,01,01,01 00,00,00,00,00,00,00,00 DF,3B,99,D6,57,73,97,C8
74. 01,20,01,01,01,01,01,01 00,00,00,00,00,00,00,00 31,FE,17,36,9B,52,88,C9
75. 01,10,01,01,01,01,01,01 00,00,00,00,00,00,00,00 DF,DD,3C,C6,4D,AE,16,42
76. 01,08,01,01,01,01,01,01 00,00,00,00,00,00,00,00 17,8C,83,CE,2B,39,9D,94
77. 01,04,01,01,01,01,01,01 00,00,00,00,00,00,00,00 50,F6,36,32,4A,9B,7F,80
78. 01,02,01,01,01,01,01,01 00,00,00,00,00,00,00,00 A8,46,8E,E3,BC,18,F0,6D
79. 01,01,80,01,01,01,01,01 00,00,00,00,00,00,00,00 A2,DC,9E,92,FD,3C,DE,92
80. 01,01,40,01,01,01,01,01 00,00,00,00,00,00,00,00 CA,C0,9F,79,7D,03,12,87
81. 01,01,20,01,01,01,01,01 00,00,00,00,00,00,00,00 90,BA,68,0B,22,AE,B5,25
82. 01,01,10,01,01,01,01,01 00,00,00,00,00,00,00,00 CE,7A,24,F3,50,E2,80,B6
83. 01,01,08,01,01,01,01,01 00,00,00,00,00,00,00,00 88,2B,FF,0A,A0,1A,0B,87
84. 01,01,04,01,01,01,01,01 00,00,00,00,00,00,00,00 25,61,02,88,92,45,11,C2
85. 01,01,02,01,01,01,01,01 00,00,00,00,00,00,00,00 C7,15,16,C2,9C,75,D1,70
86. 01,01,01,80,01,01,01,01 00,00,00,00,00,00,00,00 51,99,C2,9A,52,C9,F0,59
87. 01,01,01,40,01,01,01,01 00,00,00,00,00,00,00,00 C2,2F,0A,29,4A,71,F2,9F
88. 01,01,01,20,01,01,01,01 00,00,00,00,00,00,00,00 EE,37,14,83,71,4C,02,EA
89. 01,01,01,10,01,01,01,01 00,00,00,00,00,00,00,00 A8,1F,BD,44,8F,9E,52,2F
90. 01,01,01,08,01,01,01,01 00,00,00,00,00,00,00,00 4F,64,4C,92,E1,92,DF,ED
91. 01,01,01,04,01,01,01,01 00,00,00,00,00,00,00,00 1A,FA,9A,66,A6,DF,92,AE
23
August 21, 1987
KEY PLAIN TEXT CIPHER TEXT
PC1 AND PC2 TESTS (continued)
92. 01,01,01,02,01,01,01,01 00,00,00,00,00,00,00,00 B3,C1,CC,71,5C,B8,79,D8
93. 01,01,01,01,80,01,01,01 00,00,00,00,00,00,00,00 19,D0,32,E6,4A,B0,BD,8B
94. 01,01,01,01,40,01,01,01 00,00,00,00,00,00,00,00 3C,FA,A7,A7,DC,87,20,DC
95. 01,01,01,01,20,01,01,01 00,00,00,00,00,00,00,00 B7,26,5F,7F,44,7A,C6,F3
96. 01,01,01,01,10,01,01,01 00,00,00,00,00,00,00,00 9D,B7,3B,3C,0D,16,3F,54
97. 01,01,01,01,08,01,01,01 00,00,00,00,00,00,00,00 81,81,B6,5B,AB,F4,A9,75
98. 01,01,01,01,04,01,01,01 00,00,00,00,00,00,00,00 93,C9,B6,40,42,EA,A2,40
99. 01,01,01,01,02,01,01,01 00,00,00,00,00,00,00,00 55,70,53,08,29,70,55,92
100. 01,01,01,01,01,80,01,01 00,00,00,00,00,00,00,00 86,38,80,9E,87,87,87,A0
101. 01,01,01,01,01,40,01,01 00,00,00,00,00,00,00,00 41,B9,A7,9A,F7,9A,C2,08
102. 01,01,01,01,01,20,01,01 00,00,00,00,00,00,00,00 7A,9B,E4,2F,20,09,A8,92
103. 01,01,01,01,01,10,01,01 00,00,00,00,00,00,00,00 29,03,8D,56,BA,6D,27,45
104. 01,01,01,01,01,08,01,01 00,00,00,00,00,00,00,00 54,95,C6,AB,F1,E5,DF,51
105. 01,01,01,01,01,04,01,01 00,00,00,00,00,00,00,00 AE,13,DB,D5,61,48,89,33
106. 01,01,01,01,01,02,01,01 00,00,00,00,00,00,00,00 02,4D,1F,FA,89,04,E3,89
107. 01,01,01,01,01,01,80,01 00,00,00,00,00,00,00,00 D1,39,97,12,F9,9B,F0,2E
108. 01,01,01,01,01,01,40,01 00,00,00,00,00,00,00,00 14,C1,D7,C1,CF,FE,C7,9E
109. 01,01,01,01,01,01,20,01 00,00,00,00,00,00,00,00 1D,E5,27,9D,AE,3B,ED,6F
110. 01,01,01,01,01,01,10,01 00,00,00,00,00,00,00,00 E9,41,A3,3F,85,50,13,03
111. 01,01,01,01,01,01,08,01 00,00,00,00,00,00,00,00 DA,99,DB,BC,9A,03,F3,79
112. 01,01,01,01,01,01,04,01 00,00,00,00,00,00,00,00 B7,FC,92,F9,1D,8E,92,E9
113. 01,01,01,01,01,01,02,01 00,00,00,00,00,00,00,00 AE,8E,5C,AA,3C,A0,4E,85
114. 01,01,01,01,01,01,01,80 00,00,00,00,00,00,00,00 9C,C6,2D,F4,3B,6E,ED,74
115. 01,01,01,01,01,01,01,40 00,00,00,00,00,00,00,00 D8,63,DB,B5,C5,9A,91,A0
116. 01,01,01,01,01,01,01,20 00,00,00,00,00,00,00,00 A1,AB,21,90,54,5B,91,D7
117. 01,01,01,01,01,01,01,10 00,00,00,00,00,00,00,00 08,75,04,1E,64,C5,70,F7
118. 01,01,01,01,01,01,01,08 00,00,00,00,00,00,00,00 5A,59,45,28,BE,BE,F1,CC
119. 01,01,01,01,01,01,01,04 00,00,00,00,00,00,00,00 FC,DB,32,91,DE,21,F0,C0
120. 01,01,01,01,01,01,01,02 00,00,00,00,00,00,00,00 86,9E,FD,7F,9F,26,5A,09
KEY PLAIN TEXT CIPHER TEXT
PTESTS
121. 10,46,91,34,89,98,01,31 00,00,00,00,00,00,00,00 88,D5,5E,54,F5,4C,97,B4
122. 10,07,10,34,89,98,80,20 00,00,00,00,00,00,00,00 0C,0C,C0,0C,83,EA,48,FD
123. 10,07,10,34,C8,98,01,20 00,00,00,00,00,00,00,00 83,BC,8E,F3,A6,57,01,83
124. 10,46,10,34,89,98,80,20 00,00,00,00,00,00,00,00 DF,72,5D,CA,D9,4E,A2,E9
125. 10,86,91,15,19,19,01,01 00,00,00,00,00,00,00,00 E6,52,B5,3B,55,0B,E8,B0
126. 10,86,91,15,19,58,01,01 00,00,00,00,00,00,00,00 AF,52,71,20,C4,85,CB,B0
127. 51,07,B0,15,19,58,01,01 00,00,00,00,00,00,00,00 0F,04,CE,39,3D,B9,26,D5
128. 10,07,B0,15,19,19,01,01 00,00,00,00,00,00,00,00 C9,F0,0F,FC,74,07,90,67
129. 31,07,91,54,98,08,01,01 00,00,00,00,00,00,00,00 7C,FD,82,A5,93,25,2B,4E
130. 31,07,91,94,98,08,01,01 00,00,00,00,00,00,00,00 CB,49,A2,F9,E9,13,63,E3
131. 10,07,91,15,B9,08,01,40 00,00,00,00,00,00,00,00 00,B5,88,BE,70,D2,3F,56
132. 31,07,91,15,98,08,01,40 00,00,00,00,00,00,00,00 40,6A,9A,6A,B4,33,99,AE
133. 10,07,D0,15,89,98,01,01 00,00,00,00,00,00,00,00 6C,B7,73,61,1D,CA,9A,DA
134. 91,07,91,15,89,98,01,01 00,00,00,00,00,00,00,00 67,FD,21,C1,7D,BB,5D,70
135. 91,07,D0,15,89,19,01,01 00,00,00,00,00,00,00,00 95,92,CB,41,10,43,07,87
136. 10,07,D0,15,98,98,01,20 00,00,00,00,00,00,00,00 A6,B7,FF,68,A3,18,DD,D3
24
August 21, 1987
KEY PLAIN TEXT CIPHER TEXT
PTESTS (continued)
137. 10,07,94,04,98,19,01,01 00,00,00,00,00,00,00,00 4D,10,21,96,C9,14,CA,16
138. 01,07,91,04,91,19,04,01 00,00,00,00,00,00,00,00 2D,FA,9F,45,73,59,49,65
139. 01,07,91,04,91,19,01,01 00,00,00,00,00,00,00,00 B4,66,04,81,6C,0E,07,74
140. 01,07,94,04,91,19,04,01 00,00,00,00,00,00,00,00 6E,7E,62,21,A4,F3,4E,87
141. 19,07,92,10,98,1A,01,01 00,00,00,00,00,00,00,00 AA,85,E7,46,43,23,31,99
142. 10,07,91,19,98,19,08,01 00,00,00,00,00,00,00,00 2E,59,19,DB,4D,19,62,D6
143. 10,07,91,19,98,1A,08,01 00,00,00,00,00,00,00,00 23,A8,66,A8,09,D3,08,94
144. 10,07,92,10,98,19,01,01 00,00,00,00,00,00,00,00 D8,12,D9,61,F0,17,D3,20
145. 10,07,91,15,98,19,01,0B 00,00,00,00,00,00,00,00 05,56,05,81,6E,58,60,8F
146. 10,04,80,15,98,19,01,01 00,00,00,00,00,00,00,00 AB,D8,8E,8B,1B,77,16,F1
147. 10,04,80,15,98,19,01,02 00,00,00,00,00,00,00,00 53,7A,C9,5B,E6,9D,A1,E1
148. 10,04,80,15,98,19,01,08 00,00,00,00,00,00,00,00 AE,D0,F6,AE,3C,25,CD,D8
149. 10,02,91,15,98,10,01,04 00,00,00,00,00,00,00,00 B3,E3,5A,5E,E5,3E,7B,8D
150. 10,02,91,15,98,19,01,04 00,00,00,00,00,00,00,00 61,C7,9C,71,92,1A,2E,F8
151. 10,02,91,15,98,10,02,01 00,00,00,00,00,00,00,00 E2,F5,72,8F,09,95,01,3C
152. 10,02,91,16,98,10,01,01 00,00,00,00,00,00,00,00 1A,EA,C3,9A,61,F0,A4,64
KEY PLAIN TEXT CIPHER TEXT
S-BOX TESTS
153. 7C,A1,10,45,4A,1A,6E,57 01,A1,D6,D0,39,77,67,42 69,0F,5B,0D,9A,26,93,9B
154. 01,31,D9,61,9D,C1,37,6E 5C,D5,4C,A8,3D,EF,57,DA 7A,38,9D,10,35,4B,D2,71
155. 07,A1,13,3E,4A,0B,26,86 02,48,D4,38,06,F6,71,72 86,8E,BB,51,CA,B4,59,9A
156. 38,49,67,4C,26,02,31,9E 51,45,4B,58,2D,DF,44,0A 71,78,87,6E,01,F1,9B,2A
157. 04,B9,15,BA,43,FE,B5,B6 42,FD,44,30,59,57,7F,A2 AF,37,FB,42,1F,8C,40,95
158. 01,13,B9,70,FD,34,F2,CE 05,9B,5E,08,51,CF,14,3A 86,A5,60,F1,0E,C6,D8,5B
159. 01,70,F1,75,46,8F,B5,E6 07,56,D8,E0,77,47,61,D2 0C,D3,DA,02,00,21,DC,09
160. 43,29,7F,AD,38,E3,73,FE 76,25,14,B8,29,BF,48,6A EA,67,6B,2C,B7,DB,2B,7A
161. 07,A7,13,70,45,DA,2A,16 3B,DD,11,90,49,37,28,02 DF,D6,4A,81,5C,AF,1A,0F
162. 04,68,91,04,C2,FD,3B,2F 26,95,5F,68,35,AF,60,9A 5C,51,3C,9C,48,86,C0,88
163. 37,D0,6B,B5,16,CB,75,46 16,4D,5E,40,4F,27,52,32 0A,2A,EE,AE,3F,F4,AB,77
164. 1F,08,26,0D,1A,C2,46,5E 6B,05,6E,18,75,9F,5C,CA EF,1B,F0,3E,5D,FA,57,5A
165. 58,40,23,64,1A,BA,61,76 00,4B,D6,EF,09,17,60,62 88,BF,0D,B6,D7,0D,EE,56
166. 02,58,16,16,46,29,B0,07 48,0D,39,00,6E,E7,62,F2 A1,F9,91,55,41,02,0B,56
167. 49,79,3E,BC,79,B3,25,8F 43,75,40,C8,69,8F,3C,FA 6F,BF,1C,AF,CF,FD,05,56
168. 4F,B0,5E,15,15,AB,73,A7 07,2D,43,A0,77,07,52,92 2F,22,E4,9B,AB,7C,A1,AC
169. 49,E9,5D,6D,4C,A2,29,BF 02,FE,55,77,81,17,F1,2A 5A,6B,61,2C,C2,6C,CE,4A
170. 01,83,10,DC,40,9B,26,D6 1D,9D,5C,50,18,F7,28,C2 5F,4C,03,8E,D1,2B,2E,41
171. 1C,58,7F,1C,13,92,4F,EF 30,55,32,28,6D,6F,29,5A 63,FA,C0,D0,34,D9,F7,93
25
August 21, 1987
17. Selecting Alphabetic or Hexidecimal keys
a. Either hexidecimal or alphabetic keys may be
selected by choosing Option H on the Additional Options Menu.
b. From the Master Menu, select Option L, Additional
Options Menu by pressing the letter 'L', upper or lower case.
c. From the Additional Options Menu, select Option H by
pressing the letter 'H', upper or lower case. When the Key Type
Status Menu appears (see Figure 36), press the letter of your
choice. The menu will be changed to reflect your selection.
Press the letter 'C' to return to the Additional Options Menu.
d. Your selection will be effective for the duration of
this work session only. If you wish to change it again during
this session, repeat the steps a thru c, above.
e. If you wish to make your selection the new default
which will be in effect the next time The Private Line is
started, see Section 19, Saving Switch Settings.
f. Only alphabetic keys may be used in the command line
mode. It does not matter what the current default setting is.
If you have chosen hexidecimal keys and saved that selection, you
still are required to use alphabetic keys from the command line.
However, if you also have selected the command line exit action
of Master Menu, then you will enter a key according to the
current setting once you return to the Master Menu.
_______________________________________________________________
THE PRIVATE LINE
KEY TYPE STATUS
CURRENT STATUS: Alphabetic
OPTIONS
A. Use Hexidecimal keys
B. Use Alphabetic keys
C. RETURN TO OPTIONS MENU
Enter the letter of your choice:
_______________________________________________________________
Figure 36.
18. Changing Purging Status
a. Several features may be selected concerning the
purging status.
b. From the Master Menu, select Option L, Additional
Options Menu by pressing the letter 'L', upper or lower case.
26
August 21, 1987
c. From the Additional Options Menu, select Option I by
pressing the letter 'I', upper or lower case. When the Purging
Status Menu appears (see Figure 37), press the letter of your
choice. The menu will be changed to reflect your selection.
Press the letter 'C' to return to the Additional Options Menu.
d. Your selection will be effective for the duration of
this work session only. If you wish to change it again during
this session, repeat the steps a thru c, above.
e. If you wish to make your selection the new default
which will be in effect the next time The Private Line is
started, see Section 19, Saving Switch Settings.
f. It should be noted that if you select automatic
purge of the input file after encryption, you will not be
prompted to confirm the purge, regardless of the setting of the
prompt switch. This is also true for automatic purging after
decryption.
____________________________________________________________________________
THE PRIVATE LINE
PURGING STATUS
OPTIONS
A. Change Automatic purge status after encryption
B. Change Automatic purge status after decryption
C. Change purge prompt status after encryption
D. Changepurge prompt status after decryption
E. Enter the number of times purged file is overwritten
F. Return to Additional Options Menu
Enter the letter of your choice:
____________________________________________________________________________
Current Switch Selections
Key type: Alphabetic Disk verify after write: On
Automatic Purging (after encryption): No Purge Prompt (after encryption): Yes
(after decryption): NO (after decryption): Yes
Times purged file overwritten: 1 Command Line: Exit
Re-use existing files: Prompt Key Entry Echo: On
____________________________________________________________________________
(C) Everett Enterprises, 7855 Wintercress Ln, Springfield, VA 22152
____________________________________________________________________________
Figure 37.
27
August 21, 1987
19. Saving Switch Settings
a. The switch settings displayed below the Master Menu
may be changed from the Additional Options Menu for either the
duration of the current session by selecting the appropriate
option or they may be changed permamently, also from the
Additional Options Menu using Option J.
b. To change an individual option for the duration of
the current work session, see the appropriate section.
c. To save the current settings permamently, select
Option L, Additional Options Menu from the Master Menu by
pressing the letter 'L', upper or lower case.
d. From the Additional Options Menu, select Option J by
pressing the letter 'J', upper or lower case. When the Save
Switch Settings to Disk Menu appears (see Figure 38), press the
letter of your choice. The switch settings will be saved in
\tpl.def and you will be returned to the Additional Options Menu.
e. The current settings will be effective until you
change them during this work session. If you change your selection
during this session but do not save it to disk, you will obtain
the previous default settings when you again use The Private
Line.
f. If you delete \tpl.def from the root directory, you
will obtain the original default settings shown below:
____________________________________________________________________________
THE PRIVATE LINE
Save Switch Settings to Disk
OPTIONS
A. Save Current Switch Settings to Disk
B. RETURN TO OPTIONS MENU
Enter the letter of your choice:
____________________________________________________________________________
Current Switch Selections
Key type: Alphabetic Disk verify after write: On
Automatic Purging (after encryption): No Purge Prompt (after encryption): Yes
(after decryption): NO (after decryption): Yes
Times purged file overwritten: 1 Command Line: Exit
Re-use existing files: Prompt Key Entry Echo: On
____________________________________________________________________________
(C) Everett Enterprises, 7855 Wintercress Ln, Springfield, VA 22152
____________________________________________________________________________
Figure 38.
28
August 21, 1987
20. Selecting Command Line exit action
a. You may either exit to the operating system or you
may exit to the master menu upon termination of the command line
action. Command line exit action is selected by choosing Option
K on the Additional Options Menu.
b. From the Master Menu, select Option L, Additional
Options Menu by pressing the letter 'L', upper or lower case.
c. From the Additional Options Menu, select Option K by
pressing the letter 'K', upper or lower case. When the Command
Line Exit Status Menu appears (see Figure 39), press the letter
of your choice. The menu will be changed to reflect your
selection. Press the letter 'C' to return to the Additional
Options Menu.
d. Your selection will be effective for the duration of
this work session only. If you wish to change it again during
this session, repeat the steps a thru c, above.
e. If you wish to make your selection the new default
which will be in effect the next time The Private Line is
started, see Section 19, Saving Switch Settings.
_________________________________________________________________
THE PRIVATE LINE
Command Line Exit Status
CURRENT STATUS: Menu
OPTIONS
A. Exit after Command Line
B. Return to Master Menu after Command Line
C. RETURN TO OPTIONS MENU
Enter the letter of your choice:
_________________________________________________________________
Figure 39.
21. Changing File Re-use Status
a. You may automatically re-use a file which currently
exits or you may be prompted before it is re-used.
b. From the Master Menu, select Option L, Additional
Options Menu by pressing the letter 'L', upper or lower case.
c. From the Additional Options Menu, select Option L by
pressing the letter 'L', upper or lower case. When the Change
29
August 21, 1987
File Re-use Status Menu appears (see Figure 40), press the letter
of your choice. The menu will be changed to reflect your
selection. Press the letter 'C' to return to the Additional
Options Menu.
d. Your selection will be effective for the duration of
this work session only. If you wish to change it again during
this session, repeat the steps a thru c, above.
e. If you wish to make your selection the new default
which will be in effect the next time The Private Line is
started, see Section 19, Saving Switch Settings.
_________________________________________________________________
THE PRIVATE LINE
Re-Use Existing File Status
CURRENT STATUS: Prompt
OPTIONS
A. Prompt user before re-use
B. Automatically re-use
C. RETURN TO OPTIONS MENU
Enter the letter of your choice:
_________________________________________________________________
Figure 40.
C. Command Line execution
1. Encryption - A file may be encrypted from the DOS prompt
using an alphabetic key consisting of 1-16 characters. The key
will be right-filled with blanks (hex value 20H) to the shorter of 8
or 16 characters. If 16 characters are used, the file will be doubly
encrypted. To encrypt a file from the DOS prompt, take the following
steps:
a. Type 'private e ' followed by a file name followed by
a space and an alphabtic key of 1 to 16 characters. Remember
that the characters in the key are case specific. The file name
may be any MS-DOS file name; it may contain a pathname
specification.
b. All current default switches are valid when the
command line mode is used except the key type. Regardless of the
key type setting, only alphabtetic keys are allowed on the
command line entry. If the command line mode exits to the master
menu, the current setting for the key type again takes
precedence.
30
August 21, 1987
c. Example: 'private e \tpl\msg.dat abcdefgH'.
2. Decryption - A file may be decrypted from the DOS prompt
using an alphabetic key consisting of 1-16 characters. The key
will be right-filled with blanks (hex value 20H) to the shorter of 8
or 16 characters. If 16 characters are used, the file will be doubly
decrypted. To decrypt a file from the DOS prompt, take the following
steps:
a. Type 'private d ' followed by a file name followed by
a space and an alphabtic key of 1 to 16 characters. Remember
that the characters in the key are case specific. The file name
may be any MS-DOS file name; it may contain a pathname
specification.
b. All current default switches are valid when the
command line mode is used except the key type. Regardless of the
key type setting, only alphabtetic keys are allowed on the
command line entry. If the command line mode exits to the master
menu, the current setting for the key type again takes
precedence.
c. Example: 'private d \tpl\msg.dat abcdefgH'.
3. Command Line Exit action - The command line mode may exit to
DOS or it may exit to The Private Line Master Menu. If the current
setting saved in \tpl.def indicates 'EXIT', The Private Line will
return to the DOS prompt upon termination of encryption or decryption.
If 'MENU' is the current setting, the command line mode will pass to
the master menu upon completion of either encryption or decryption.
To change the action taken upon termination of the command line
option, see paragraph 20, Section II B, 'Selecting Command Line exit
action.'
4. Only encryption or decryption, single or double, may be
performed from the MS-DOS command line. All other actions must be
selected from the master menu.
D. Other Aspects of The Private Line
1. Selection of keys - Users should pick keys which are random
and known only by the user and intended recipient. Keys such as
one's nickname, spouse's name, or other keys which could be
associated with either the user or the recipient, should not be
used. Using one's birthday or wedding date is not a good idea.
Such keys are too easy to guess. Keys should be changed as
frequently as possible, depending on the criticality of the data
involved.
2. Protection of keys - Keys should be afforded the same
protection as the data itself. Keys should never be stored with
either the clear text or the associated encrypted file. After a key
has been used by The Private Line, it as well as the input and
output data areas, is overwritten with binary zeroes in order to
31
August 21, 1987
preclude a possible compromise. For obvious reasons, users should
take special care not to lose or destroy keys of files which are
maintained only in encrypted form.
3. Destruction of unencrypted data - Files which have been
encrypted may be maintained in clear form in a safe and secure
place, separate from that used to store either the keys or the
encrypted file. This will protect the user against either lost keys
or destruction of data because of CPU or disk failure (hopefully a
rare occurence).
4. When the Private Line terminates execution, it has destroyed
all data, including keys, maintained in RAM memory and input/output
buffers.
32
August 21, 1987
III. Requirements
A. Hardware requirements: IBM PC, XT, AT, PS/2 or compatible.
B. Software requirements: MS-DOS Operating System, Version 2.X or
later, including 3.X.
C. Memory requirements: 64K.
33
August 21, 1987
IV. REFERENCES
a. Bosworth, Bruce. Codes, Ciphers, and Computers.
Rochelle Park, New Jersey: Hayden Book Company, 1982.
b. Data Encryption Standard Federal Information Processing
Standard (FIPS) Publication 46, National Bureau of Standards,
U.S. Department of Commerce, Washington, D.C., January 1977.
c. Meyer, Carl H. and Stephen M. Matyas. Cryptography.
New York: John Wiley & Sons, 1982.
d. Norton, Peter. MS-DOS and PC-DOS User's Guide.
Englewood Cliffs: Prentics/Hall International, 1984.
e. Validating the Correctness of Hardware Implementations of the
NBS Data Encryption Standard, NBS Special Publication 500-20,
National Bureau of Standards, U.S. Department of Commerce,
Washington, D.C., 1977.
34
August 21, 1987
V. THE PRIVATE LINE PROBLEM REPORT
Date: ________________ Version #: ___________
Please Report only one problem per report.
Describe your hardware and operating system. Please include disk
format.
Please provide a clear description of the problem and the
circumstances surrounding its occurence. If possible, give an
example. If a software patch or other solution is being used,
please provide a complete description.
This form may also be used to submit suggested enhancements to The
Private Line.
Problem Description:
Please complete the following before submitting the form:
Name: ____________________________ Phone: ______________________
Company: _______________________________________________________
Address: _______________________________________________________
City: __________________________________________________________
State: _________ ZIP:______________
Return this form to: Everett Enterprises
7855 Wintercress Lane
Springfield, VA 22152
35
August 21, 1987
VI. Changes and Updates
A. Changes.
1. Version 4.01 of The Private Line included an improved
binary to ASCII conversion routine. Previous versions contained
an algorith which doubled the size of the file when converting
from binary to ASCII. This version, however, increases the file
only by 37%. The user must be cautioned that files converted to
ASCII by earlier versions must be converted to binary by the same
version before decryption can take place.
2. The other major change in Version 4.01 is an improved
directory listing routine. Older versions of The Private Line
only allowed the current directory to be listed. This version
(4.01) allows the user to specify any pathname, including
wildcard characters.
3. Version 4.02 adds an automated compliance test to
determine if the program complies with the Data Encryption
Standard. The test is run at program initialization time and is
invisible to the user unless one of the 19 tests fail. The user
may also run the compliance tests and view the results of each
test by selecting option G from the additional options menu.
4. Version 4.03 added all 171 tests used by the National
Bureau of Standards to verify compliance with the DES.
5. Version 4.04 contained an improved display routine and
changed the encryption routine so that the encrypted file was no
more than 1-7 bytes longer than the source file. Previous
versions expanded the encrypted file to the end of the last 128
byte sector in the source file.
6. Version 4.05 added a routine which allowed the display
of the default directory (*.*) by simply pressing RETURN. It
also fixed a bug in the display directory routine which occurred
if a file type contained only 1 or 2 characters.
7. Version 5.0 adds the capability of using alphabetic
keys, command line execution and the following user-set default
switches:
a. key echo
b. automatic purge of input files after encryption
and/or decryption
c. purge prompting of input file after encryption and/or
decryption
d. verify after disk writes
e. key types
f. re-use of existing files with or without prompts
g. the number of times a file is overwritten with binary
zeros before the file name is removed from the directory.
36
August 21, 1987
8. Version 5.0 also uses raw output mode in order to speed
up The Private Line.
B. Updates.
Updates to The Private Line may be obtained from the IBM
Software Special Interest Group (IBMSW SIG) on CompuServe by
downloading the file, TPL.ARC. This file contains all of the
files associated with The Private Line, including the User Manual
documentation. It is located in Data Library 0.
Or, one may order a diskette from Everett Enterprises
containing the latest version of The Private Line at a nominal
cost of $10 (media, handling, and postage fee).
Registration fees have to be paid only once. All updates
are included in that one price. The nominal disk fee of $10 is
due each time a diskette is obtained from Everett Enterprises.
37
August 21, 1987
VII. INDEX
compliance with DES tests 21
decrypting files 9
default switches 28
changing 28
temporary 28
permament 28
original values 28
displaying disk directories 12
displaying files 9
double decryption 13
encryption 13
encrypting files 3
erasing files 24
exit, action taken upon command line 29
files
ASCII 14
binary 15
contracted 15
erasing 20
expanded 14
printable 15
purging 10
re-use 29
automatic 29
with prompts 29
invoices viii
keys 26
alphabetic 26
hexidecimal 26
printing files 15
Private Line, The
action upon receipt 2
floppy disk systems 2
hard disk systems 3
execution
command line 29
menu 29
testing 21
using 3
problem reports 35
purging
automatic 26
with prompts 26
references 34
requirements 33
hardware 33
memory 33
software 37
trouble reports 35
user set options 28
automatic purge 26
command line exit action 29
38
August 21, 1987
disk write verification 16
file re-use 29
key echo 17
key type 26
number of times files overwritten 26
purge prompt 26
write verify 16
39
Very nice! Thank you for this wonderful archive. I wonder why I found it only now. Long live the BBS file archives!
This is so awesome! 😀 I’d be cool if you could download an entire archive of this at once, though.
But one thing that puzzles me is the “mtswslnkmcjklsdlsbdmMICROSOFT” string. There is an article about it here. It is definitely worth a read: http://www.os2museum.com/wp/mtswslnk/