

Manual for cryptic v3.15
This software is freeware I accept no liability what so ever on its use
or any possible file damage which may result. Having said that its been
around for a few years and a number of people have used it with only
one or two bugs reported. At this time I know of no remaining bugs
(or as I was once told by a professional programmer, "there are no such
things as bugs they're just undocumented featchers").

Note this program does not write back to the origional, however to be 
safe it is always a good idea to have a backup.

This program is for the experimentation of encryption and has the side
effect of being an verbatum and convention encryption and encryption
modification program as well.

Revision History:-

      10 Sep 01     fixed but in unmerge
      07 May 00     fixed a bug in help files
      01 May 00     added modulus 2 encryption to the xor encryption
      30 Apr 00     put modify in 
      15 Feb 00     put backward compatability in
      14 Feb 00     put multipass noise in
      06 Feb 00     put vert and unvert in 
      07 Dec 99     improved noise function
      04 Dec 99     put copy in
      26 Nov 99     corrected bug in multple scan routine
      21 Nov 99     corrected bug in scan decode routine
      16 Nov 99     corrected bug in verbatum cipher rewind              
                    corrected fault in pgp header removal and insertion
                    prints characters as well as decimal byte info in preamble
                    corrected bug in size function
                    added cracking functions
                    added noise (z) generator
                    corrected bug in crack function
                    putin unnoise function
                    put random noise in
    13 Oct 99       passphrase replaced by hash function in file
    13 Nov 99       compair function put in


You start the program from dos with one of the following switches i.e.

cryptic -encrypt 
switches
        -encrypt     [mod2andxor encrypt E]
        -decrypt     [mod2andxor decrypt E] 
                     Conventional encryption using a pseudo random number generator

        -verbatum    [encipher Vxxxxx]
        -unverbatum  [decipher Vxxxxx]
                     A verbatum cipher is when instead of using a pseudo random 
                     number generator you use a second file which can be anything
                     as the key. This program processes zeros in the file so all
                     bytes are xor'ed with the key and no plain language is left.
                     This type of cipher is also known as a one time pad because
                     if you only use the key file once its said to be uncrackable.
                     but if you use it many time it can be cracked, an offset 
                     in this program makes this less likely.

        -reverse     [invert whole file S]
                     Inverts the file so the last byte becomes the first.

        -invert      [invert all bits I]
                     In each byte every bit which is a 1 becomes 0 etc.

        -lr1         [roll all bits right by 1 Lx]
        -rr1         [roll all bits left by 1 Rx]
                     In each byte the bits are wrapped round so bit 2 becomes 
                     bit three etc.

        -rotate      [rotate all bytes by offset Txxxxx]
                     As it says the seventeenth byte becomes whatever; eighteenth
                     etc.

        -merge       [merge multifiles U]
                     This process takes two files and interlaces the bytes 
                     the opposite of unmerge.
        -unmerge     [unmerge multifiles U]
                     This process takes a file and puts all the odd bytes in one
                     file and the even ones in another. It can also remove the 
                     interspaced zeros some people use to stop you viewing
                     script files like the hidden one in windows called webview.js.

        -mask        [places double mask in file M]
                     This xors all the bytes with a preset byte, do it twice to
                     unmask.
  
        -compair     [compairs two files ]
                     As stated compairs two files together.

        -copy        [copies changes name and creation date of file]
                     As stated copies changing the name date etc. of file.

        -help        this screen       
        -help2       help screen 2
        -help3       help screen 3
                     These three are just help screens

        -keyhelp     key help  
                     If you actually used a number of processes to encrypt a file
                     this screen is a suggestion of how you tell someone what
                     you've done.
        
        -wibble      [insert syncronus white noise W]
        -unwibble    [remove syncronus white noise W]
                     It interspaces every other charactor with noise.

        -noise       [insert random noise Z]
        -unnoise     [extract random noise Z]
                     Places noise in an encrypted file to resist any form of 
                     analysis (the noise is real noise but as its placed 
                     pseudo randomly in the file the program knows how to
                     take it out again.

        -random      [encrypts random noise]
        -unrandom    [removes random noise]
                     Anothe form of noise insertion.

        -vert        [secondry noise insertion]
        -unvert      [secondry noise removal]
                     The most advanced of all the noise insertion methods.

        -multi       [insert multipass encrypted noise]
        -unmulti     [remove multipass encrypted noise]
                     Another noise insertion experiment.

        -modify      [crypto modifier]
        -unmodify    [remove crypto modifier]
                     More noise modification experiments.

        -duress      [duress code detector]
                     This places a five bit code in a file which can be detected 
                     as an indicator that the file was processed under duress.

        -preamble    [prints first 11 bytes in deanary and ASCII]
                     Found to be usefull does as stated

        -size        [reports file size to screen]
                     As stated

        -rempgp      [remove pgp pre-header P5]
        -inspgp      [reinsert pgp pre-header P5]
                     Removes or replaces first five bytes in pgp file.

        -rempub      [strips pgp 1 ads file of public key]
        -inspub      [reinserts public key into pgp file]
                     In a pgp file with only one person as its recipitant will
                     remove the public part of the encryption. Will require 
                     a file encrypted in the same key as a referance before
                     the file can be regenerated.

        -white       [creates file containing white noise]
                     Creates a file of pure noise (these are usefull for crypto
                     experiments).

        -kill        destroys 1 or more alpha sequences from Steganographic
                     MOdulator DEModulator stream
                     Steganography is the art of hiding encrypted information 
                     in such a way as to make it invisible and unanalysable.
                     This was part of an experiment for inserting code into
                     the inband data part of the video signal on a video tape.
                     Well beyond the scope of this manual to explain.

        -insert      [create alpha key marker]
                     This creates an encrypted sync marker for the above.

        -zeros       [creates file containing all zeros] max size is 
                     2,000,000,000 bytes! This is a usefull process for
                     experimenting with encryption.
   
        -back        [backward compatability C20]
                     Back is a function which is redundant, I replaced it with 
                     a better one in vert, however when I took it out I had 
                     complaints because some people had used it and couldn't 
                     get their data BACK. So unless you already have files 
                     using this form of noise insertion, I suggest you don't
                     use it. 
        -unback      [backward compatability C20]
                     This process reverses the back process

        -scan        [alpha code scanner]
                     Part of the steganography experiments, basically scans
                     a stream of data for encrypted sync markers.    

        -xor         [xor function for 2 files]
                     Takes two files and xor's them together. Basically if you
                     get two binary numbers and add them together without carrying
                     over to the next columb, then thats xoring, if one is plain
                     language and the other a key, the output file is a crypto-
                     grame. Do the same back again with the cryptogram and the
                     key and the plain language comes back out.

