Dec 072017
 
GLOBAL SECURITY - VERSION 2.1 A Transmission Security Program. Encipher, transmit, then decipher your data at the other end.

Full Description of File


GLOBAL SECURITY - VERSION 2.1 A
Transmission Security Program. Encipher,
transmit, then decipher your data at the
other end. Safe from the super computers of
the National Security Agency (NSA). Now
includes data compression and WIPING of
original file. Prepares and enciphers text
and binary files for sending over all E-Mail
Services.


File GLBSEC21.ZIP from The Programmer’s Corner in
Category Utilities for DOS and Windows Machines
GLOBAL SECURITY – VERSION 2.1 A Transmission Security Program. Encipher, transmit, then decipher your data at the other end.
File Name File Size Zip Size Zip Type
FILE_ID.DIZ 360 247 deflated
GS.DOC 143318 41697 deflated
GS16.EXE 149652 55671 deflated
GS32.EXE 132104 54277 deflated
HISTORY.DOC 4403 1736 deflated
INSTALL.BAT 585 289 deflated
READ_ME.BAT 430 266 deflated
REGISTER.DOC 2338 901 deflated
SHR_WARE.DOC 28061 8950 deflated
SITELICE.DOC 16075 5352 deflated
VENDINFO.DIZ 16492 6968 deflated
VENDOR.DOC 216 83 deflated

Download File GLBSEC21.ZIP Here

Contents of the GS.DOC file






Global Security
A Transmission Security Program
Version 2.1 1 July 1994
A Shareware Distributed Program






CUSTOMER SERVICE

If you experience any problems with
this program, please write to:

MacGregor K. Phillips
Sto. Nino
Palauig, Zambales 2211
Philippines

(C) Copyright 1993, 1994
MacGregor K. Phillips
All Rights Reserved

Program written by MacGregor K. Phillips
Manual written by MacGregor K. Phillips

Trademark Acknowledgements

Epson is a registered trademark of Epson America, Inc.
IBM and PS/2 are registered trademarks of International
Business Machines Corporation
Intel is a registered trademark of Intel Corporation
Windows is a trademark of Microsoft Corporation
WordPerfect is a registered trademark of WordPerfect Corporation


ABOUT THE AUTHOR

MacGregor K. Phillips was born in South Bend, Ind. USA in 1944.
After retiring with 22 years of service in the US military he
has turned to doing what he loves best, writing computer
software. His first two programs are Global Security and PC Clock.
He lives with his wife and daughter in Palauig, Zambales;
Philippines.


For D.P. and S.S. - Prediction Number 18 has come true.


COMPATABILITY WITH EARLIER VERSIONS

BECAUSE OF THE MAJOR CHANGES MADE TO GLOBAL SECURITY V2.0 THE
ENCIPHER/DECIPHER ROUTINES ARE NOT COMPATABLE WITH EARLIER
VERSIONS. ALL "PRM", "SCM", "DFT", AND "KEY" FILES CREATED WITH
EARLIER VERSIONS CAN STILL BE USED WITH VERSION 2.0

IF YOU STORE ENCIPHERED FILES ON DISK DECIPHER THEM WITH THE
OLD VERSION OF GLOBAL SECURITY YOU ARE USING BEFORE DELETING
IT, AND THEN ENCIPHER THEM AGAIN WITH VERSION 2.0

TABLE OF CONTENTS

News Flash...................................................4
Association of Shareware Professionals.......................5
ASP Ombudsman................................................5
Available by the same Author/Pass it Along...................6
Licensing....................................................6
Preface......................................................7
Hardware Requirements........................................8
Installing/Executing Global Security.........................9
Terminology.................................................10
Why Encipher Data...........................................12
Why Global Security.........................................16
Program Features
1. F1 Key - Quick Help Reference System.................20
2. Setting VGA Color Levels - F2, F3, F4, F5 Keys.......20
3. F6 Key - Save Screen Image to Disk File..............20
4. F7 Key - Print Screen Image File.....................20
5. F10 Key - Toggle Cursor..............................20
6. Esc Key..............................................20
7. Print Screen Key.....................................21
8. Extended Error Reporting System......................21
9. Network Access Codes for Files.......................21
10. Control C, Control Break, and Pause Keys.............21
11. Critical Error Reporting System......................22
12. Menu Navigation......................................23
13. Mouse Pad............................................23
14. File Selection Screen................................23
15. Widows Compatability.................................23
16. Command Line Switches /B and /P......................23
17. Right Mouse Button...................................23
18. The Chime............................................23
19. The F9 Key - cycles through different mouse cursors..23
20. Compress and "WIPE" Enciphered Files.................23
21. Exiting Global Security..............................
Running Global Security
1. Hot Keys.............................................24
2. Command Bars.........................................24
3. Menus................................................24
4. Using The Mouse......................................24
5. Using the File Selection Screen......................24
6. Using the Mouse Pad..................................25
7. Using a Printer......................................26
8. Main Menu............................................26
9. Build a Prime Number File............................27
10. Create a Default Parameter File......................29
11. Scramble a Prime Number File.........................30
12. Generate a Key File..................................31
13. Encipher/Decipher a File.............................32
14. Produce E-Mail Enc/Dec Files.........................35
15. Make a One Time Pad..................................39
16. Four Ways to Use Global Security.....................40
17. Transmitting Enciphered Files........................43
Start Up Errors/Program Errors..............................44
Critical Errors.............................................49
Printer Errors..............................................51
Program Limitations.........................................51
Using a One Time Pad........................................52
Index.......................................................55

Page 4

---------------------------------------------------------------
NEWS FLASH NEWS FLASH NEWS FLASH NEWS FLASH NEWS FLASH
---------------------------------------------------------------
CLINTON'S WHITE HOUSE MAY BAN USE OF ALL ENCRYPTION DEVICES AND
SOFTWARE THAT IS NOT CRACKABLE BY THE NSA.

REP. EDWARD J. MARKEY (D-MASS.) CHAIRMAN OF THE HOUSE
TELECOMMUNICATIONS SUBCOMMITTEE, FEARS THE GOVERNMENT MAY
EVENTUALLY BAN ENCRYPTION. "IN A DIGITALLY LINKED WORLD, WHERE
ENCRYPTION IS THE KEY TO PRIVACY," HE SAID, "BANNING ENCRYPTION
MAY BE LIKE BANNING PRIVACY."

The above imformation is from the 30 May 1993 Business Section
of the Washington Post in an article entitled "Chipping Away at
Privacy? - Encryption Device Widens Debate Over Rights of U.S.
to Eavesdrop".

On 16 April 1993 the White House announced it was imposing a
new scheme for encrypting voice and data communications. The
system imploys a device called the "Clipper Chip" which leaves
a deciphering key in the federal governments pocket. In other
words, if you use this device the government can intercept your
encrypted phone calls or computer data transmissions and decipher
them at will. The government will stock up on phones and
computers equipped with the "Clipper Chip" and if you do business
with the government you will have to use the same devices. The
government is also drafting laws to require telecommunications
companies to grant law enforcement agencies special access to
U.S. communications networks.

The NSA is also promoting a chip called "Capstone" using a
formula called "Skipjack" to encrypt data. Of course the NSA and
the government retain master keys to these so they can decode
any data transmitted by them. Anyone crazy enough to buy anything
endorsed by the NSA deserves to have their secret data read by
anyone in government.

What it all boils down to is do you have the right to keep a
phone call or computer transmission private? The government says
no; I say yes. Global Security is designed to keep computer
transmissions private. It is uncrackable by the NSA or any
other agency in the world. Read the following documentation
and you will understand why.

For the latest developments in this area please read the article
in the Wednesday, March 2, 1994 business section of The Washington
Post titled "Chipping Away at a Fundamental Freedom? - Computer
Firms, Rights Groups Clash With White House Over Encryption vs.
Law Enforcement".

THE BILL OF RIGHTS TO THE U.S. CONSTITUTION - Amendment IV:
"The right of the people to be secure in their persons, houses,
papers, and effects, against unreasonable searches and seizures,
shall not be violated, and no warrants shall issue, but upon
probable cause, supported by oath or affirmation, and
particularly describing the place to be searched, and the
persons or things to be seized."

Page 5

---------------------------------------------------------------
ASSOCIATION OF SHAREWARE PROFESSIONALS
---------------------------------------------------------------

This software is produced by MacGregor K. Phillips who is a
member of the Association of Shareware Professionals (ASP).
ASP wants to make sure that the shareware principle works for
you. If you are unable to resolve a shareware-related problem
with an ASP member by contacting the member directly, ASP may
be able to help.

The ASP Ombudsman can help you resolve a dispute or problem
with an ASP member, but does not provide technical support
for members' products. Please write to the ASP Ombudsman at
545 Grover Road, Muskegon, MI 49442 or send a CompuServe message
via CompuServe Mail to ASP Ombudsman 70007,3536."
_______
____|__ | (R)
--| | |-------------------
| ____|__ | Association of
|||_| Shareware
|__| o| Professionals
-----| ||---------------------
|___|___| MEMBER


Global Security is distributed as Shareware. This allows you
to try it out for a reasonable period of time before you register
it. Please refer to the TRIAL USE LICENSE section of the VENDINFO.DIZ
File. If you continue to use Global Security regularly you are
expected to register the program. When you do register make
sure your name and address are on the letter. Or you can use the
instant registration form in the file "REGISTER.DOC". Just print
it out on your printer, fill it out, and mail it. If you are not
familiar with the Shareware concept please read the file
"SHR_WARE.DOC". The registration fee is $35.00 by check or money
order. All checks or money orders must be in U.S. funds drawn
on a U.S. bank. The check or money order should be made out to
MacGregor K. Phillips and mailed to: (if sent by certified mail
deduct $5.00 from total registration fee)

MacGregor K. Phillips
Sto. Nino
Palauig, Zambales 2211
Philippines

When you register your name will be placed in a data base and
when there is a major update to Global Security you may download
the new version from any BBS or order it from a distributer at no
cost except for the cost of the download or disk. Just send in the
new registration form to keep the data base up to date. Program
support by mail will also be provided for 90 days after registration.
It is the view of this author that updates to fix bugs or add new
features to a program should not nickle and dime you to death for
the rest of you life. All registrations will be acknowledged.


Page 6

Site Licenses are provided for companies, offices, workgroups,
government agencies, etc. who need to register and use more
than four copies of Global Security. See the "SITELICE.DOC" file
for more information.

Program support can only be provided by mail at this time since
I am currently living overseas in the Philippines and do not
have access to a telephone, fax, or CompuServe. If it seems to
take a long time for me to answer your letters please remember
the slow pace of mail between foreign countries. If your
registration form or letter gets returned because of a change
of address please contact ASP for my current address. This will
be greatly appreciated by all.

---------------------------------------------------------------
AVAILABLE BY THE SAME AUTHOR
---------------------------------------------------------------

PC CLOCK. It has Up Timers, Down Timers, Lap Timers, Game
Timers and Split Timers. Date, Calendar and Holiday information
too. Three levels of precision. The highest depends on your
computer. Time events with accuracy to millionths of a second
on most computers above 16Mhz. PC Clock comes in a 32 bit and
a 16 bit version. CLK32.EXE requires an 80386 or 80486 computer.
CLK16.EXE is for 80286 and above computers. Includes mouse support,
context sensitive Help, push buttons, and Hot Keys. No CGA support.

----------------------------------------------------------------
PASS IT ALONG
----------------------------------------------------------------

Feel free to pass this software along to any friend, BBS,
distributor or seller of shareware, user groups, etc. with the
understanding that anyone who continues to use the program is
required to register it. All the files listed in the PACKING.LST
section of the VENDINFO.DIZ File, plus the VENDINFO.DIZ file,
must be included when distributing this program. If you archive
the program for distribution through BBS's, please use the name
GLBSEC21.EXE (or .ZIP, .LZH, .PAX, etc. as appropriate).

BBS SYSOPs, Vendors, Computer Clubs, and Shareware Distributors
please refer to the VENDINFO.DIZ File for information. Individuals
who wish to distribute the "Global Security" package to friends or
associates may do so in accordance with the restrictions outlined
in the LICENSE section of the VENDINFO.DIZ File.

LICENSING: Any company, corporation or government that wants to
license the algorithms used by Global Security, to incorporate them
into their own programs, please contact the author at the above
address. The high speed of the algorithms make them ideal for use
in online real time data transmissions that require the highest
possible degree of security.

----------------------------------------------------------------
THANK YOU FOR SUPPORTING THE SHAREWARE CONCEPT.
----------------------------------------------------------------


Page 7

PREFACE

Welcome to Global Security.

Until now unbreakable encryption methods have been possessed
by only a few government agencies, such as the National Security
Agency and the Soview KGB. With Global Security you now have
that ability. Privacy maintained by mathematical law is now a
reality.

The weak link in all computer transmissions is from the moment
the data enters the telephone system until it leaves the telephone
system at the other end. Global Security is designed to eliminate
that weak link. If you are an individual, a small business man,
a doctor, a lawyer, a scientist, an inventor, a large corporation,
or anyone with vital data to transmit across town, across the
nation, or around the world this program is for you. Once you
have enciphered your data with Global Security it is safe even
from the prying eyes and super computers of the dreaded National
Security Agency (NSA) of the United States Government. Feel free
to transmit your enciphered data anywhere at anytime and know
that if intercepted it cannot be deciphered.

Any size file, any type file, no matter what program it was
created with can be enciphered. Once transmitted it can be
deciphered with ease at the other end. All supporting files
required take only minutes to create with the 32 bit version of
Global Security or hours with the 16 bit version. The 32 and 16
bit versions are identical except that the 32 bit version executes
many times faster.

Now includes data compression before enciphering a file,
preparation of text or binary files for transmission by any
Electronic Mail (E-Mail) Service, and WIPING of original file
after it is enciphered.

For secure hand written correspondence between two people use
the One Time Pads that can be created. Ideal for short, secure
messages.

Includes mouse support, large block cursor for laptop computers,
Hot Keys, context sensitive help screens, Critical Error
Reporting System, Extended Error Reporting System, Printer Error
Reporting System, and a File Selection Screen to navigate through
your drives, directories, and files with ease. You can force
a black and white screen or force a pause after each printed
page upon startup of the program with command line switches.

It is assumed that you are familiar with the operation of your
computer and DOS manuals. If not, now is the time to become
familiar with your computer and DOS manuals before you begin
using Global Security.

GS32.EXE is for 80386 and 80486 computers while GS16.EXE is for
all 80x86 computers.


Page 8

To use Global Security you will need the following:

32 Bit Version - an IBM AT or PS/2, or any IBM
GS32.EXE compatable computer with an Intel
80386 or 80486 microprocessor with
a CGA, EGA, VGA, MDA, or HGC
video adapter. DOS 3.0 or above and
512K Ram. One floppy disk drive. One
floppy disk drive and one hard disk
drive recommended. See program
limitations. (MCGA and PGA may work.)

16 Bit Version - Same as above except it will run on all
GS16.EXE IBM or IBM compatable computers with
an Intel 80x86 microprocessors.

Printer (optional) - Any printer that can accept CR, LF, and
FF control characters. If your printer
accepts the IBM line drawing characters
they will print out correctly.

Laser Printers - All printouts from this program are
designed for printers with fan fold
paper and may not print correctly
on laser printers. If you still wish
to try it on a laser printer make
sure it is setup for IBM or EPSON
emulation mode.

Mouse (optional) - Any Microsoft or compatable mouse.


Page 9

INSTALLING GLOBAL SECURITY

The installation procedure for Global Security is very simple.
You will need at least 498K of free disk space to store all of
the programs and documentation files.

Use the INSTALL.BAT file to install the Global Security files
on any disk drive.

Usage: INSTALL [source:] [destination:]
-------------------------------------------------------------
Example: INSTALL A: C: -- Will install GLOBAL SECURITY
-- from the A: drive to the C: drive

The INSTALL.BAT program will first create a directory called
"GLOBAL" on the destination drive and then will copy all files
from the source drive to the "GLOBAL" directory on the
destination drive.

EXECUTING GLOBAL SECURITY

If you have an 8086/80286 computer the executable file is called
GS16.EXE. If you have a 80386 or 80486 computer the executable
file is called GS32.EXE. Both versions are supplied with the
Global Security package.

Global Security may be executed from either a floppy or hard
disk drive. To minimize loading time it is recommended that
Global Security be run from a hard disk drive. Global Security
may be executed from a CD-ROM Disk but you cannot create the
GLOBAL.PRN File that saves screen images on a CD-ROM Disk.

If you desire to execute Global Security from any directory,
the directory name that Global Security resides in must be
placed in the "PATH=" environment variable. Check your DOS
manual for more details. If the Directory is not in the
"PATH=" environment variable you will first have to log on
to the required directory with the following DOS Command:
"CD GLOBAL" assuming that "GLOBAL" is the directory name you
have the EXE file in.

From the DOS Prompt type in GS32 or GS16 and press the
Enter Key. Global Security will load and be ready to run.

Page 10

TERMINOLOGY

Algorithm A set of rules for solving a problem in a
finite number of steps.

Back Door Used in reference to a formula in a Pseudo
Random Number Generator. Allows whoever
inserted the back door to decipher a message
without knowing the seed number used to
encipher it.

Binary File Any file that does not meet the definition
of a text file (See Below).

Click To quickly press and release a mouse button.

Command Bar A shadowed bar that carries out a command
or action. May be activated by pressing the
indicated Hot Key or clicking with the left
mouse button. Common Command Bars are Quit
and Help. Some Command Bars do not have a
Hot Key. In that case use the indicated
keyboard key (ie. PgUp, Home, End).

Cursor Keys The Left, Right, Up, and Down Arrow keys.

Ciphertext Plaintext that has been put through a
transformation into secret form.

Directory A collection of computer files (programs,
data, and subdirectories) stored at the same
location on disk.

Directory Tree A graphic display of the directory structure
on a disk. Shown as a branching structure
that looks like a tree. All directories and
subdirectories are branches off of the root
directory.

E-Mail Electronic Mail (messages) sent from computer
to computer. Usually restricted to text files
(See Below).

File Group A group of four related files with the same
name but different file extensions created
by the program. The file extensions are PRM
for Prime Number Files, DFT for Default
Parameter Files, SCM for Scrambled Prime
Number Files, and KEY for Key Files.

Mouse Pointer The non-blinking rectangular box on the
screen indicates the mouse position.

Paging Keys The Page Down, Page Up, Home, and End Keys.
The Home Key takes you to the beginning of
a file or list. The End Key takes you to
the end of a file or list.


Page 11

Plaintext A message that will be put into secret form
(ie. data file).

Prime Number Prime numbers are numbers that have only
improper divisors (ie. only divisible evenly
by themselves and one).

Pseudo Random
Numbers Numbers generated by a formula that exhibit
properties of random distribution. Can be
duplicated.

Pseudo
Random Number
Generator A process that continuously generates pseudo
random numbers under control of a formula.

Seed Number The initial number used by a formula in a
pseudo random number generator to start
generating pseudo random numbers. Sometimes
called a key or key number.

Text File Any file that uses only the character codes
32 to 127, the carriage return, line feed,
and tab control characters.


Page 12

WHY ENCIPHER DATA

Before you can understand the need for such a program as Global
Security you have to understand the power of the United States
Government to intercept and listen to any phone conversation
in the world that uses satelite or microwave transmission facilities.
This power resides in the government agency know as the "National
Security Agency" (NSA). On 24 October 1952 President Harry S.
Truman signed a presidential memorandum that established the
National Security Agency. This memorandum is still one of the most
closely guarded secrets of the U.S. Government. Since that day
the growth of the NSA has been exponential. With super computers,
super secret satelites, and top secret installations around the
world it has the ability to listen in on, and record, electronic
transmissions of any type anywhere in the world. Most of the
information I am about to give you comes from a book titled
"The Puzzle Palace" by James Bamford, published by Penguin Books
in 1983. It is worth reading. The Communications Satelite
Corporation (COMSAT) has four main satelite earth stations located
in the U.S. for transmitting phone conversations, computer data,
and television signals anywhere in the world. Close by each
satelite earth station the NSA has built a secret installation
which could be used to intercept any incoming or outgoing
transmissions, record it, and send it to its headquarters for
processing by its super computers. There are many who believe
that the NSA also taps into the domestic microwave system to
intercept, record, and process domestic phone conversations and
computer data. There is a facility located a few hundred yards
behind the NSA main Operations Building at Fort Meade, Maryland
which is a very broadband microwave RCV, receive only station,
which is tied into the local telephone company circuits, which
are interconnected with the nationwide microwave telephone system.
Is NSA actually listening in on domestic long distance phone
lines? No one really knows for sure, but if they want to they
certainly have the capability to do it in a big way. Are they
listening in on international transmissions? Of course they are,
that is one of their primary missions.

Computer transmitted data is especially open to interception,
recording, and processing. Just record it and run it through
another computer. Instant data to look at. There is a way to
make it harder on the NSA to look at your computer data. Encipher

it before transmitting it, then decipher it at the other end.
This has its pitfalls too. Most commercial code systems utilize
methods that have been cracked or are suspect because the U.S.
Government is suspected of having their hands in the cookie jar
so to speak. Read John C. Dvorak's "Inside Tract" in the March 17,
1992 issue of PC Magazine. He says that the WordPerfect security
system was effortless to crack. He also reports a "back door"
was discovered in an encryption system (using the El Gamal
encryption algorithm) about to be approved by the U.S. Governments
National Institute of Standards and Technologies. He reports that
"onlookers" accused the NSA of being behind the "back door"
because they really do not want anyone to have a code that cannot
be broken, by them.

Page 13


If you look at the history of DES (Data Encryption Standard)
which is the U.S. Governments standard for data encryption you
will see that the NSA was caught with its hands in the cookie
jar here also. DES was first developed by IBM in the early 1970's
under the code name Lucifer. When the National Bureau of Standards
solicited for encryption algorithms for the U.S. Government IBM
submitted Lucifer. But before it did so IBM dropped the key
length from 128 bits long to 56 bits long. James Bamford in
"The Puzzle Palace" reports that this was due to closed door
meetings between IBM and the NSA where IBM agreed to cut the key
length from 128 to 56 bits. It was eventually approved as the
nations standard for data encryption and became known as DES.
By cutting the key from 128 bits to 56 bits the NSA made sure
that it would be able to crack the code with super computers. In
fact, Dvorak reports, same column mentioned above, that it only
takes hours of super computer brute force to crack a message
encrypted by DES. Plus he reports it is believed that Adi Shamir
of RSA Data Security has cracked the DES by using math alone.
It sounds like the governments standard is only a standard way of
making sure the NSA can read your transmitted computer data. For
a full report on the controversy over DES I suggest you read the
chapter "Competition" in "The Puzzle Palace".

In the same column John C. Dvorak also praises the RSA Data
Security company and their "practical public key/private key"
method of encoding and decoding messages. This method uses the
patented Rivest-Shamir-Adelman (RSA) encryption algorithm. It
works like this: pick a number N that is the product of 2 prime
numbers. Call them X and Y so that N = X times Y. You then pick
a number less than N to be your public key - call this number P.
Your private key K is then calculated by the formula
P times K = 1(mod L) where L is the least common multiple of
(X - 1) and (Y - 1). To encrypt a message the sender must know
N and P. With a "little" bit of computer work X, Y, and K can be
calculated. The formulas used to encipher and decipher data seem
to me to use very large numbers if N is large which would make
encyphering and deciphering data a lengthly process. To crack the
RSA algorithm would just take a little bit of time. Calculating
prime factors of large numbers would be a cinch on any computer.
On the super computers that the NSA has it would be even faster.
You could even do the hard work in advance. Just generate a list
of large prime numbers and then it would be a matter of trial and
error to find two prime numbers that when multiplied together
produce N. From that point on finding K would be a piece of cake.

The RSA algorithm seems to be open to analytical attack also.
Looking at the formulas to encipher and decipher data that are
in the June 1990 issue of Byte magazine in the article
"Cloak and Data" by Rick Grehan it appears that if the first
'A' in the message is encrypted into a 'Z' by the formula all
other A's in the message will also be encrypted into Z's. If
this is the case, any RSA encrypted message is open to the most
basic cryptanalytic procedure: frequency and contact of letters.
How many of each letter are there in the message and what letters
do they come in contact with. Take the letter combination TH.

Page 14

It appears often in the english language. If the letter combination
SB appears often in an enciphered message using the RSA algorithm
it is a better than even bet that they stand for the TH in the
plaintext message. From there it is just a matter of time until
you solve the message. The longer the message the easier it is to
solve. From the looks of things I would not place too much faith
in the RSA algorithm.

Dvorak reports and I quote: "It's logically believed that the
National Security Agency doesn't like the idea of truly secure
encryption, since it means the NSA won't be able to keep tabs on
foreign spies easily." To this I would add the NSA does not want
the American public to have a truly secure method of encryption
because then the U.S. Government could not keeps tabs on its own
people like it has in the past. One such operation was known as
Operation Shamrock which started in 1945 and continued for 30
years until 1975. Senate Intelligence Committee chairman Frank
Church labeled this "probably the largest governmental inteception
program affecting Americans ever undertaken". Operation Shamrock
consisted of the three major international telegraph companies
of the time voluntarily handing over to the U.S. Government all
international cable traffic between foreign governments. Later it
turned into a giant operation where the U.S. Government listened
in on the American people. When the NSA was formed in 1952 it
inherited Operation Shamrock. When the country started to convert
to computers and magnetic storage devices the cable companies
just turned over their magnetic drums with all the cable traffic
to the NSA for copying. As the capabilities of the NSA grew to
listen in on the American public agencies of the U.S. Government
like the FBI, CIA, DIA, and Secret Service sent the NSA
"watch lists" of people they would like the NSA to listen to.
It only stopped in 1975 because it was close to being splattered
all over the American press. What the government has done in the
past it will do in the future.

Now that the cold war is over governments everywhere will shut
down their super secret spy agencies and the world will at last
know peace of mind. If you believe that I have some real estate
on the moon I would like to sell you - real cheap. What will
the NSA and the CIA do in the future now that a major reason
for their being no longer exists? Everyone knows that a government
agency that has been in existence for any length of time over a
few days can never be shut down. It just grows and grows and
grows. So, who will the NSA and CIA target next? There is only
one place to go and that is the American people. It may not
happen over night or even in the next few years, but it will
happen.

Now is the time to get prepared for them. Even the phone system
is going digital at a slow rate. Because of this a computer will
be able to recognize words and intercept and record all phone
conversations that contain a certain word. The NSA will have a
lock on the American people. The following quote was made by
Senator Frank Church of the Senate Intelligence Committee in
1975 in regard to the NSA's abiltiy to intercept electronic
transmissions:

Page 15

"At the same time, that capability at any time could be turned
around on the American people and no American would have any
privacy left, such [is] the capability to monitor everything:
telephone conversations, telegrams, it doesn't matter. There
would be no place to hide. If this government ever became a
tyranny, if a dictator ever took charge in this country, the
technological capacity that the intelligence community has given
the government could enable it to impose total tyranny, and there
would be no way to fight back, because the most careful effort
to combine together in resistance to the government, no matter
how privately done, it within the reach of the government to know.
Such is the capability of this technology...

I don't want to see this country ever go across the bridge. I
know the capacity that is there to make tyranny total in America,
and we must see to it that this agency and all agencies that
possess this technology operate within the law and under proper
supervision, so that we never cross over the bridge. That is
the abyss from which there is no return."

If the NSA could do this in 1975 what can they do today? It has
been 19 years and a revolution in the computer industry since
then. It is something to think about in the dark of night when
the moon is full and all the little government spies (worms)
are busy watching you.

Page 16

WHY GLOBAL SECURITY

Now that I have torn down every encryption method available that
is supposed to be any good and shown you the capability of the
NSA to intercept not only your phone conversations but all your
computer transmissions too, where do we go from here? There is
one method of encryption that can be used that is unbreakable in
practice and in theory. It was first developed in America in 1918,
completely rejected by the U.S. Government, and first used by
the German diplomatic establishment sometime between 1921 and
1923. It is called the "One Time Pad System". It is a remarkable
system in its simplicity. For further information see pages 398
to 400 of "The CODEBREAKERS" by David Kahn, published by The
Macmillan Company in 1967. It consists of a random key used once,
and only once. It provides a new and unpredictable key character
for each plaintext character in the message. This means that
every letter or character is enciphered with its own random key.
The letter 'A' may be enciphered into a 'Z' the first time it is
encountered in the message and into an 'N' the next time, a 'B'
the next, and so on and so on. This means for a message that is
encyphered as "Z T Q W" the first 'Z' could be deciphered into
any of the 26 letters of the alphabet. This holds true for all
the other letters also. This could be deciphred into the word
"L O O K" where both the 'T' and the 'Q' stand for the letter 'O'.
If you were to use the brute force method and try to decipher
this message with every possible key combination all you would
have done is compile a list of every possible four letter word in
the world. There are stop, hard, slow, kiss, etc., etc., etc. The
longer the message the more possibilities there are. What is boils
down to is that you have an equation in two unknowns with only 1
equation and that is impossible to solve. X + Y = 9. You know that
9 is the ciphertext. Without another equation there is no way to
solve X (the plaintext) or Y (the key). X and Y could be any values
you choose that equal 9. All this does is compile a long list of
possible solutions with one just as good as the other. Since there
are an infinite number of numbers there are an infinite number of
solutions to the above equation. One could be just as valid as the
other. There is no way to know which one is right.

In this age of computers why is this "One Time Pad System" not
in widespread use? Could it be the fact that computers cannot
generate random numbers. All they can generate is pseudo-random
numbers. This means that the string of random numbers produced by
any computer can be reproduced by that or another computer using
the same formula. But this is exactly what is required by any
computer program to encipher data. You need to be able to reproduce
that same set of random numbers to decipher the data. This is easy
enough. There are many formulas to generate pseudo-random numbers on
computers. But even this is not enough. Most of these formulas
only require a small seed number to get the formula going. This
is the key to why these formulas and other encryption formulas
are no good. Remember this:

NO MATTER HOW INTRICATE OR COMPLEX ANY DATA ENCRYPTION FORMULA
IS, IF THE SEED NUMBER TO START THE FORMULA IS SMALL, THAT
ENCRYPTION FORMULA CAN BE VERY EASILY CRACKED BY THE BRUTE
FORCE METHOD.


Page 17

Just plug in all possible seed numbers into the formula using
a super computer and within a matter of hours any message can
be decoded. This is the bane of most encryption formulas. They
try to keep the seed number small by using very complex and
lengthy formulas because human beings, you and me, do not like
to enter 100 and 200 digit seed numbers into a computer every
time we have to encipher or decipher a message. The small seed
number is their Achilles Heel. In this day of the super computer
I would call any seed number under 40 digits small. This equates
to about a 128 bit number on a computer.

So what would it take to make an ideal computer program for
enciphering and deciphering data.

1 - The formulas used to encipher and decipher data have to
be as simple as possible for fast, economical, error
free performance.

2 - The formula must have a very long key (seed number), but
one that does not have to be entered by a human into the
computer. A number that is 7,776 bits (972 bytes) long
is used by Global Security.

3 - The program must use the "One Time Pad System" by
generating a unique key letter for each plaintext letter
in the file or message enciphered.

4 - The files created to enter this long seed number into
the formula must be easy to make, and more important,
easy to produce new files as often as required.

5 - The system must be reliable. It must decipher all files
or messages without error.

6 - The system must be "software only". No extra hardware
required.

7 - The cryptosystem must be easy to use. The more
complicated a cryptosystem is the less it will be used.

All this and more describes Global Security, the best little
enciphering/deciphering program in the world. The 7 items listed
above all apply to Global Security. What follows is a detailed
explanation of why Global Security is the most secure, bar none,
of any encryption/decryption method or program available in the
world today. This has to be done so you will know that what I say
is true. You will not have to take my word for it. You can then
make up your own mind about how good Global Security really is.

Page 18

There are four files that have to be created by the program
before you can encipher and decipher files, or make actual
"One Time Pads". The first is called a Prime Number File. This
file holds 3,067 prime numbers in the range 100,000,001 to
4,294,967,295. You enter a search factor between 2 and 100,000
(an even number must be used) and a starting number equal to or
greater than 100,000,001. The search factor is there so you will
not find consecutive prime numbers. If you enter a search factor
of 32,984 and a starting number of 1,496,392,593 the second number
to be checked for being prime would be 1,496,425,577 and so on and
so on until 3,067 prime numbers are found. The numbers wrap around
if they exceed 4,294,967,295. There are approximately
83,899,345,900,000 different prime number files that can be
created. On my 20 Mhz 386DX computer this takes only about 20
minutes or less with Global Security - 32.

The next step is to create a Default Parameter File. When you
encipher a file 2,205/2,326 bytes are added to the length of the
file or E-Mail Message. A group of 2,048 bytes hold a 7 character
password (enciphered) needed to decipher the rest of the file.
Where the 7 character password is placed within these 2,048 bytes
is determined by the Default Parameter File. This file also holds
one parameter used by the enciphering, deciphering, and scrambling
formulas. This file takes only a few minutes to create. There are
1.19657994458 times 10 to the 24th power different ways to create
a Default Parameter File.

The third step is to scramble the Prime Number File and create a
Scrambled Prime Number File. How many different ways are there to
scramble 3,067 prime numbers? Using Stirling's Approximation
formula for calculating large factorials you get:

3,067! = 8.17375658029 times 10 to the 9,363rd power

This is a number 9,364 digits long. It is best to scramble and
rescramble this file as often as possible. The more you do this
the harder it will be to duplicate the file.

The fourth and last file to create is a Key File. This holds
the initial key used to select 243 prime number from the Scrambled
Prime Number File to plug into the encryption/decryption formula.
How can you automatically select an initial key from a file? DOS
provides the answer to that for us. Every file you are going to
encrypt has a date/time stamp assigned by DOS when the file was
created. Since DOS assigns date/time stamps in 2 second intervals
there can be 43,200 different date/time stamps in one 24 hour
period. Therefore the Key File holds 43,200 different numbers in
the range 100,000,001 to 4,294,967,295. These numbers are randomly
selected. Once created this file can also be scrambled as many
times as you like. Due to the way the file is scrambled in sections
there are only apprximately 3.48143426965 times 10 to the 30,261
different ways to scramble a Key File. The program checks the
date/time stamp of the file and uses it to index into the Key
File to select an initial seed to use in the formulas. This
initial seed is them used to randomly select 243 prime numbers
from a Scrambled Prime Number File. These 243 prime numbers are
placed into 3 arrays which comprise 81 different pseudo random
number generators. One pseudo random number generator is used to


Page 19

randomly select from the other 80 pseudo random number generators
for each character in a file to encipher or decipher.

These 81 pseudo random number generators require 3 prime numbers
each for a total of 243 prime numbers. Each prime number is 4
bytes or 32 bits long. This equals 7,776 bits. This is the initial
starting seed for all the random number generators. For anyone
to duplicate a seed number 7,776 bits (972 bytes) long without
the original files used to create it would require a miracle in
the absolute true sense of the word.

What is all boils down to is that a brute force attack on any
message enciphered with Global Security would require more time
and more computer power than is possible within the next few
million years or so. To decipher a message you need the exact
same set of files used to encipher it. The only way to get these
files would be to steal them. So what? If someone stole the files
all you have to do is change them - it only takes 20 minutes or
so. In fact, to really be secure, you could make it a practice
to change the files every week. This way if someone did steal
the files they could only decipher the messages for that week
and no more. There is also the question of the password. This
could be set up to change on every message. Now someone would
have to steal the files and the correct password for each message
to decipher them.

The best place to keep these files is on a floppy disk locked
up in a very good safe. They should only be taken out by an
authorized person. If you left the files on a hard disk on a
single computer or a network it would be very easy for someone
to copy them. The best program in the world will not protect you
from "inane" actions like this.

For each person or organization you exchange enciphered data
with it is a good idea to maintain a different set of Scrambled,
Default, and Key files. A seperate list of passwords should be
kept also.

I envision a setup much like the following one. You are an
auditing department of a large accounting firm with teams of
auditors that travel fequently around the country making audits
on large corporations and companies. These auditing teams send
back to the home office very sensitive data and reports that
could have major implications on Wall Street if the information
leaked out. Just before a team heads out to audit a company they
are given a new set of files to use with Global Security and a
list of passwords to use for each day. At the home office the
only person that has the other set of files and passwords is
their boss. He is the only one that can decipher the incoming
data and reports. The next time a team went out a new set of
files would be created again. This is as secure as you can get.
This applies to files enciphered for transmission by E-Mail also.

Page 20

PROGRAM FEATURES FOR GLOBAL SECURITY

All features are supported in both Global Security 32 and 16.
The only difference between the two programs besides the
different Intel microprocessors they run on is speed of
execution. The 32 bit version has been optimized to use 32 bit
registers for all math computations. Because of this it runs
considerably faster than the 16 bit version. To build a file
of 3,067 prime numbers takes less than 20 minutes using GS32.EXE
on a 80386DX 20 Mhz. Using GS16.EXE on the same computer it takes
anywhere from 2 to 4 hours. This is a simple demonstration of
the power of a 32 bit over a 16 bit computer.

1.The F1 Key may be used at any time to pop up the current
Quick Help Reference System screen. When a Help Menu
or Command Bar is not available you can still use the
F1 Key. You can page forwards and backwards within the
Quick Help Reference System.

2.If your computer has a VGA video adapter board installed
you can brighten, dim, reset color levels, and blank
the screen. This is done by increasing or decreasing
the color intensity levels in increments of 1 from 0
to 63. 0 being no color intensity at all and 63 being
the brightest color intensity level. The F2 Key
brightens the screen 1 intensity level each time the
key is pressed. The F3 Key dims the screen 1 intensity
level each time the key is pressed. The F4 Key resets
the color intensity levels to their original settings.
The F5 Key sets all intensity levels to 0 thereby
blacking out or blanking the screen.

3.The F6 Key is used to save the current screen image to a
disk file, GLOBAL.PRN, for printing at a later time. It
will hold as many screen images as there is room on the
disk. Each image is 2,050 bytes long. If the file does not
exist it will be created. Great for laptop computers. The
only screen images you cannot save to disk are the Critical
Error Reporting System Screen and any screen image while
viewing an Enciphered File. This file is created in the
Global Security directory and is compatable with any
text editor that can read ASCII files.

4.The F7 Key is used to print the GLOBAL.PRN disk file.
When all the screen images have been successfully printed
the file will be deleted. The F7 Key will only function
from one of the main menus. While you are creating files
or enciphering a file, etc. the F7 Key is disabled.

5.The F10 Key is used to toggle between the computers default
cursor and a full size block cursor. For those hard to see
cursors on laptops or within Windows.

6.The ESC Key always backs you out of the program the way
you came in, all the way to DOS. Can be used at any time
except when a Critical Error Reporting System screen
or Printer Error Reporting System screen is active.

Page 21

7.The Print Screen Key allows you to print the current
screen at any time while the program is running. Two
screens can be printed per page of paper. After two
screens have been printed the paper will have advanced
so the next two screens will appear on the next page.
There is room at the top to use a two hole punch and
save the screen shots in a folder. All printer errors
are handled by the Printer Error Reporting System in a
pop up dialog box. Just answer Retry or Cancel.

8.Extended Error Reporting System is used to report DOS
errors and program errors. It incorporates all known
DOS errors (network errors included) plus errors that
pertain to the program. Since the inclusion of the File
Selection Screen in the program it is hard to generate
a DOS error because you cannot enter a bad path or file
name. I have included program errors in this reporting
system to present a common format for reporting errors.
When the program generates an error a dialog box will
appear with the information displayed below. The
information below is displayed if you try to finish a
Prime Number File that is already complete.

DOS/BIOS Function:3FH - Read File
File Name:BLACK.PRM
Error Locus:Block Dvice
Error Class:Complete
Error Message:File is Already Complete
Recommanded Action: Enter Correct Data

There are two Command Bars displayed that you can use
at this point. One is "Ok" and the other is "Help".
Help calls up the Quick Help Reference Screen and Ok
returns you to an appropriate menu in the program.

All program generated errors are listed and explained
in the Errors section of the documentation. To get a
listing of all DOS errors you will have to purchase a
book on DOS. At the present time there are close to 100
different errors that can be reported by DOS. Most are
self-explanatory.

9.All files used by this program use network access codes
when they are opened. If a file is opened in a read and
write mode read and write sharing is denied. If a file
is opened in a read only mode write sharing is denied.

10.Ctrl C and Ctrl Break Keys are trapped by the program and
have no function. The Pause Key will still work if you want
to pause the program.

Page 22

11.Critical Error Reporting System reports on all critical
errors generated by DOS. When a critical error is
encountered a dialog box will appear with the critical
error information displayed. Below is an example for
trying to create a file on a write protected disk.

Disk Error: Yes
Disk Operation: Write
Disk Area Affected: Directory
Error Code: 00H
Error Message: Disk Write Protected

Below this information will be displayed four Command
Bars which are: Retry, Cancel, Abort, Help.

If you can correct the critcial error select Retry and
DOS will try to perform the operation again. In the above
example remove the write protection from the disk and
select Retry to allow DOS to perform the disk operation
again.

If you cannot or do not want to correct the error select
Cancel. DOS will cancel the operation and the program
will return you to an appropriate menu in the program.

If the error is severe enough select Abort and the
program will try to perform a controlled exit and return
the computer to a stable condition. 99.999% of the time
the program will be able to do so.

If for some reason the computer has locked up your only
recourse is to reset or reboot the computer.

The following list is the information that can be
displayed for each line in the Critical Error Reporting
System Screen.

Disk Error: Yes or No
Disk Operation: Read or Write
Disk Area Affected: DOS, FAT, Directory, or Data
Error Code: 00H to 0CH
Error Message: See Errors Section of
Documentation

If you have a hard or floppy disk that is constantly
giving you critical error messages other than Disk Write
Protected or Drive Not Ready you can pretty much tell
which area of the disk is going bad and take steps to
preserve the data on the disk.

The Print Screen Key functions within the Critical Error
Reporting System, but the F6 and F7 Keys do not because
disk access is not allowed during critical error
processing.

Page 23

12.Menu navigation and use of Command Bars is through Hot Keys
and/or the Mouse only.

13.If a Mouse is installed number entry can be with the Mouse
Pad or the keyboard. The Mouse Pad is a replica of a
numeric keypad. Clicking on a number enters that number
into the computer the same as using the keyboard. The
Mouse Pad is only displayed if a mouse is installed.

14.A File Selection Screen lets you navigate through your
drives, directories, and files with ease. See detailed
instructions for the File Selection Screen in Using
Global Security.

15.Windows compatable. Runs full screen, in a window or
in the background. When running in a window the mouse
is not available for use. If you have a mouse the Mouse
Pad will be displayed but you will not be able to use
it. Execution time within windows is slowed down by a
small percentage.

16.Command Line Switch /B forces a black and white or
monochrome display upon startup. If you have a black
and white or monochrome monitor attached to a color
adapter and the screen colors do not appear right use
this switch in the command line when you start Global
Security. (ie. GS32 /B)

Command Line Switch /P forces a pause after printing each
page. Use this switch if your printer does not use fan fold
paper or have a paper tray (ie. GS32 /P). Does not
function for the Print Screen Key. Both command line
switches may be used at the same time - ie. GS32 /B /P.

17.Right Mouse Button - Toggles between hiding and showing
the mouse pointer on screen.

18.The Chime - a chime will sound at the top of the hour,
when an invalid key is pressed during keyboard entry,
and when a completed Prime Number File has been saved to
disk. When any file has been saved to disk and no action
is taken a chime will sound 5 times at 2 minute intervals
to remind you that your computer is sitting idle. If
no action is taken within this time the chime will stop
sounding at 2 minute intervals. It will assume you are
on an extended coffee break with a good looking man or
woman.

19.The F9 Key cycles through five different mouse cursors.

20.You have the option of compressing a file before
enciphering it and "Wiping" it once it is enciphered.

21.When you exit Global Security the buffers used to
encipher/decipher data are wiped so no sensitive data
can be recovered from memory before another program is
run.

Page 24

USING GLOBAL SECURITY

1.HOT KEYS: All menus or Command Bars have a Hot Key that
may be pressed to select the indicated menu or Command Bar.
For monochrome or black and white monitors the Hot Key is the
first letter of all menus or Command Bars. Command Bars that
indicate a keyboard key such as Home, End, PgUp, etc. do not
have a Hot Key. For computers without a Mouse they indicate
the keys available for use. For computers with a Mouse clicking
on them mimics the behavior of the indicated key.

2.COMMAND BARS: Command Bars such as Help, Quit, Escape to
Quit, etc. are shadowed bars that appear throughout the program.
They indicate the available commands for use. They may be
selected by their Hot Keys or by clicking on them with the
left mouse button. When the mouse pointer is on a Command Bar
and you press the left mouse button the shadow will change
from black to grey. When you release the left mouse button it
will change back to black and the command will be carried out.
If you move the mouse pointer off of the Command Bar before
releasing the left mouse button the shadow will change back
to black but the command will not be executed.

Command Bars such as Up, Down, Left, Right, PgUp, PgDn, etc
indicate the keyboard keys that may be used. The mouse may
also be used on these Command Bars. Clicking the left mouse
button on one of these Command Bars performs the same function
as using the keyboard key. Pressing and holding the left mouse
button on one of these Command Bars is the same as pressing
and holding the keyboard key down. Repeated commands are
issued but not as fast as from the keyboard.

3.MENUS: Menus indicate the major functions the program
performs. They may be selected by using the indicated Hot
Key or by clicking on them with the left mouse button. When
you click the left mouse button on a menu the menu item will
be highlighted and when you release the left mouse button the
menu item will be selected. If you move the mouse pointer off
the menu item before you release the left mouse button the
menu item will be unhighlighted and not selected.

4.THE MOUSE: Use the left mouse button as described above.
The right mouse button toggles between hiding and showing the
mouse pointer.

5.USING THE FILE SELECTION SCREEN: The File Selection Screen
is central to all parts of Global Security. Every time you need
to create or select a file to use the File Selection Screen
comes into play. The File Selection Screen is in three parts:
The Drive Panel, the Directory Panel, and the File Panel.
There is a row of Command Bars below the panels and an
Instruction Line below the Command Bars.

Switching between panels: Use the TAB Key to move from one
panel to the next or clicking the left mouse button anywhere
within a panel selects that panel. As a panel becomes
selected, or active, the drive boxes or lettering in a
directory or file panel changes from light white to bright

Page 25

white. The lettering in the drive boxes or the highlighted
selection bar in the directory and file panels changes from
blue to red. This way if there is only one directory and
one file you can tell which panel is active by the color
of the lettering in the highlighted selection bar.

The Drive Panel: The drive panel lists all disk drives
available to the system. Make the drive panel active and
highlight whichever drive you want by using the left and
right arrow keys or clicking the left mouse button on the
left and right arrow Command Bars below the panels.
Then press the enter key or click the left mouse button on
the " < " Command Bar to make that drive active. When
the new drive becomes active the Directory and File Panels
will be updated with information from the new drive.

Substituted Drives: Substituted drives for directory
names will produce an Extended Error Reporting System
Screen which tells you to use drives that have not been
substituted. If you try to execute Global Security
from a substituted drive the program will display an
Extended Error Reporting System Screen and then abort
the program. This applies to Assigned Drives also.

The Directory and File Panels:Select whichever one you
want to be active and use the Up, Down, PgUp, PgDn, Home,
or End keys to move through the different directories or
files. Clicking the left mouse button on the appropriate
Command Bar does the same. Pressing and holding down the
keyboard key or left mouse button on a Command Bar will
quickly move you in the desired direction within the active
panel. You can also use the first letter of a directory or
file name as a Hot Key to quickly move to a known directory
or file. The "Q" and "H" letters are not available for this
function as they are the Hot Keys for the Quit and Help
Command Bars. Once you have the correct drive, directory,
and file highlighed use the enter key or click the left
mouse button on the " < " Command Bar to send the drive,
directory, and file name back to the calling program as a
fully formated ASCIIZ file specification.

The Command Bars are shadowed bars located below the Directory
and File Panels.

Below the Command Bars is a place for a one line instruction
telling you what type of file to select depending on what
function the program is performing.

6.THE MOUSE PAD: The Mouse Pad allows easy entry of numbers
with the mouse for those lazy people who do not use a keyboard
when the do not have to. Use the Mouse Pad the same as you
would a keyboard numeric pad. When you press the left mouse
button on a number the shadow changes from black to grey and
when you release the left mouse button on a number the shadow
changes back to black and the number is entered the same as
it would be from the keyboard. The " << " pad is for
backspacing, erasing, the last digit entered. The " Esc " pad
needs no explanation. The " < " pad is the enter key.

Page 26

7.USING A PRINTER: All printing is designed for printers
using fanfold paper. They may or may not print correctly
on printers that print on only a single sheet at a time or
have paper trays that feed single sheets of paper.

Printer Setup: All printers should be setup for 80 columns
by 66 rows. Use the font of your choice. All laser printers
will have to be set for IBM or EPSON emulation mode prior
to printing with the program. All printers should be setup
to print the extended ASCIIZ character codes which comprise
the international characters and line drawing characters.
Consult your printer manual to make sure the settings are
correct.

Printer Error Reporting System: The Printer Error Reporting
System will report on any errors encountered while printing.
See the Printer Errors section for all details.

Commom Setup Problems:

1. Printer prints double spaces between lines: printer
is setup for an automatic line feed after a cariage
return. Consult your printer manual on how to turn
this off.

2. Printer does not print the extended ASCIIZ character
set. Consult your printer manual on how to turn this
feature on.

Page Pause: If you use the command line switch /P to
pause printing after each page a dialog box will pop
up at the end of each page that says "Printing Paused".
When you have the next page ready to go click the left
mouse button on Continue or press the "C" Hot Key.

8.MAIN MENU: When you first start Global Securityon the
fifth line of the screen there is a horizontal menu bar that
says: Functions, About, Help and Quit. Selecting Functions
drops down another screen that lists the main program functions
which are:
1. Build a Prime Number File
2. Creat a Default Parameter File
3. Scramble a Prime Number File
4. Generate a Key File
5. Encipher a File
6. Decipher a File
7. Produce E-Mail Enc/Dec Files
8. Make a One Time Pad
9. Quit

Selecting About displays a window with information about the
program and the Author.

Selecting Help displays the current Quick Help Reference System
screen.

Selecting Quit exits to DOS. This is the only one that does.

Page 27

9. BUILD A PRIME NUMBER FILE

When you select Build a Prime Number File from the Functions
Menu the screen will change and you will have a new menu bar
on the sixth line of the screen. It says Build, Finish, View,
Help, and Quit.

Selecting Build:

When you select Build the File Selection Screen will appear
and you will be instructed to enter an eight character name for
a Prime Number File. The file extension of "PRM" will be added
by the program. Once the name is entered you will be instructed
to select a drive and directory to place the file in.

You will then be asked to enter a Search Factor between 2 and
100,000 (it must be an even number that ends in 0, 2, 4, 6, or
8), and a Starting Number for the prime number search between
100,000,001 and 4,294,967,295 (it must be an odd number that
ends in 1, 3, 5, 7, or 9). Tests will be performed on these
numbers to make sure they are within the proper ranges and odd
or even as required. Another test is performed to make sure that
the Search Factor and Starting Number are not evenly divisible
by a common number. If they are you will be informed by the
Extended Error Reporting System and you will be asked to enter
another Starting Number.

The Search Factor determines which numbers after the Starting
Number will be tested for being prime. If the Search Factory
is 15 every 15th number will be tested. If it is 102 every 102nd
number would be tested. If the test number exceeds 4,294,967,295
the test number will wrap around to a number above 100,000,001.
Once all tests are satisfactorily completed the program will
commence finding 3,067 prime numbers.

Now is a good time to introduce the concept of a File Group.
You must create four different types of files before you can
encipher or decipher files, and make One Time Pads. The files
are a Prime Number File with an extension of 'PRM', a Default
Parameter File with an extension of 'DFT', a Scrambled Prime
Number File with an extension of 'SCM', and a Key File with an
Extension of 'KEY'. A File Group would consist of 4 files with
the same name and the file extensions mentioned above
(e.g. YELLOW.PRM, YELLOW.DFT, YELLOW.SCM, and YELLOW.KEY). When
you encipher or decipher files, and make One Time Pads you will
be asked to select a KEY File which will require a corresponding
DFT File, and SCM File. You could use the names of the people
you frequently exchange messages with. This way when you need
to send an enciphered message to TOM select TOM.KEY from the
File Selection Screen.

Running stats are displayed while the program is testing and
finding prime numbers. The number found, the current test
number, and the last five prime numbers found are displayed
and updated as each test number is found to be prime or not.

Page 28

In the Timer Box an elapsed timer informs you of how much
time it is taking.

In the Status Box the percent completed is displayed as a
numeric percent and as a bar graph.

In the Command Box you have the option of selecting Yes or
No to saving a partially completed Prime Number File. If
you select No the file will not be saved and it will be
deleted from the disk. If you select Yes all the prime
numbers found and all the data needed to restart and finish
the file will be saved to disk.

Once the program has found all 3,067 prime numbers they will
be saved to disk, a dialog box will pop up to inform you that
the file has been saved and a chime will sound.

Selecting Finish:

When you select Finish the File Selection Screen will appear
and you will be asked to select the "PRM" File you wish to
finish. The file will be read and the search for prime numbers
will commence where it left off when the partially completed
file was saved to disk. If the file you select is already
complete the Extended Error Reporting System will inform you
and you will be asked to select another file.

Selecting View:

When you select View the File Selection Screen will appear
and you will be asked to select the "PRM" File you wish to
view. When the file contents are displayed use the PgUp,
PgDn, Home, or End Keys to page back and forth through the
file or use the Mouse on the PgUp, PgDn, Home, and End Command
Bars to page back and forth through the file. This applies
to "SCM", "KEY" and "ENC" files also.

Selecting Help:

When you select Help the current Quick Help Reference System
Screen will pop up. This applies to all menus with Help in them.

Selecting Quit:

Select Quit to return to the Function Menu. This applies to
all program segments in the Function Menu.

Page 29

10.CREATE A DEFAULT PARAMETER FILE

When you select Create a Default Parameter File the screen
will change and you will have a new menu bar on the sixth
line of the screen. It says Create, View, Help and Quit.

Selecting Create:

When you select Create the File Selection Screen will appear
and you will be asked to select a "PRM" File to create a
"DFT" File for. If you have to change drives and/or
directories to find where the "PRM" Files are do so. When
you make your selection the new "DFT" File will be given
the same name as the "PRM" File with a file extension of
"DFT". If the file already exists the Extended Error
Reporting System will inform you and you will be returned
to the File Selection Screen to make another selection or Quit.

You will then be asked to enter 7 numbers between 1 and
2,048. Duplicate numbers are not allowed. These 7 numbers
specify where the 7 password characters used to encipher and
decipher a file are placed in the 2,065 byte header added to
any file that is enciphered. Use the keyboard or the Mouse
Pad if you have a mouse to enter the numbers.

Next you will be asked to enter a Random Factor Array Shift
between 16 and 24 used by the pseudo random number generators.
Once this is entered the numbers will be saved to the specified
file on disk.

Selecting View:

When you select view the File Selection Screen will appear and
you will be asked to select the "DFT" File you want to view.
If you have to change drives and/or directories to find the
desired "DFT" File do so.

Page 30

11.SCRAMBLE A PRIME NUMBER FILE

When you select Scramble A Prime Number File the screen will
change and you will have a new menu bar on the sixth line
of the screen that says Scramble, Rescramble, View, Help
and Quit.

Selecting Scramble:

Selecting Scramble is for scrambling an original "PRM" File.
You can only do this one time. The File Selection Screen
will appear and you will be asked to select the "PRM" File
you wish to scramble. The associated "DFT" File must be
present also. If you have to change drives and/or directories
to find the desired "PRM" File do so. If the selected "PRM"
File has already been scrambled the Extended Error Reporting
System will inform you and return you to the File Selection
Screen to select another "PRM" File or Quit.

You will then be asked to enter 5 seed numbers to scramble
the "PRM" File 5 times. The first time through the "PRM"
File acts as the base file for scrambling. The 2nd time
through the new scrambled file acts as the base file and
this file is scrambled into a new file. Each time through
the new scrambled file acts as the next base file. Once it
is scrambled 5 times the file is saved to disk with the
same name as the "PRM" File but a file extension of "SCM".
The "PRM" File remains on disk unchanged.

Selecting Rescramble:

Rescramble is for scrambling a "SCM" File. You can and should
do this as many times as possible. The more times you
scramble and rescramble a "SCM" File the harder it will be
for anyone to duplicate you efforts. Select the "SCM" File
to rescramble from the File Selection Screen. The associated
"DFT" File must be present also. If you have to change drives
and/or directories to find the desired "SCM" File do so. You
will then be asked to enter 5 seed numbers. Once the "SCM"
File has been scrambled 5 times the new "SCM" File will replace
the old "SCM" File on disk.

Selecting View:

When you select view the File Selection Screen will appear and
you will be asked to select the "SCM" File you want to view.
If you have to change drives and/or directories to find the
desired "SCM" File do so.

Page 31

12.GENERATE A KEY FILE

When you select Generate a Key File the screen will change
and you will have a new menu bar on the sixth line of the
screen that says Generate, Scramble, View, Help and Quit.

Selecting Generate:

Selecting Generate allows you to create a "KEY" File. The File
Selection Screen will appear and you will be asked to select a
"SCM" File to generate a "KEY" File for. The associated "DFT"
File must be present also. If you have to change drives and/or
directories to find the desired "SCM" File do so. If a "KEY"
File already exists for the "SCM" File the Extended Error
Reporting System will inform you and you will be returned to
the File Selection Screen to select another or Quit.

You will then be asked to enter a seed number in the range
between 100,000,001 and 4,294,967,295. Once the "KEY" File
is generated it is saved to disk with the same name as the
"SCM" File but a file extension of "KEY".

This is the largest file created by Global Security. It is
172,800 bytes long and holds 43,200 randomly generated
numbers between 100,000,001 and 4,294,967,295.

Selecting Scramble:

Selecting Scramble allows you to scramble a "KEY" File. Select
the "KEY" File you wish to scramble from the File Selection
Screen. The associated "SCM" and "DFT" Files must be present
also. If you have to change drives and/or directories to
find the desired "KEY" File do so. Then enter the seed number
and the file will be scrambled. The new scrambled "KEY" File
will replace the old "KEY" File on disk. This should be done
as often as possible.

Selecting View:

Select the KEY File you wish to view from the File Selection
Screen.

Now you have a complete File Group. A PRM, SCM, DFT, and a KEY
File. The person you will be exchanging enciphered messages
with will need a copy of these files. The only other requirement
is a Password List (optional). If you want to use a different
password for each message, or each day, or each week, or each
month is up to you. A list will have to be maintained, and it
must be kept in a safe secure place along with the Group Files.
If you do not use a password the program will select a default
password. Anyone trying to put the message through the program
with a different set of Group Files will always get invalid
password when he tries to decipher it.

Page 32

13.ENCIPHER/DECIPHER A FILE

When you select Encipher a File or Decipher a File the screen
will change and you will have a new menu bar on the sixth line
of the screen that says Encipher, View, Decipher, Help and Quit.

Selecting Encipher:

When you select Encipher you will first be asked if you want
to Compress the file before enciphering it. Answer yes or
no. If you answer yes the file will be compressed by Global
Security and then enciphered. A file compressed by Global
Security can only be decompressed by Global Security.

You will then be asked if you want to "WIPE" the original
file after you encipher it. Answer yes or no. "WIPE" means
that the original file is written over many times with
certain characters, the last one being all Nulls. This option
has been added for those people that want to keep only an
enciphered file on a disk. They do not want other people
to be able to look at or recover the original file after
it has been enciphered.

-------------------------------------------------------------
WARNING!WARNING! WARNING! WARNING! WARNING!WARNING!
-------------------------------------------------------------
When a file is "WIPED" it cannot even be recovered with any
of the popular disk utilities. They will be able to recover
the file but the data in the file will no longer be there.

If you forget a password or loose the files needed to
decipher a file there is no way you will ever be able to
decipher the file and recover it. When I say no way I mean
just that. The author will not be responsible for any data
that has been lost in this manner.
--------------------------------------------------------------

The File Selection Screen will appear next and you will be
asked to select the file you wish to encipher. If you have to
change drives and/or directories to find the desired file do
so. If the file is already enciphered the Extended Error
Reporting System will inform you and return you to the File
Selection Screen to select another file or Quit. If the file
has not been enciphered you will be returned to the File
Selection Screen to select a destination drive and directory
to place the enciphered file into. Next you will be asked to
select a KEY File to use to encipher the file. The associated
SCM and DFT files must be present also. If you have to change
drives and/or directories to find the desired KEY File do so.

After you have selected the KEY File to use you will be asked
to enter up to a 7 character password. This can be any
character you can enter from the keyboard. Special characters
entered with the CTRL or ALT Key are allowed. Next you will
be asked to enter any Special Instructions for whoever will
decipher the file. These instructions will be displayed
before the file is deciphered. The file will then be


Page 33

compressed if that option was selected, then enciphered and
saved to disk with the same name as the original file and
a file extension of "ENC". The original file remains on disk
unchanged in any way unless you have selected the "WIPE"
option. If you have selected the "WIPE" option Global Security
will ask for confirmation before it actually WIPES the file.
The "ENC" File will be 2,205 bytes longer than the original
file. This 2,205 byte header contains an Enciphered File
ID, the 7 enciphered password characters, the name of the
"KEY" File, the DOS Date/Time Stamp and attributes of the
original file, plus the full name of the original file, the
number of bytes to decipher that follows the header, and
the encryption method (for future expansion), etc.

File Compression:

The file compression routine is a modified version of the
Lempel-Ziv_Welch method. While a file is being compressed
a dialog box will appear giving you a running status of
the compression. It displays percent complete, percent
compression, codes used, and bytes saved. If the percent
compression and bytes saved remain at "0" it means that the
file is incapable of being compressed. This will happend
if you try to compress an already compressed file, an
enciphered file, or even a prime number file. Some files
just cannot be compressed. If this happens Global Security
ignores the compressed file and goes on to encipher the
original file. The file compression routines are "LOSSLESS".
None of the original data is lost between file compression
and file decompression.

Data Integrity Checks:

Both the encryption and compression routines compute an
industry standard CRC32 check value. While the file is being
decompressed and deciphered it recomputes them and checks
them with the original check value. Global Security will
inform you of their status when it completes the decompression
and deciphering routines.

Selecting View:

If you wish to see what an enciphered file looks like select
view. The File Selection Screen will appear and ask you to
select the "ENC" File you wish to view. If you have to change
drives and/or directories to find the desired file do so. The
file will then appear and you can page through it the same way
as viewing any of the other files. The largest "ENC" File you
can view is 5,952,000 bytes long. You can encipher and decipher
files of any length allowed by DOS so do not worry about this
limitation. The Print Screen Key and the F6 Key are disabled
while viewing an enciphered file.


Page 34

Selecting Decipher:

When you select decipher the File Selection Screen will appear
and you will be asked to select the "ENC" File you wish to
decipher. If you have to change drives and/or directories to
find the desired file do so. You will then be asked to select
the destination drive and path to place the deciphered file
into. The file to decipher will then be opened, the name of
the "KEY" File and the Date/Time Stamp of the original file
will be read from the 2,205 byte header, and then the file
will be closed. If any Special Instructions are stored in the
file header they will be displayed at this time. You will
be given the option of continuing or quiting the deciphering
process.

You will then be asked to select the "KEY" File whose name is
shown that is required to decipher the file. If you have to
change drives and/or directories to find the designated "KEY"
File do so. The associated "SCM" and "DFT" Files must be
present also. These files will be opened and read into memory.

You will then be asked to enter the password required to
decipher the file. It must be exactly the same as the one
used to encipher the file or you will constantly get invalid
password reported by the Extended Error Reporting System. If
you make a mistake in entering the password you will have as
many tries as you like to get it correct. Once the password
checks out the file will be deciphered and decompressed (if
required) then saved to disk with the same name as the original
file. The file will be the same size as the original with the
same DOS Date/Time Stamp, attributes, and the same name. If
a file with the same name already exists in the directory the
file will be given an extension of "001", "002", etc., all the
way up to "999" if required.

File Decompression:

While a file is being decompressed a dialog box will appear
showing the status of the decompression. If will show percent
complete, codes used, bytes read from the compressed file
(the in count) and bytes output to the decompressed file
(the out count). Data integrity checks will be made and their
status displayed when deciphering and decompression are
complete.


Page 35

14. PRODUCE E-MAIL ENC/DEC FILES

When you select Assemble E-Mail Enc/Dec Files the screen
will change and the menu bar on the sixth line of the screen
will say Encipher, View, Decipher, Help, and Quit.

What is Electronic Mail (E-Mail)?

Most E-Mail Services like MCI only accept character codes
32 to 127, the carriage return, line feed, and tab codes.
All other character codes, like the line drawing codes above
127, are ignored. For this reason a file to be enciphered
for transmission by an E-Mail Service must be handled
differently. CompuServe adds another complication in that
it tries to put consecutive short lines onto one line. To
get around this you have to put a space as the first
character in a line. If you did not do this two very short
lines could be shortened to one line and you would not be
able to decipher the rest of the file. All of this, and more,
has to be considered when preparing a text or binary file
for transmission by an E-Mail Service.

Global Security will prepare and compress, if requested,
any text or binary file for transmission by any E-Mail
Service. Once received it will decipher and decompress, if
required, the E-Mail Message(s) in the file and place each
deciphered message in its own file.

A text file is any file with only the character codes 32
to 127, the carriage return, line feed, and tab codes in
it. Any other character is illegal. Global Security will
scan all text files before they are enciphered for illegal
characters. If any are found you will be given the option
of treating the file as a binary file or quiting. Most word
processing programs do not produce true text files, and will
therefore have to be treated as a binary file.

Any text file can be compressed before it is enciphered.
To be profitable a text file must compress by 53% or more.
This is because once a text file is compressed it will have
to be treated like a binary file. If a text file does not
compress by 53% or more it will be scanned for illegal
characters. If none are found it will be enciphered as a
plain text file. If illegal characters are found you will
be notified and given the option of treating the file as
a binary file. If this is the case the file will automatically
be compressed before it is enciphered.

A binary file is any file that is not a text file. This means
that it has character codes not allowed in a text file. This
includes all COM, EXE, spreadsheet, and database files, etc.
Before a binary file can be handled by any E-Mail Service
it must be converted to a text file. The way this is done
is to expand the file into an ASCII Hex File Format.


Page 36

This is done by changing each byte of the file into two bytes
with each byte being the codes 48 to 57 (codes for the
letters 0 to 9) and codes 65 to 70 (codes for the letters
A to F). Because of this the size of the file to transmit
is double the original file. This is why it is always best
to compress any binary file before it is converted to ASCII
Hex File Format for enciphering. After the file is deciphered
it will be converted from ASCII Hex File Format to its
original state and it will be decompressed if required.

Because a binary file does not have any carriage returns,
lines feeds, or spaces as the first position of each line,
they are added by the enciphering process and ignored by
the deciphering process. A text file has a space put in as
the first character of each line by the enciphering process
and ignored by the deciphering process.

Most people download their E-Mail only once or twice a day
and it gets placed into one file. Because it is possible to
have more than one enciphered message in this file Global
Security scans the file and will find and decipher each
message in the file and place it into a seperate file in the
selected directory.

As you can see, with the addition of routines for E-Mail,
Global Security is a much more powerful program than before.
Most large businesses, corporations, governments, etc. use
E-Mail every day to transmit messages across town or around
the world. Now the messages can be transmitted without fear
of anyone being able to decipher and read them. If the home
office in Washington D.C. needs a legal brief from a branch
office in Japan within the next few hours the only way to
get it there that fast may be by E-Mail. If the brief will
have a major impact on Wall Street if intercepted by the
wrong people, it must be enciphered before it is transmitted.
Global Security is the only program available that can do
the job and not even the National Security Agency (NSA) of
the United States Government will be able to decipher the
message.


Selecting Encipher:

When you select encipher you will first be asked if you want
to encipher a text or binary file. Select the type file you
want to encipher. You will then be asked if you want to
compress the file before it is enciphered. Next you will
be asked if you want to WIPE the original file after it is
enciphered. Then you will need to select the file you wish
to encipher from the file selection screen. If you need to
change drives and/or directories to find the file do so.
If you elected to encipher a text file without data
compression an information screen will be displayed informing
you that the file is being scanned for illegal characters.


Page 37

If any are found a dialog box will appear telling you how
many illegal characters were found and asking you if you
want to treat the file as a binary file. Answer yes or no.
If you answer no the enciphering process will be stopped
and you will be returned to an appropriate menu. If you
answer yes you will then be asked to select a destination
drive and directory to place the enciphered file into. Then
you will be asked for a password (optional) which will be
required to decipher the file. Next you will be asked to
enter any Special Instructions for whoever will decipher
the file. These instructions will be displayed before the
file is deciphered. The enciphering process will take over
and do the rest.

If you selected to encipher a text file with data compression
and it did not compress by 53% or more an information screen
will appear telling you that the data compression was not
successfull and that the file is being scanned for illegal
characters. If none are found the file will be enciphered
as a plain text file. If illegal characters are found a
dialog box will appear telling you how many illegal
characters the program found and asking you if you want to
treat the file as a binary file. If you answer no the
enciphering process will be terminated and you will be
returned to an appropriate menu. If you answer yes the file
will automatically be compressed, expanded, and enciphered.
The enciphered file will be placed in the selected directory
and given the same name as the original but with a file
extension of "EEM".

Selecting View:

If you wish to see what an enciphered E-Mail file looks like
select view. The File Selection Screen will appear and ask
you to select the "EEM" File you wish to view. If you have to
change drives and/or directories to find the desired file do
so. The file will then appear and you can page through it the
same way as viewing any of the other files. The largest "EEM"
File you can view is 5,952,000 bytes long. You can encipher
and decipher files of any length allowed by DOS so do not
worry about this limitation. The Print Screen Key and the
F6 Key are disabled when viewing an enciphered E-Mail File.

You can also use any text editor to view an enciphered E-Mail
File. When you do this you will see that the form of an
enciphered text file is retained. Enciphered binary files
have a carriage return, line feed, and space added after
every 72 bytes in the file.

SPECIAL NOTE: When a text file is enciphered without file
compression it retains its original format. The letters are
enciphered but the tabs, CR's, and LF's are passed through.
If you do not want anyone to see even the format of a message
always select file compression before enciphering it.

Page 38

Selecting Decipher:

When you download all of your E-Mail for the day it is
usually placed into one file. Within this file you could
have more than one enciphered E-Mail message that has to
be deciphered. Global Security will scan this file and find
and decipher all the enciphered messages in the file one
at a time. The only other problem you will have is to find
out who sent each message to you so you can use the proper
password to decipher the file. There are two ways you can
do this. One is to use a text editor to look at the file.
Before each message you will usually have From and To lines
telling you who the message is for and who it is from. Note
the order of the messages in the file so you know which
password to use. The second one is to use names for the Group
Files used to decipher each message that inform you who the
sender is. Or the sender can put his name in the Special
Instructions.

When you select decipher the File Selection Screen will
appear and you can select the E-Mail File to decipher. This
file could have any name since different E-Mail
communications programs could assign different names to their
files. Next select the destination directory to place the
deciphered messages into. All of the deciphered messages
from the file will be placed into this directory. The file
will then be scanned for the first message to decipher. If
no messages are found a dialog box will pop up to inform
you that there are no messages in the file to decipher. If
there are any Special Instructions in the file header they
will be displayed at this time and you will be given the
option of continuing or quiting the deciphering of this
message. You will then be asked to find and select the
designated "KEY" File required to decipher the message. Next
you will be asked to enter the password needed to decipher
the message. The program will take over and do the rest.
First the message will be deciphered. If the file is a text
file there will be nothing more to do. If the file is a
binary file it will have to be deflated from ASCII Hex File
Format to its binary file form. If the file was compressed it
will then be decompressed. Once the final file is completed a
dialog box will pop up and inform you that the file in on disk.
If the integrity checks were OK you will be informed. Select Ok
and the decipher routines will scan the original file to
see if there are more messages to decipher. If there are
more you will repeat the process of displaying any Special
Instructions, finding the correct "KEY" File and entering the
password for each message.

Data Integrity Checks

When a file fails a data integrity check it usually means
that the file has been altered in some way during the
transmission process. All it takes is one byte to be changed
in the message or file and the data integrity checks will
fail. If a file failed its decipher integrity check it will
probably fail its decompression integrity check also.


Page 39

15.MAKE A ONE TIME PAD

When you select Make a One time Pad the screen will change and
the menu bar on the sixth line of the screen will say Make,
Instructions, Help, and Quit.

What is a One Time Pad:

A One Time Pad allows you to encipher and decipher written
correspondence between two people. It is a pad with randomly
generated letters (and the '-' for word spacing) in the top
row. On the next row down write out the message you wish to
encipher or decipher. Then using the Vigenere Tableau and
the provided instructions encipher or decipher the message
and place the enciphered or deciphered text on the bottom
line. If you were enciphering a message transfer the
enciphered text to a Message Pad for mailing or delivering.
This is ideal for short messages spaced far apart in time.
Once you reach a large volume of messages a computer is
more appropriate. Great fun for kids to use too. See examples
starting on Page 40.

Selecting Make:

When you select make the File Selection Screen will appear
and you will be asked to select a "SCM" File to use to make
a One Time Pad. The associated "DFT" File must be present also.

You will then be asked to enter a seed number between
100,000,001 and 4,294,967,295 and a 7 character Pad ID. The
Pad ID lets you tell one pad from another. If you exchange
encrypted messages with two or more people you can use names
to distinguish which pad to use with each person. Once these
are entered the One Time Pad and a Message Pad will be sent
to the printer. Each One Time Pad is 7 pages long (14 half
pages) as is each Message Pad. Two copies of each are printed.
You have the option of quiting before the printing is finished.

Selecting Instructions:

This prints out the Vigenere Tableau and the Instructions
for using the One Time Pads. You can select anywhere from
1 to 99 copies. Once printed they can be laminated for easier
use.


Page 40

16. HOW TO USE GLOBAL SECURITY

If two people across town or in different countries want
to exchange enciphered files, or enciphered E-Mail messages,
with Global Security, they will need to have the same set of
"DFT", "SCM", and "KEY" files (Group Files). These files have
to be exactly the same or else you will never be able to
decipher any files. If you are the one creating these files
you will need to get them to the other person by the safest
means possible. The safest way is for you to deliver them
yourself. The next safest way would be a private or public
courier service. The least safest way would be to use the
mail service of any country. The mail service of any country
is owned by the government. The have the ability to open any
and all mail, regular or registered, at any time, and you will
never know for sure if they have opened yours or not. Only you
can decide what method is safe enough for you.

Next you have to decide where to keep these files. If you
work in an office where other people have access to the
computer you work on do not keep them on your hard disk.
If you do anyone will be able to copy them when you are not
around. Keep them on a floppy disk that you carry back and
forth from home to the office. This decision is also up to
you. Just remember, if anyone is able to copy the files
someone probably will.

How often should you change these files? The best answer
is as often as possible or practical. If you suspect that
someone may have copied them you need to change them right
away. Other that that you should have an irregular schedule
for issuing a new set of Group Files.

A list of passwords you will use must be set up also. This
list must be kept as safe as the Group Files. You could
have a password that changes with every message, or every
day, or every week, or every month, etc. How you set up the
passwords is up to you.

Global Security is uncrackable even by the National Security
Agency (NSA), but only if your Group Files and Password List
are kept safe. If they are stolen without your knowledge
your enciphered files or E-Mail messages can be intercepted
and deciphered. Global Security will do its job if you do yours.

You must always think that someone has intercepted your
enciphered files or E-Mail messagesbut as long as they do
not have your Group Files or password list they will never
be able to decipher them. The people most likely to intercept
them are the NSA and the FBI. I quote from the 2 March 1994
article in the business section of The Washington Post
mentioned earlier: "The FBI and NSA have long enjoyed broad
legal and technological powers to snoop-to capture virtually
any conversation or data transmission over phone lines, by
cellular or cordless phone and with a variety of exotic
methods."


Page 41

There are four ways to use Global Security.

1) Encipher a file in the original format, transmit it
or mail it on disk, and decipher it on the other end.
When you use the original enciphering method the
resulting file can only be transmitted as a binary
file. Companies like CompuServe and most BBS's allow
you to upload and download binary files. If the
company you work for allows binary file transmission
between its different offices you can use this method
to transfer enciphered files back and forth. If your
communications program inadvertently adds characters
or lines to the beginning or end of the file they
will be ignored by the deciphering process. Do not
try to merge two enciphered files together to transmit
as one file because most word processing programs
will reformat the files making them impossible to
decipher.

2) Prepare and encipher a text or binary file for
transmission by any E-Mail Service, transmit it, and
decipher it at the other end. E-Mail is now available
to almost everyone who has a computer. Individuals,
companies, corporations, government agencies, etc.
all use E-Mail to send messages, data, and files
across town or around the world. Because of the
nature of E-Mail Systems your data can very easily
be intercepted and read at numerous points along
the way. An E-Mail message sent from the Middle East
to the head office in Los Angles, Calif. may go
through several interconnected E-Mail Systems before
it gets to the person it was meant for. Many of these
E-Mail Systems overseas are owned and operated by
different governments. You can be sure that any
interesting messages wind up on the desks of numerous
government agencies or intelligence services. This
is why you need Global Security. It can encipher
an E-Mail message so that not even the National
Security Agency (NSA) can decipher the it.

Even though files enciphered for transmission by
E-Mail are in text format it is best not to merge
two enciphered files together for transmission as
one file unless you know exactly how your word
processing program works. Not all word processing
programs will merge them correctly and they will not
be able to be deciphered.

You may use a word processing program to add text
at the beginning or end of a file enciphered for
transmission by E-Mail. Make sure that you do not
alter the E-Mail Header ID String in any way and
that you do not alter the last 5 bytes of the file


Page 42

which are a carriage return, line feed, space,
carriage return, and line feed. The E-Mail Header
ID String starts with a space. If this space
is removed the message will not be found to be
deciphered. Each line in the enciphered file also
starts with a space. If this space is removed the
file will not decipher correctly.

If you merge two files or add to the beginning or
end of an enciphered file alway test it to make sure
it can be deciphered before you transmit it.

3) Encipher files for storage on your hard disk and WIPE
the original file and all backup copies. This way
no one will be able to access the sensitive data in
the files except you. Not even your boss if you want
to keep secrets from him.

There is only one way to WIPE backup copies or
already deleted copies of files from your disk. This
is to use one of the popular disk and file utilities.
I use Norton Utilities WipeFile, UnErase, and SpeedDisk.
With WipeFile you can Wipe whole disks or selected files
from any disk. Once these files are wiped you will
not be able to recover them. WipeFile will also wipe
any slack space at the end of any file which can
contain sensitive data from other files that have
been deleted. In order to wipe files that have already
been deleted you will have to use WipeFile to wipe
unused disk space or you can use SpeedDisk to unfragment
your disk with the option to clear any unused space
on the disk when it is done.

After you have written a very sensitive report you
delete any backup copies and encipher the file with
the option to WIPE the original file after it is
enciphered. Two days later data from this sensitive
report appears in all the major newspapers. Where
did the data come from? It came from the backup copy
you deleted but did not wipe. Someone came in at
night and looked at all the deleted files on your
hard disk to see if there was anything of value
he/she could use. A file that has been deleted by
DOS only has its directory and FAT entries deleted.
The data from the file is still on disk and can be
recovered.

4) Use the One Time Pads for short messages with anyone
that does not have a computer. The messages can be
sent by mail, telegram, messenger, or delivered by
phone conversation. Accuracy and attention to detail
are the key to using the One Time Pads effectively.
Any messages that are intercepted are safe from being
deciphered by anyone that does not have a copy of
the One Time Pad used to encipher it.


Page 43

17. Transmitting Enciphered Files

Once you have a file enciphered you have to transmit
it to another computer to get it delivered to the right
person. This could be to another PC in the next state,
the mainframe computer in the home office, or an E-Mail
Service such as MCI.

The communications programs used will depend on the
circumstances. The choice will be up to you. All
communications programs used must be able to transmit
files without any errors and without adding any extra
bytes into the file between the File ID String and the
end of the file. Characters or lines added to the
beginning or end of the file are OK.

A file that had been enciphered in the regular format
is a binary file and the communications programs used
must be able to transmit binary files between computers.
When transmitting a file in this manner almost all
communications programs transmit an exact image of the
file and do not add any extra bytes to the beginning or
end of the file.

A file enciphered for transmission by E-Mail is a text
file. It has only characters 32 to 127, the carriage
return, line feed, and tab control characters in the
file. When you transmit a file by E-Mail, the E-Mail
Service adds a header to the file. This usually contains
a From and To line and may contain other information
depending on the E-Mail Service you are using. The E-Mail
Service then places this into the "mailbox" of the person
you have sent it to along with all of his/her other mail
from other sources. As long as the E-Mail Service did
not alter any bytes between the Global Security E-Mail
ID String and the end of the file you will have no
trouble deciphering it when you download your mail.

SPECIAL NOTE: Since there is no Global Security program
to decipher an enciphered file that has been transmitted
to a mainframe computer you will have to download the
file from the mainframe to a PC before it can be deciphered.

SPECIAL NOTE: If the enciphered file has been transmitted
to an Apple Macintosh computer you will also have to
download the file to a PC before it can be deciphered.
This has to do with the way the Macintosh computer stores
data as well as the fact that there is no version of Global
Security for the Macintosh.


Page 44
STARTUP ERRORS

There are 4 errors that can be displayed upon startup of
GS32.EXE and 2 for GS16.EXE. They will be displayed and
you will be returned to the DOS prompt.

1. For GS32.EXE only.

Sorry! An 80386 or 80486 is required to execute Global
Security - 32.

2. For Both GS32.EXE and GS16.EXE:

Global Security - 32/16 requires DOS Version 3.x
or above.

3. For both GS32.EXE and GS16.EXE:

Global Security - 32/16 needs to be in 25 rows by
80 columns Mode.

If your display is set to display anthing other than
the above please set it back using the DOS Mode Command
(MODE CO80 for color or MODE BW80 for black and white).

4. For both GS32.EXE and GS16.EXE:

Gobal Security - 32/16 cannot find itself at the
end of the Environment.

In DOS 3.0 and above a fully qualified drive, path,
and program name is place at the end of the
environment assigned to the program. Global Security
uses this information to find itself and place the
GLOBAL.PRN file in the same directory. If you get
this error message it means that you are using a
DOS version of 1.x or 2.x. Or your version of DOS
does not place this information at the end of the
program environment.

PROGRAM ERRORS

The following errors are displayed by the Extended Error
Reporting System as required by the program.

1.Current Drive Index Too Large for Drive Table

When the program first determines which drives are
installed in your system (substituted drives included)
it builds a drive table and an index for the current
drive. It checks for a maximum of 26 drives but only
the first 12 are usable by the program. If the drive
you loaded the program from has an index greater than
12 the program will display the error and then exit the
program.


Page 45

2.Wrong KEY File Selected

When deciphering a file you will be asked to select the
designated KEY File to decipher the program. If you
select the wrong one you will be told and then returned
to the File Selection Screen to select the correct KEY
File.

3.More than 1,000 Directories on Disk

If you load Global Security from a disk with more than
1,000 directories the Extended Error Reporting System
will display this error and then exit the program.

If you select a disk drive within the program to use
that has more than 1,000 directories you will be returned
to the File Selection Screem to select another disk
drive.

4.Number Already Used

While creating a Default Paramter File you cannot place
2 or more password characters in the same position. If
you try to use a number twice the Extended Error
Reporting System will tell you and you will be returned
to the number entry screen to enter another number.

5.Enciphered File too Large to View

If the enciphered file you selected to view is larger than
5,952,000 bytes the Extended Error Reporting System will
tell you and return you to the File Selection Screen
to select another enciphered file to view.

6.Number Entered too Small

Number entered is out of range on the small side. You
will be returned to the number entry screen to enter
a number in the correct range.

7.Number Entered too Large

Number is out of range on the large side. You will be
returned to the number entry screen to enter a number
in the correct range.

8.Number Entered not Even

While entering a number for the Search Factor an odd
number was given. You will be returned to the number
entry screen to enter an even number.


Page 46

9.Number Entered not Odd

While entering a Starting Number for the Prime Number
search an even number was entered. You will be returned
to the number entry screen to enter an odd number.

10.S.F. and S.N. Evenly Divisible by Same Number

The Search Factor and Start Number are checked to make
sure they have no common divisors between them. If they
were to have a common divisor no prime numbers would
be found. If they do have a common divisor you will be
returned to the Start Number entry screen to enter
another starting number.

11.Insufficient Space on Disk

When creating any file the program checks to make sure
there will be enough space on the disk to hold it. If
not the Extended Error Reporting System will tell you
and then return you to an appropriate menu. At this point
you may have to change disks or exit the program and
erase some files on the disk you want to use.

12.Substituted Drive

While selecting a drive to use in the File Selection
Screen you selected a substituted drive (ie. a drive
letter has been substituted for a path name). You will
be returned to the File Selection Screen to select an
unsubstituted drive. This applies to Assigned drives
too. (See DOS ASSIGN and SUBST commands in your DOS
Manual)

13.File is Incomplete

When you selected a Prime Number File to scramble you
selected one that was incomplete. You will be returned
to the File Selection Screen to select another Prime
Number File to scramble.

14.File Contains Invalid Data

A check is made on some of the files created by Global
Security. If you ever get this error message the file
has been corrupted. You will be returned to an appropriate
menu.

15.File is Already Complete

When selecting a Prime Number File to finish you selected
one than is already complete. You will be returned to the
File Selection Screen to select another file to finish.


Page 47

16.File Not Found

At various times in the program you will need 1 or 2
additional files in a process. When you encipher a file
you are asked to select a KEY File to use. The SCM and
DFT files with the same name must also be present. If
they are missing you will get this error message with
the file name and then returned to an appropriate menu.

17.More than 12 Levels of Subdirectories

If you have more than 12 levels of subdirectories the
program will exit upon startup after displaying the above
error message. After startup if you use a disk that has
more than 12 levels of subdirectories the program will
display this error message and return you to an
appropriate menu.

18.Decompression Integrity Check Failed
Decipher Intrgrity Check Failed

An error was detected during the integrity check while
deciphering or decompressing. Data may be corrupted.
If the file was transmitted to you ask for it to be
enciphered, compressed, and transmitted again.

19.Disk Full

Since the calculations of the required disk space needed
to decipher a file or set of messages for E-Mail may
not always be accurate you will get this message if the
disk you are using to put deciphered files/messages onto
runs out of room. Make more room on the disk or use your
hard disk to put the deciphered files onto.

20.Not a Valid "ENC" File to Decipher

The decipher routine could not find the proper Global
Security File ID String which identifies this as an "ENC"
File. The ID String may be corrupted or you have selected
a file with an "ENC" file extension but which is not
a true "ENC" file.

21.No E-Mail Messages in File to Decipher

While scanning a file of E-Mail messages none were found
to decipher. If you know for a fact that there are
messages to decipher in the file the Global Security
E-Mail ID String has been corrupted.


Page 48

22.Too Many Files With The Same Name

The decipher routines will assign the original name to
any file it decipheres. If a file with the same name
already exists in the directory it will use the same
file name but assign a file extension of "001". If "001"
is in use it will use "002", etc. all the way up to "999".
If you already have 999 file names like this in the
directory you will get this message.

23.Future Compression Method Used
Future Encryption Method Used

You are attempting to decipher or decompress a file
or message that has been enciphered or compressed by
a method used by a future version of Global Security.
Select Ok from the Extended Error Reporting System
Screen and you will be returned to an appropriate menu
or, if you are deciphering E-Mail Messages, the program
will continue looking for valid messages to decipher
until the end of the file has been reached.


Page 49

CRITICAL ERRORS

The following errors are reported by the Critical Error
Reporting System. Possible remedies are also suggested.

1.Disk Write Protected

Remove the write protection from the disk and select
Retry from the Critical Error Reporting System menu.

2.Unknown unit

With the File Selection Screen this error should never
be encountered. But if it is select Cancel from the
Critical Error Reporting System menu and you will be
returned to an appropriate menu.

3.Drive Not Ready

You have selected a drive without a disk in it. Insert
a disk in the drive and select Retry from the Critical
Error Reporting System menu or select cancel and you
will be returned to the File Selection Screen to select
another drive.

4.Unknown Command

A device has received an unknown command. If you ever
encounter this critical error select Cancel from the
Critical Error Reporting System menu and you will be
returned to an appropriate menu.

5.Data Error (Bad CRC)

A data error as indicated by a bad CRC value has been
encountered. You may select Retry from the Critical Error
Reporting System menu and DOS may be able to overcome
the error. If it still reports Data Error after a few
attempts select cancel from the menu and you will be
returned to an appropriate menu. The process you were
trying to do will be cancelled and all files being worked
on or created will be taken care of.

If you continue to get this error repeatedly on a floppy
or hard disk it indicates that the disk is going bad
in the area reported by the Critical Error Reporting
System.

6.Bad Request Structure Length

Select cancel from the Critical Error Reporting System
menu and you will be returned to an appropriated menu.

Page 50

7.Seek Error

A disk drive is having problems finding a specific track
or cluster on a disk. Select Retry from the Critical
Error Reporting System menu a few times to see if DOS
can overcome this error. If it cannot select Cancel and
you will be returned to an appropriate menu.

If you continue to get this error repeatedly on a floppy
or hard disk it indicates that the disk is going bad
in the area reported by the Critical Error Reporting
System.

8.Unknown Media Type

A disk with an unknown or improper format type is being
used. This may also happen because of different format
programs being used which are not compatable with all
computers (ie. my 386 will not read any disk formated
by my brothers IBM PS/2 286). Select Cancel from the
Critical Error Reporting System menu and you will be
returned to an appropriate menu.

9.Sector Not Found

A disk drive could not find the sector it was looking
for. You can select Retry from the Critical Error
Reporting System menu a few times to see if DOS can
overcome this error. If it cannot select Cancel and you
will be returned to an appropriate menu.

If you continue to get this error repeatedly on a floppy
or hard disk it indicates that the disk is going bad
in the area reported by the Critical Error Reporting
System.

10.Out of Paper

Will never be reported by Global Security because it does
not use DOS to print with.

11.Write Fault

Select Retry to see if DOS can overcome the error. If
it cannot select Cancel and you will be returned to an
appropriate menu.

If you continue to get this error repeatedly on a floppy
or hard disk it indicates that the disk is going bad
in the area reported by the Critical Error Reporting
System.

12.Read Fault

Select Retry to see if DOS can overcome the error. If
it cannot select Cancel and you will be returned to an
appropriate menu.

Page 51

If you continue to get this error repeatedly on a floppy
or hard disk it indicates that the disk is going bad
in the area reported by the Critical Error Reporting
System.

13.General Failure

I do not know when this critical error would be reported
but I would probably select Abort and try to exit the
program in a controlled manner.

PRINTER ERRORS

The following errors are reported by the Printer Error
Reporting System.

1.TIMEOUT - Printer has timed out. Select Cancel from the
menu in the Printer Error Reporting System, reset your
printer and try again.

2.I/O ERROR - Printer has encountered an I/O Error. Select
Cancel from the menu in the Printer Error Reporting
System and try again.

3.NOT SELECTED - Printer not turned on. Turn your printer
on and select Retry from the menu in the Printer Error
Reporting system

4.OUT OF PAPER - Put more paper in your printer and select
Retry from the Menu in the Printer Error Reporting
System.

5.BUSY - Usually means that the printer is turned on but
is not on line. Put the printer on line and select Retry
from the menu in the Printer Error Reporting System.

PROGRAM LIMITATIONS

The File Selection Screen will only handle:

1. 12 disk drives.
2. 1,000 directories on a disk drive.
3. 2,048 files in a directory.
4. 12 levels of Subdirectories. (DOS has 32)

Floppy Disk Drive Systems: If your computer has only one
floppy disk drive you are not allowed to use this drive as
an A: and B: drive as some DOS utilities do.

Page 52

USING A ONE TIME PAD

The following examples will show you how to use a One Time
Pad to encipher and decipher messages. A copy of the same
instructions and Vigenere Tableau printed by the program
is shown below so you can use it while doing the examples.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z -


A A B CD E FG H IJ K LM N OP Q RS T UV W XY Z -
B B C DE F GH I JK L MN O PQ R ST U VW X YZ - A
C C D EF G HI J KL M NO P QR S TU V WX Y Z- A B

D D E FG H IJ K LM N OP Q RS T UV W XY Z -A B C
E E F GH I JK L MN O PQ R ST U VW X YZ - AB C D
F F G HI J KL M NO P QR S TU V WX Y Z- A BC D E

G G H IJ K LM N OP Q RS T UV W XY Z -A B CD E F
H H I JK L MN O PQ R ST U VW X YZ - AB C DE F G
I I J KL M NO P QR S TU V WX Y Z- A BC D EF G H

J J K LM N OP Q RS T UV W XY Z -A B CD E FG H I
K K L MN O PQ R ST U VW X YZ - AB C DE F GH I J
L L M NO P QR S TU V WX Y Z- A BC D EF G HI J K

M M N OP Q RS T UV W XY Z -A B CD E FG H IJ K L
N N O PQ R ST U VW X YZ - AB C DE F GH I JK L M
O O P QR S TU V WX Y Z- A BC D EF G HI J KL M N

P P Q RS T UV W XY Z -A B CD E FG H IJ K LM N O
Q Q R ST U VW X YZ - AB C DE F GH I JK L MN O P
R R S TU V WX Y Z- A BC D EF G HI J KL M NO P Q

S S T UV W XY Z -A B CD E FG H IJ K LM N OP Q R
T T U VW X YZ - AB C DE F GH I JK L MN O PQ R S
U U V WX Y Z- A BC D EF G HI J KL M NO P QR S T

V V W XY Z -A B CD E FG H IJ K LM N OP Q RS T U
W W X YZ - AB C DE F GH I JK L MN O PQ R ST U V
X X Y Z- A BC D EF G HI J KL M NO P QR S TU V W

Y Y Z -A B CD E FG H IJ K LM N OP Q RS T UV W X
Z Z - AB C DE F GH I JK L MN O PQ R ST U VW X Y
- - A BC D EF G HI J KL M NO P QR S TU V WX Y Z


To Encipher: Write in the plaintext message in the correct place
on the One Time Pad. Find the plaintext letter in
the top alphabet and the key letter in the side
alphabet. Then trace down from the top and in from
the side. The ciphertext letter stands at the
intersection of the column and the row (i.e. plaintext
"M" and key letter "W" equals ciphertext letter "H").
Place the ciphertext letter in the correct place on
the One Time Pad.

Page 53

To Decipher: Write in the ciphertext message in the correct place
on the One Time Pad. Find the key letter in the side
alphabet. Follow that row in until you find the
ciphertext letter. Follow that column up to the
plaintext alphabet at the top. This is your plaintext
letter (i.e. key letter "S" and ciphertext letter "Z"
equals plaintext letter "H"). Place the plaintext
letter in the correct place on the One Time Pad.

Below is what a section of a One Time Pad will look like.
Your pseudo random KEY letters are in the top line.


KEY: V W G K P W Z G Z B V P V G G J N J J EA H B EH

PLAIN: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __ _ _ _ _

CIPHER:_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

If you want to encipher the phrase " ALL LAWYERS ARE CROOKS"
place this text in the plaintext line as shown below.


KEY: V W G K P W Z G Z B V P V G G J N J J EA H B EH

PLAIN: A L L - L A W Y E R S - A R E - C R O OK S _ _ _

CIPHER:_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

Use the "-" as a word spacer. It will make it easier on the
person who is going to decipher the message to seperate the
words.

Next follow the instructions and fill in the ciphertext line
according to the instructions. To encipher the first
plaintext letter find the letter "A" in the alphabet on the
top of Vigenere Tableau and find the first key letter "V"
in the alphabet on the left side of Vigenere Tableau. Trace
down from the top and in from the side. At the intersection
of the column and row you have the ciphertext letter. In
this case it is "V". Place the ciphertext letter "V" below
the plain text letter "A".

KEY: V W G K P W Z G Z B V P V G G J N J J EA H B EH

PLAIN: A L L - L A W Y E R S - A R E - C R O OK S _ _ _

CIPHER: V _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

Now do the same for the rest of the message. The enciphered
message should now look like the example below.

KEY: V W G K P W Z G Z B V P V G G J N J J EA H B EH

PLAIN: A L L - L A W Y E R S - A R E - C R O OK S _ _ _

CIPHER: V G R J - W U D C S M O V X K I P - X SK Z _ _ _

Page 54

Now it is best to transfer the ciphertext to the message
pad, or any plain piece of paper, for sending the enciphered
message.

To decipher just copy the ciphertext message to the correct
One Time Pad. It must be on the same page and starting at
the same place as the original message in order to decipher
it. Otherwise you will just get a garbled message that no
one can understand. This is why you should use a Message
Pad because it tells the person receiving the message what
pad to use and what page and place on that page to start
to decipher the message.

When you receive an enciphered message transfer it to the
correct place on the One Time Pad as shown below. Following
the instructions find the Key letter in the side alphabet.
Trace that in along the row until you find the ciphertext
letter. Go up the column to the top alphabet to find the
plaintext letter. In this case the Key letter "V" and the
ciphertext letter "V" give you a plaintext letter of "A".


KEY: V W G K P W Z G Z B V P V G G J N J J EA H B EH

PLAIN: A _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __ _ _ _ _

CIPHER: V G R J - W U D C S M O V X K I P - X SK Z _ _ _

When you decipher the rest of the message you will get the
following:

KEY: V W G K P W Z G Z B V P V G G J N J J EA H B EH

PLAIN: A L L - L A W Y E R S - A R E - C R O OK S _ _ _

CIPHER: V G R J - W U D C S M O V X K I P - X SK Z _ _ _

Take the dashes out and it will be very easy to read "ALL
LAWYERS ARE CROOKS".

As you can see it is very easy to encipher and decipher
messages using the One Time Pad. Just make sure you are
accurate and you will have no problems. It does take a
little bit of work and that is why the One Time Pad is best
used for short messages and low volume situations.

Five letter groups are used by the One Time Pad to break
up any indication of how long individual words are. The
ciphertext should be sent as five letter groups also.





Page 55

INDEX

Achilles Heel...............17 Default
Algorithm...................10 Parameter Files
Association of SharewareAbout...................18
Professionals (ASP)DFT File Extension......29
Address..................5Different Files.........18
Disputes.................5Menu
Member...................5 Create..............29
Ombudsman................5 Help.............28,29
Available by same Author.....6 Quit.............28,29
View................29
Back Door...................10Password Character
Bamford, James..............12Positions...............29
Binary File..............10,35Random Factory
Block Cursor................20Array Shift.............29
Brute Force Method..........16 DIA.........................14
Byte Magazine...............13 Directory...................10
Directory Tree..............10
Chime.......................23 DOS File Date/Time Stamp....18
CIA.........................14 Dvorak, John C..............12
Ciphertext...............10,16
Click.......................10 E_Mail
"Cloak and Data"............13Binary File.............35
Command Bar..............10,24Decipher................37
Command Line SwitchesEncipher................36
/B......................23Text File...............35
/P......................23View an "EEM" File......37
Communications Satelite What is it?.............36
Corporation (COMSAT)........12 El Gamal Encryption
Compressing Files........32,33 Algorithm...................12
Critical Error Encipher a File
Reporting System............22DOS Date/Time Stamp.....33
CursorFile Attributes.........33
Default.................20File Compression.....32,33
Keys....................10File Header.............33
Laptops.................20File ID String..........33
Large Block.............20 Encipher a File (cont)
Toggle..................20Menu
Encipher............32
Data Encryption Standard Decipher.........32,33
(DES).......................13 Help.............27,32
Data Integrity Checks....33,38 Quit.............27,32
Decipher a File View................33
Compressing Files....32,33Original File Name......33
Decompressing Files.....34Original File Unchanged.33
DOS Date/Time Stamp.....34Password.............32,33
KEY File................34Why?.................12-15
Password................34 Errors
Decompressing Files.........34Start Up................44




Page 56

INDEX

Errors (cont) Grehan, Rick................13
Program.................44
Critical................49 Ideal Program
Printer.................51Easy Encipher/Decipher..17
Extended ErrorFast Encipher/Decipher..17
Reporting System............21Fun to Use..............17
Long Seed Number........17
FBI.........................14Simple Formula..........17
File Group............10,27,31Support Files Easy
File Selection Screento Make.................17
Assigned Drives.........25Use One Time Pad System.17
Command Bars............25 "Inside Track"..............12
Instruction Line........25
Lettering Color.........24 Kahn, David.................16
Limitations.............51 Keyboard
Mouse................24,25ALT Key.................32
PanelsControl C Key...........21
Directory........24,25Control Break Key.......21
Drive............24,25Cursor Keys.............10
File.............24,25Escape Key..............20
Switching...........24Function Keys........20,23
Substituted Drives......25Hot Keys................24
Using...................24Paging Keys.............10
Formulas, EncryptionPause Key...............21
Intricate/Complex.......16Print Screen Key........21
Small Seed..............16 Key Files
Bane of.............17About...................18
Four Ways to useDifferent Files.........18
Global Security KEY File Extension......31
Normal Encipher.........41Largest File............31
E-Mail Encipher.........41Menu
Storage on Disk.........42 Generate............31
One Time Pads...........42 Help.............28,31
Functions Quit.............28,31
Build a Prime Scramble............31
Number File.............27 View................31
Create a DefaultSeed Number.............31
Parameter File..........29 Lempel-Ziv-Welch Method.....33
Decipher a File.........32 Licensing....................6
Encipher a File.........32Site.....................6
Generate a Key File.....31 Limitations
Make a One Time Pad.....39File Selection Screen
Produce E-Mail Disk Drives.........51
Enc/Dec Files...........35 Directories, files..51
Scramble a Prime Subdirectroy Levels.51
Number File.............30One Floppy Disk System..51
Quit....................26 Lucifer.....................13




Page 57

INDEX

Main Menu...................26 Prime Number File
MCI.........................35About...................18
Menus.......................24Different Files.........18
MouseMenu
Click...................10 Build...............27
Hide Pointer............23Command Box.....28
Pad..................23,25Status Box......28
Pointer.................10Timer Box.......28
Right Button............23 Finish..............28
Show Pointer............23 Help................28
Using...................24 Quit................28
Using Mouse Pad.........25 View................28
PRM File Extension......27
National Institute ofSearch Factor...........27
Standards and Technologies..12Starting Number.........27
National Security Printer
Agency (NSA)...........7,12,14Extended ASCIIZ
Operation ShamrockCharacters..............26
Inherited...............14Command Line Switch /P..23
Emulation Modes.........26
One Time PadLaser.................8,26
Pad ID..................39Pause After Page........26
MenuPrint Screen Key........21
Make................39Printer Error
Help.............28,39Reporting System........26
Instructions........39Printer Errors..........51
Quit.............28,39Setup Problems..........26
Seed Number.............39Using...................26
System Produce E_Mail
Consists of.........16 Enc/Dec Files
First Developed.....16ASCII Hex File Format...35
First Used by.......16Binary Files............36
Rejected by.........16Decipher................38
Unbreakable.........16Encipher................36
Using...................49Text Files..............36
Vigenere Tableau.....39,52View "EEM" File.........37
What is a One Time Pad..39 Program Features
Operation Shamrock..........14Chime...................22
Command Line Switch /B..23
Paging Keys.................10Command Line Switch /P..23
Pass It Along................6Control Break Key.......21
Password...........32,34,37,38Control C Key...........21
PC Magazine.................12Critical Error
Phone System - Digital......14Reporting System........22
Plaintext................11,16Escape Key..............20
Preface......................7Extended Error
President Truman, Harry S...12Reporting System........21
Prime Number................11File Selection Screen...23




Page 58

INDEX

Program Features (cont) Senate Intelligence Committe
Mouse Pad...............23Senator Church, Frank
Network Access CodesChairman................14
for Files...............21 Tyranny Speach......15
Pause Key...............21 Shamir, Adi.................13
Print Screen Key........21
Printing Screen Text File................11,35
Image File..............20 "The CODEBREAKERS"..........16
Quick Help "The Puzzle Palace".........12
Reference System........20 Transmitting Enciphered
Right Mouse Button......23 Files.......................43
Saving Screen Image
to a Disk File..........20 Using Global Security.......40
Toggle Curosr...........20
VGA Color Levels........20 What is Electronic Mail?....35
Windows Compatability...23 WIPING a file
Public Key/Private Key......13Backup Copies...........42
Pseudo Random Numbers....11,16Deleted Files...........42
Pseudo RandomSlack Space at end
Number Generator............11of a file...............42
Unrecoverable........32,42
Receive Only Station (RCV)..12 WordPerfect.................12
Rivest-Shamir-Adelman (RSA)
encryption algorithm........13
RSA Data Security...........13

Scrambled Prime Number File
About...................18
Different Files.........19
Menu
Help.............28,30
Quit.............28,30
Scramble............30
Rescramble..........30
View................30
SCM File Extension......30
Seed Numbers............30
Security
Authorized person.......19
Change Files............19
Files Locked Up.........19
Steal Files.............19
Secret Service..............14
Seed Number.................11
7,776 bits (972 bytes)..19
Initial.................18
Small...................17



 December 7, 2017  Add comments

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

(required)

(required)