This action might not be possible to undo. Are you sure you want to continue?
EXE AND ITS SOURCE FILES INTRODUCTION DLOCK is a Data LOCK program that uses the Diamond encryption algorithm. also tests the correct implementation of the Diamond and Diamond Lite encryption algorithms in the enclosed library files. Although DLOCK is useful as it stands, it is probably of more use as a library of source code to use to build encryption into other applications. Diamond and Diamond Lite are 100% roylty free algorithms, derived from the MPJ and MPJ2 encryption algorithms. I've studied too much cryptography to make a brash claim of security for any algorithm, but my confidence level in Diamond and Diamond Lite is very high because of the failure of anyone I've dared to break MPJ to do so for several years. See the challenge section below. When used to encrypt or decrypt files, DLOCK places no special headers or other identification on the ciphertext files. This is good for security, but bad for user friendliness. It always processes from one file to another, so that you can verify that the encryption or decryption is good before deleting the original. This is very important, since a single character typo in the pass phrase is enough to render a file total garbage. LEGAL NOTICES Documentation files, executable files, and source code files not marked otherwise are Copyright (C) 1994 Michael Paul Johnson. All rights reserved. There is NO WARRANTY expressed or implied for any of this. Diamond and Diamond Lite are Trade Marks of Michael Paul Johnson. Other trade marks mentioned herein belong to their owners and are mentioned for identification purposes only. Some cryptographic, cryptanalytic, and key management software and technical data is subject to export controls and other legal restrictions. Contact competent legal authority for more information. It is your responsibility to comply with all currently valid laws and treaties that apply to you. Do not use this software or technical data for any illegal activity. As far as is permitted by law, permission is hereby granted to copy and use the copyrighted portions of this distribution for any legal use, provided that the documentation is kept unmodified and the software is used in accordance with the GNU Library General Public License as published by the Free Software Foundation, version 2. CRC.H, CRC.CPP, DIAMOND.H, and DIAMOND.CPP are in the Public Domain. SYSTEM REQUIREMENTS Two compiled versions are included in this distribution: MS-DOS executable and Sun SparcStation binary. If you wish to use this program on another platform, you may recompile the provided source code for that platform. It
COMMAND LINE SYNTAX To test Diamond and Diamond Lite against the validation data in DIAMOND.DAT: DLOCK /T To encrypt a file: DLOCK /E [/S] infilename outfilename [/Ppass phrase | /Kkeyfile] /E = Encrypt. /S = Silent mode (minimal screen output). /P = Pass phrase follows on the command line. The pass phrase is case sensitive, and every character counts. Embedded spaces are OK. /P, if used, MUST be the lase command line parameter, since all characters after it are considered to be part of the passphrase. /K = Get the pass phrase from the file name provided. The passphrase in a key file may include ANY binary data, up to 256 bytes. Note that if /P or /K is not used, then DLOCK looks for the passphrase in the environment variable DLOCK_KEY. If no passphrase is found there, then DLOCK will prompt you to enter the passphrase at the keyboard. Spaces and other special characters are allowed in the passphrase. For example, DLOCK /E MARCH.WK1 MARCH.ENC /PNone of YoUr BuSiness! Really! encrypts MARCH.WK1 with the passphrase "None of YoUr BuSiness! Really!", placing the results in MARCH.ENC. If you wish to get rid of the plain text version, use another utility to overwrite and delete the original. To decrypt a file: DLOCK /D [/S] infilename outfilename [/Ppass phrase | /Kkeyfile] Switches used here are the same as for encryption, except that the /D (for Decrypt) replaces /E. For example, DLOCK /D MARCH.ENC MARCH.WK1 /PNone of YoUr BuSiness! Really! decrypts the file encrypted above. Command line switches are not case sensitive, and may start with - or /. There should be a space or tab between adjacent switches. Except for /P, which must be last, the switches may occur in any order (before, between, or after the file names). HOW DLOCK WORKS When encrypting or decrypting files, DLOCK uses a 10-round Diamond block cipher in cipher block chaining with ciphertext feedback mode (CBC). This means that any regularities in the plain text are completely obscured in the cipher text. The original file length is exactly preserved. See the source code and the accompanying documents for details. ADVANTAGES OF DLOCK
1. To the best of my knowledge, no one has broken Diamond (or its predecessors, MPJ and MPJ2), yet. See the US$271.82 challenge, below. 2. The block chaining mode is time-tested and well respected.
3. Complete source code is included for your examination and to facilitate porting to other platforms. 4. 5. The cipher text is the same size as the plain text. It is free.
6. You are free to use the algorithms and/or code in this distribution to incorporate encryption into your own applications, without payment of royalties or delays. 7. Diamond and Diamond Lite, when incorporated into a system that weakens the effective key length and resists modification by the user to the satisfaction of the NSA, may be exportable. Contact the Department of State and the NSA for details and additional requirements. 8. DLOCK allows easy validation of implementations of Diamond and Diamond Lite. 9. If you don't like the way DLOCK works and you can program in C or C++, you can fix it to your liking. 10. The author is easy to contact via email (firstname.lastname@example.org).
11. The encryption is too strong to be generally exportable. There are no intentional weaknesses or trap doors in the algorithm or the program. 12. Identical files, encrypted with identical keys, always yield identical ciphertext. This is good for validating algorithms. DISADVANTAGES OF DLOCK 1. Key management is all manual.
2. Encryption of multiple files is cumbersome unless you use an archiving utility (like PKZIP, LHA, ARJ, etc.) first. 3. No one is getting rich on your purchase of this product, so it doesn't help the economy, much. 4. The ciphertext reveals the size of the plain text (but not its contents).
5. Identical files, encrypted with identical keys, always yield identical ciphertext. This is bad for resistance to traffic analysis. 6. No 7-bit ASCII armoring (uuencoding or radix-64 encoding) is built in for EMAIL purposes -- use another utility to do that. 7. The encryption is too strong to be exportable without a lot of hassles and controls on the destinations. 8. If you forget your passphrase, your encrypted data is as good as gone. I
can't get it back, no matter how important it was. DATA COMPRESSION DLOCK doesn't compress data, but if you compress your data before encrypting it (i.e. with PKZIP, ARJ, etc.), you will decrease the size of the ciphertext and improve security. Attempted compression after encryption does neither. RECOMPILING DLOCK You don't really need to recompile DLOCK unless you want to modify it or port it to another platform. I compiled DLOCK.EXE with Borland C++ 4.0, using the commands in MAKDLOCK.BAT. This batch file also applies PKLITE compression, but that is optional. I compiled the Unix version of DLOCK on a Netcom interactive host machine with the command: c++ -DUNIX -o dlock dlock.c diamond.c crc.c VERIFYING THAT YOUR VERSION HASN'T BEEN TAMPERED WITH If you have PGP, you can check my detached signatures on the files in this distribution with the file VALIDATE.BAT, which should look like: pgp pgp pgp pgp pgp pgp pgp pgp pgp pgp pgp pgp pgp pgp pgp pgp challeng.sig challeng.enc copying.sig copying.txt crc_cpp.sig crc.cpp crc_h.sig crc.h def.sig def.h diamondc.sig diamond.cpp diamondd.sig diamond.dat diamondh.sig diamond.h diamondp.sig diamond.ps diamondt.sig diamond.txt dlocksun.sig dlock dlockcpp.sig dlock.cpp dlockexe.sig dlock.exe dlocktxt.sig dlock.txt makdlock.sig makdlock.bat thesis.sig thesis.txt
If you don't have a copy of PGP, you can buy a copy from Viacrypt or get the freeware version from numerous sites, including the Colorado Catacombs BBS (303-938-9654) or ftp, see ftp:csn.org//mpj/README.MPJ. THE US$271.82 CHALLENGE OK, US$271.82 is not enough to pay for the time it would take to do serious cryptanalysis of the Diamond Encryption Algorithm, but it is enough to prove that data encrypted with DLOCK is secure against the average hacker. The file CHALLENG.ENC was encrypted with DLOCK.EXE. If you are the first person to (1) decrypt CHALLENGE.ENC and (2) follow the instructions in the decrypted file to claim your prize before midnight UTC, 29 April 1997, then you will get US$271.82 of my hard-earned money. To claim this prize, you must reveal how you deciphered the ciphertext. You must also not break the law
(including any currently valid export laws) in the process of earning this prize. If the ciphertext is not broken, I get to keep my money. The plain text that CHALLENGE.ENC was encoded from is plain, uncompressed, 7-bit ASCII with both CR and LF at the ends of lines. It contains English text, including instructions on how to claim the prize and contact the author. THE FAIR CHALLENGE The US$271.82 challenge given above is probably unfair, unless I really goofed badly in the implementation of DLOCK or the invention of the Diamond Encryption Algorithm. On the other hand, if you find what you think is a weakness or error in either DLOCK or Diamond (other than the disadvantages listed above), please let me know. There is no cash reward for such information, but I will use the information to help improve the encryption programs that I write. CONTACTING THE AUTHOR You can reach me by email at email@example.com, CompuServe 71331,2332, or at Mike Johnson, PO BOX 1151, LONGMONT CO 80502-1151, USA. Check for the latest version of this program on the Colorado Catacombs BBS, 303-938-9654, or for ftp from csn.org//mpj or ftp.netcom.com//pub/mpj. REGISTRATION This program is free, so registration is not required. However, if you would like to be added to my list of users to be notified of upgrades and related products, or if you would like to make a donation to advance the cause of free privacy protection software, feel free to contact me at the above address.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.