Global Security 16 A Data Security Program! TAN$TAAFL Software Company Version 3.40 þ 4 July 1995 A Shareware Distributed Program! CUSTOMER SERVICE Page 2 --------------------------------------------------------------- If you experience any problems with Global Security, please write to: TAN$TAAFL Software Company Sto. Nino Palauig, Zambales 2211 Philippines (C) Copyright 1994, 1995 TAN$TAAFL Software Company All Rights Reserved Program and manual written by MacGregor K. Phillips Trademark Acknowledgements TAN$TAAFL is a trademark of TAN$TAAFL Software Company. Epson is a registered trademark of Epson America, Inc. IBM and PS/2 are registered trademarks of International Business Machines Corporation Intel is a registered trademark of Intel Corporation Windows is a trademark of Microsoft Corporation WordPerfect is a registered trademark of WordPerfect Corporation PGP and "Pretty Good Privacy" are trademarks of Philip R. Zimmermann. ABOUT THE AUTHOR MacGregor K. Phillips was born in South Bend, Ind. USA in 1944. Retiring after 22 years of service in the US military he now does what he loves best, writing computer software. He lives with his wife and daughter in the Philippines. For D.P. and S.S. - Prediction Number 18 has come true. TABLE OF CONTENTS Page 3 --------------------------------------------------------------- Features.....................................................4 Association of Shareware Professionals.......................5 ASP Ombudsman................................................5 Available by the same Author/Pass it Along...................6 Licensing....................................................6 Preface......................................................7 Welcome to Global Security...................................8 Four Ways to Use Global Security.............................9 Computer Requirements........................................9 Installing/Deinstalling Global Security.....................11 Executing Global Security...................................12 What You Need to Know to Use Global Security................14 Using Global Security.......................................24 Build A Prime Number File...............................25 Create A Default Parameter File.........................28 Scramble A Prime Number File............................29 Generate a Key File.....................................30 Pack/UnPack File(s).....................................32 Encipher/Decipher a File................................35 Transform File for E-Mail...............................39 Make a One Time Pad.....................................43 Wipe/Delete File(s).....................................45 Frequency Distribution Tests............................48 Tips on Using Global Security in the Real World.............52 Using a One Time Pad........................................55 Appendix A - Why Encipher Data..............................59 Appendix B - Why Global Security............................63 Appendix C - Startup/Termination Errors.....................68 Program Errors.................................69 Critical Errors................................74 Printer Errors.................................76 Appendix D - Program Limitations............................77 Appendix E - Terminology....................................78 Appendix F - PGP on PGP.....................................80 Index.......................................................81 FEATURES Page 4 --------------------------------------------------------------- The Global Security software contains many features. Here are just a few of them. Unbreakable, in theory and practice, encryption algorithms using the "One Time Pad System". (See Appendix B) Transform any file for transmission by E-Mail using the High RADIX 64 File Format. Create One Time Pads to use for secure hand written messages. File Selection Screen allows you to navigate through your drives, directories, and files with ease. Select multiple files for use with the pack/unpack and wipe/delete file routines. Sort files in ascending or descending order by name, date, extension, time, or size. Compress up to 2,048 files into one file for enciphering or storage on disk. Select up to 2,048 files to wipe or delete in one operation. Uses government procedures IAW DoD 5220.22-M to wipe files on your disk. Easy to understand Critical Error Reporting System, Printer Error Reporting System, and Extended Error Reporting System. Includes VGA brighten, dim, blank, and reset color routines, context sensitive Help, mouse support, and Hot Keys. Command Line Parameters to force a black and white screen, force a pause after each printed page, disable confirmation of all files before wiping or deleting, and disable the VGA color routines. Save screen images to GLOBAL.PRN file for printing at a later time. When you exit Global Security the buffers used to encipher and decipher data are wiped so sensitive data cannot be recovered from memory before another program is run. No limit on file sizes except the size of you disk drives. Test you own enciphered files to see how random they really are. ASSOCIATION OF SHAREWARE PROFESSIONALS Page 5 --------------------------------------------------------------- This software is produced by MacGregor K. Phillips who is a member of the Association of Shareware Professionals (ASP). ASP wants to make sure that the shareware principle works for you. If you are unable to resolve a shareware-related problem with an ASP member by contacting the member directly, ASP may be able to help. The ASP Ombudsman can help you resolve a dispute or problem with an ASP member, but does not provide technical support for members' products. Please contact the ASP Ombudsman in any of the ways shown below: ASP Ombudsman FAX: (616) 788-2765 (24 Hrs) 545 Grover Road CompuServe: 70007,3536 Muskegon, MI 49442-9427 INTERNET: 70007.3536@compuserve.com U.S.A. _______ ____|__ | (R) Global Security 16 --| | |------------------- is distributed as | ____|__ | Association of Shareware. This | | |_| Shareware allows you to try |__| o | Professionals it out for a -----| | |--------------------- reasonable period |___|___| MEMBER of time before you register it. Please refer to the TRIAL USE LICENSE section of the VENDINFO.DIZ File. If you continue to use Global Security regularly you are expected to register the program. You can use the instant order form in file ORDER.DOC. Just print it out on your printer, fill it out, and mail it. If you are not familiar with the Shareware concept please read the file SHR_WARE.DOC. The registration fee is $35.00, plus $10.00 shipping and handling. For complete details on registration see the ORDER.DOC file. Registration Incentives --------------------------------------------------------------- Receive the latest registered version of Global Security 16 and Global Security 32, which is optimized for 32 bit registers and is for 80386 and up computers. It runs one heck of lot faster than the 16 bit version of Global Security. New features in the registered versions currently include a Disk Security Section to wipe all unused areas on a disk, and an Options Menu which includes printer selection and startup commands, and options for the government wipe procedure. The registration reminder screen has also been removed. Plus receive two small utilities. One is NEWCLS.COM, a replacement for the DOS CLS command which allows you to set any valid combination of screen colors whenever you clear the screen. The second is GUARDIAN.SYS which guards your computer against any attack through DOS's backdoor. Once you have registered any version of Global Security you will be notified of any major upgrades by the TAN$TAAFL Software Company and the only cost to you for a new version will be the cost of a disk from the TAN$TAAFL Software Company and a small postage and handling fee. Page 6 --------------------------------------------------------------- Program support by mail will also be provided for 90 days after registration. I am currently living overseas in the Philippines and do not have access to a telephone, fax, or CompuServe. If it seems to take a long time for me to answer your letters please remember the slow pace of mail between foreign countries. If your registration form or letter gets returned because of a change of address please contact ASP for my current address. This will be greatly appreciated by all. All registrations will be acknowledged. Site Licenses are provided for companies, offices, workgroups, government agencies, etc. who need to register and use more than one copy of Global Security. See the "SITELICE.DOC" file for more information. AVAILABLE FROM TAN$TAAFL Software Company --------------------------------------------------------------- StopWatch. It has Up Timers, Down Timers, Lap Timers, Game Timers and Split Timers. Date, Calendar and Holiday information too. Three levels of precision. The highest depends on your computer. Time events with accuracy to millionths of a second on most computers above 16Mhz. 16 and 32 bit registered versions available. Includes Holiday Editor, Speed Calculations for Up and Lap Timers, and Printer Options menu. PASS IT ALONG --------------------------------------------------------------- BBS SYSOPs, Vendors, Computer Clubs, and Shareware Distributors please refer to the VENDINFO.DIZ File for information. Individuals who wish to distribute the "Global Security" package to friends or associates may do so in accordance with the restrictions outlined in the LICENSE section of the VENDINFO.DIZ File. All the files listed in the PACKING.LST section of the VENDINFO.DIZ File, plus the VENDINFO.DIZ file, must be included when distributing this program. If you archive the program for distribution through BBS's, please use the name GLBSEC34.EXE (or .ZIP, .LZH, .PAX, etc. as appropriate). LICENSING: Any company, corporation or government that wants to license the algorithms used by Global Security, to incorporate them into their own programs, please contact the TAN$TAAFL Software Company at the above address. The high speed of the algorithms make them ideal for use in online real time data transmissions that require the highest possible degree of security. DISTRIBUTORS WANTED --------------------------------------------------------------- Distributors wanted for the registered versions of all programs published by TAN$TAAFL Softeware Company. Must be able to accept credit cards. PREFACE Page 7 --------------------------------------------------------------- News Flash --------------------------------------------------------------- CLINTON'S WHITE HOUSE MAY BAN USE OF ALL ENCRYPTION DEVICES AND SOFTWARE THAT IS NOT CRACKABLE BY THE NATIONAL SECURITY AGENCY (NSA). REP. EDWARD J. MARKEY (D-MASS.) CHAIRMAN OF THE HOUSE TELECOMMUNICATIONS SUBCOMMITTEE, FEARS THE GOVERNMENT MAY EVENTUALLY BAN ENCRYPTION. "IN A DIGITALLY LINKED WORLD, WHERE ENCRYPTION IS THE KEY TO PRIVACY," HE SAID, "BANNING ENCRYPTION MAY BE LIKE BANNING PRIVACY." The above information is from the 30 May 1993 Business Section of the Washington Post in an article entitled "Chipping Away at Privacy? - Encryption Device Widens Debate Over Rights of U.S. to Eavesdrop". On 16 April 1993 the White House announced it was imposing a new scheme for encrypting voice and data communications. The system imploys a device called the "Clipper Chip" which leaves a deciphering key in the federal governments pocket. In other words, if you use this device the government can intercept your encrypted phone calls or computer data transmissions and decipher them at will. The government will stock up on phones and computers equipped with the "Clipper Chip" and if you do business with the government you will have to use the same devices. The government is also drafting laws to require telecommunications companies to grant law enforcement agencies special access to U.S. communications networks. The NSA is promoting a chip called "Capstone" using a formula called "Skipjack" to encrypt data. Of course the NSA and the government retain master keys to these so they can decode any data transmitted by them. Anyone crazy enough to bu anything endorsed by the NSA deserves to have their secret data read by anyone in government. What it all boils down to is do you have the right to keep a phone call or computer transmission private? The government says no; I say yes. Global Security is designed to keep computer transmissions private. It is uncrackable by the NSA or any other agency in the world. Read the following documentation and you will understand why. For the latest developments in this area please read the article in the Wednesday, March 2, 1994 business section of The Washington Post titled "Chipping Away at a Fundamental Freedom? - Computer Firms, Rights Groups Clash With White House Over Encryption vs. Law Enforcement". Page 8 --------------------------------------------------------------- Welcome to Global Security --------------------------------------------------------------- Until now unbreakable encryption methods have been possessed by only a few government agencies, such as the National Security Agency and the Soviet KGB. With Global Security you now have that ability. Privacy maintained by mathematical law is now a reality. For detailed explanations of why you need to encrypt data and why Global Security is unbreakable, in theory and practice, please read Appendixes A and B. The weak link in all computer transmissions is from the moment the data enters the telephone system until it leaves the telephone system at the other end. Global Security is designed to eliminate that weak link. If you are an individual, a small business man, a doctor, a lawyer, a scientist, an inventor, a large corporation, or anyone with vital data to transmit across town, across the nation, or around the world this program is for you. Once you have enciphered your data with Global Security it is safe even from the prying eyes and super computers of the dreaded National Security Agency (NSA) of the United States Government. Feel free to transmit your enciphered data anywhere at anytime and know that if intercepted it cannot be deciphered. Any size file, any type file, no matter what program it was created with can be enciphered. Once transmitted it can be deciphered with ease at the other end. All supporting files required take only minutes to create with the 32 bit version of Global Security or hours with the 16 bit version. The 32 and 16 bit versions are identical except that the 32 bit version executes many times faster. Now includes separate data compression/decompression routines to compress up to 2,048 files into one file before enciphering, preparation of text or binary files for transmission by any Electronic Mail (E-Mail) Service, and separate wipe/delete file routines to remove or wipe sensitive files. For secure hand written correspondence between two people use the One Time Pads that can be created. Ideal for short, secure messages. THE BILL OF RIGHTS TO THE U.S. CONSTITUTION - Amendment IV: "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." Global Security secures these rights for computer data. Four Ways to Use Global Security Page 9 --------------------------------------------------------------- 1) Encipher a file, transmit it or mail it on disk, and decipher it on the other end. When this enciphering method is used the resulting file can only be transmitted as a binary file. Companies like CompuServe and most BBS's allow you to upload and download binary files. If the company you work for allows binary file transmission between its different offices you can use this method to transfer enciphered files back and forth. 2) Pack, encipher, and then Transform a file for E-Mail transmission; then extract and reconstruct it at the other end. E-Mail is now available to almost everyone who has a computer. Individuals, companies, corpora- tions, government agencies, etc. all use E-Mail to send messages, data, and files across town or around the world. Works on the Internet too. 3) Encipher files for storage on your hard disk and WIPE the original file and all backup copies. This way no one will be able to access the sensitive data in the files except you. Not even your boss if you want to keep secrets from him. If, at a later date, you cannot for any reason decipher the files the data in them will be lost. 4) Use the One Time Pads for short messages with anyone that does not have a computer. The messages can be sent by mail, telegram, messenger, or delivered by phone conversation. Accuracy and attention to detail are the key to using the One Time Pads effectively. Any messages that are intercepted are safe from being deciphered by anyone that does not have a copy of the One Time Pad used to encipher it. Computer Requirements --------------------------------------------------------------- GS16.EXE - 16 Bit Version - 8086/88 and up computer. GS32.EXE - 32 Bit Version - 80386 and up computer. (Available as Registered Version Only) Both Versions --------------------------------------------------------------- DOS 3.0 and up. Video Adapter CGA, EGA, VGA, MDA, HGC (MCGA and PGA may work) Disk Drives One hard and floppy disk recommended. Will work with one floppy disk drive, but with severe limitations. Page 10 --------------------------------------------------------------- Printer Any printer that can accept CR, LF, and FF control characters. If your printer accepts the IBM line drawing characters they will print out correctly. Laser Printers All printouts from this program are designed for printers with fan fold paper and may not print correctly on laser printers. If you still wish to try it on a laser printer make sure it is setup for IBM or EPSON emulation mode. Mouse (optional) Any Microsoft or compatable mouse. INSTALLING GLOBAL SECURITY Page 11 --------------------------------------------------------------- The INSTALL.BAT program will not be present on the ASP CD-ROM Disk. Use the installation features on the CD-ROM disk to install the Global Security Files on your hard disk. It is assumed that you are familiar with the operation of your computer and content of your DOS manuals. If not, now is the time to become familiar with your computer and DOS manuals before you begin installing and using Global Security. The installation procedure for Global Security is very simple. You will need at least 420K of free disk space to store all of the programs and documentation files. Use the INSTALL.BAT file to install the files on any disk drive. The INSTALL.BAT command line format is: INSTALL [source:] [destination:]. At the DOS prompt type INSTALL A: C: followed by a carriage return if you are installing the files from the A: drive to the C: drive. A directory called "GLBOAL" will be created on the destination drive and then the files will be copied into it. DEINSTALLING GLOBAL SECURITY --------------------------------------------------------------- To deinstall Global Security from a hard disk just erase the files from the directory they are in. EXECUTING GLOBAL SECURITY Page 12 --------------------------------------------------------------- Global Security may be executed from either a floppy or hard disk drive. To minimize loading time it is recommended that Global Security be run from a hard disk drive. Global Security may be executed from a CD-ROM Disk but you cannot create the GLOBAL.PRN File that saves screen images on a CD-ROM Disk. If you desire to execute Global Security from any directory, the directory name that Global Security resides in must be placed in the "PATH=" environment variable. Check your DOS manual for more details. If the Directory is not in the "PATH=" environment variable you will first have to log on to the required directory with the following DOS Command: "CD GLOBAL" assuming that "GLOBAL" is the directory name you have the EXE file in. Command Line Parameters ----------------------------------------------------------- There are six command line parameters that can be entered when you execute Global Security. They may be entered in any order or combination, and in upper or lower case letters. 1). /B - Forces a black and white display when Global Security is executed. If you have a black and white or monochrome monitor attached to a color adapter and the screen colors do not appear right use this command line parameter. 2). /P - forces a pause after printing each page. Use this switch if your printer does not use fan fold paper or have a paper tray. Has no effect when using the Print Screen Key. 3). /T - Forces Global Security to use DOS Functions to get the date and time instead of the Real Time Clock. No effect on 8086/88 computers. 4). /V - Disables the VGA brighten, dim, blank, and reset color routines. The code that performs these functions may not be compatable with some multitasking software. 5). /C - As a default setting, confirmation is asked for each file that you wipe or delete. The /C command line parameter disables this. As a result confirmation will only be asked on files with one or more of the Read-Only, Hidden, or System attributes set. Page 13 -------------------------------------------------------------- 6). /I - As a default Global Security does a CRC_32 check on its EXE file everytime it is run. If everything checks out O.K. the program continues to run. If the CRC_32 value stored in the EXE file does not match the one just calculated Global Security will inform you that it may be infected by a virus and then perform a controlled exit. Since this feature may be incompatable with some virus checking programs that append check data to the end of an EXE file you can turn this self-checking off with the /I command line parameter. From the DOS Prompt type in GS16 followed by the desired command line parameters and press the Enter Key. Global Security will load and be ready to run. Examples ----------------------------------------------------------- GS16 - Loads program with default settings. GS16 /P - Forces a pause after printing each page. GS16 /B /V - Forces a black and white display and turns off the VGA routines. GS16 /c /t /p - Turns off confirmation for all files, forces DOS time and date functions, and pause after printing each page. WHAT YOU NEED TO KNOW TO USE GLOBAL SECURITY Page 14 --------------------------------------------------------------- Before doing anything with Global Security there are many things about the program you need to know. Windows 3.0 Compatability ----------------------------------------------------------- Global Security runs full screen, in a window or in the background. If you run Global Security under Windows it is recommended that you run it full screen or in the back- ground. When running in a window the mouse is not available for use and some of the colors are not displayed correctly. If you have a mouse the Mouse Pad will be displayed but you will not be able to use it. Execution time within windows is slowed down by a small percentage. Windows 3.x, Windows NT, OS/2 2.x, etc. ----------------------------------------------------------- Global Security has not been tested under these software environments. If there are any problems try using command line parameters /V and /T. If Global Security still does not work correctly please inform TAN$TAAFL Software Company so fixes can be made. Functions of the "F" Keys ----------------------------------------------------------- F1 Key - may be used at any time to pop up the current Quick Help Reference System screen. For VGA Only - (F2 - F5 Keys) F2 Key - brightens the color intensity level. F3_key - dims the color intensity level. F4 Key - resets color intensity levels to their original settings. F5 Key - blanks the screen. Sets all color intensity levels to 0. F6 Key - appends the current screen image to the end of a disk file called GLOBAL.PRN. If is does not exist it will be created. The only screen images you cannot save to disk are the Critical Error Reporting System Screen and any screen image while viewing an Enciphered File. This file is created in the Global Security directory and is compatable with any text editor that can read ASCII files. Page 15 --------------------------------------------------------------- F7 Key - is used to print the GLOBAL.PRN disk file. When all the screen images have been success- fully printed the file will be deleted. The F7 Key will only function from one of the main menus. While you are creating files or enciphering a file, etc, the F7 Key is disabled. F9 Key - cycles through five different mouse cursors. F10 Key - used to toggle between the computers default cursor and a full size block cursor. For those hard to see cursors on laptops or within Windows. Other Keys ----------------------------------------------------------- ESC Key - always backs you out of the program the way you came in, all the way to DOS. Can be used at any time except when a Critical Error Reporting System screen or Printer Error Reporting System screen is active. Print Screen Key - allows you to print the current screen at any time while the program is running. Two screens can be printed per page of paper. After two screens have been printed the paper will have advanced so the next two screens will appear on the next page. There is room at the top to use a two hole punch and save the screen shots in a folder. Ctrl C and Ctrl Break Keys - are trapped by the program and have no function. The Pause Key - will pause the program. To start it up again press any other key. The Mouse ----------------------------------------------------------- A menu item or command bar is selected by using the left mouse button. Selection is made on the release of the left button and not the press of the left button. Right Mouse Button - Toggles between hiding and showing the mouse pointer on screen. The Mouse Pad is a replica of a numeric keypad and is only displayed if your system has a mouse installed. Clicking on a number enters that number into the computer the same as using the keyboard. The Chime Page 16 ----------------------------------------------------------- A chime will sound at the top of the hour, when an invalid key is pressed during keyboard entry, and when other procedures are completed. When any file has been saved to disk or a procedure has been completed and no action is taken a chime will sound 5 times at 2 minute intervals to remind you that your computer is sitting idle. If no action is taken within this time the chime will stop. It will assume you are on an extended coffee break. HOT Keys ----------------------------------------------------------- Most menu items and Command Bars have a Hot Key that may be pressed to select the indicated menu item or Command Bar. For monochrome or black and white monitors the Hot Key is the first letter of the menu item or Command Bar. Command Bars that indicate a keyboard key such as Home, End, PgUp, etc. do not have a Hot Key. For computers with a Mouse clicking on any menu item or Command Bar mimics the behavior of the indicated Hot Key or keyboard key. Command Bars ----------------------------------------------------------- Command Bars such as Help, Quit, Escape to Quit, etc. are shadowed bars that appear throughout the program. They indicate the available commands for use. They may be selected by their Hot Keys or by clicking on them with the left mouse button. When the mouse pointer is on a Command Bar and you press the left mouse button the shadow will change from black to grey. When you release the left mouse button it will change back to black and the command will be carried out. If you move the mouse pointer off of the Command Bar before releasing the left mouse button the shadow will change back to black but the command will not be executed. Command Bars such as Up, Down, Left, Right, PgUp, PgDn, etc. indicate the keyboard keys that may be used. The mouse may also be used on these Command Bars. Clicking the left mouse button on one of these Command Bars performs the same function as using the keyboard key. Pressing and holding the left mouse button on one of these Command Bars is the same as pressing and holding the keyboard key down. Repeated commands are issued but not as fast as from the keyboard. Menus Page 17 ----------------------------------------------------------- Menus indicate the major functions the program performs. They may be selected by using the indicated Hot Key or by clicking on them with the left mouse button. When you click the left mouse button on a menu the menu item will be highlighted and when you release the left mouse button the menu item will be selected. If you move the mouse pointer off the menu item before you release the left mouse button the menu item will be unhighlighted and not selected. File Selection Screen ----------------------------------------------------------- The File Selection Screen is central to all parts of Global Security. Every time you need to create or select a file to use the File Selection Screen comes into play. The File Selection Screen is in three parts: The Drive Panel, the Directory Panel, and the File Panel. There is a row of Command Bars below the panels and an Instruction Line below the Command Bars. The following are examples of the different sections of the File Selection Screen taken from screen shots on my computer. (They look better in full color.) The Drive Panel ------------------------------------------------------- ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ º Global Security þ 32 V3.00 º TOP SECRET UMBRA/HANDLE VIA CO ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ º A: Ü B: Ü C: Ü D: Ü º ßßßß ßßßß ßßßß ßßßß ÇÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÄÄÄ The Directory Panel ------------------------------------------------------- ÇÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ º ³ ÃÄHOMEBASE º ³ ÃÄMAJESTIC º ³ ÃÄSRC16 º ³ ÀÄSRC32 º ÃÄVIRUS º ³ ÃÄFLU_SHOT º ³ ÀÄSCAN º ÃÄWEP º ÀÄWINDOWS º ÃÄICON º ÃÄMICROAPP º ÀÄSYSTEM The File Panel Page 18 ------------------------------------------------------- ÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ³ CLK32SRC ZIP 04-19-94 10:34:06 A ³ CRC32 ASM 04-21-94 16:06:56 A ³ DEFAULT ASM 08-17-94 10:26:54 A ³ ENC_DEC ASM 08-17-94 10:27:30 A ³ ERROR ASM 08-13-94 15:33:20 A ³ E_MAIL ASM 08-17-94 10:28:10 A ³ GS INC 08-07-94 10:42:10 A ³ GS32 MAK 08-17-94 10:22:52 A ³ GS32 STS 08-17-94 10:33:38 A ³ GS32SRC ZIP 08-17-94 10:33:58 A ³ H_D_T ASM 08-17-94 10:28:32 A ³ IO_PROC ASM 08-13-94 10:34:36 A Command Bars ------------------------------------------------------- ÇÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁ º Up Ü Down Ü PgUp Ü PgDn Ü Home º ßßßßßß ßßßßßß ßßßßßß ßßßßßß ßßßßß º Mark Ü UnMk Ü AltM Ü AltU Ü ÚÄÄÄÄÄ º ßßßßßß ßßßßßß ßßßßßß ßßßßßß ³ Sele ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÏÍÍÍÍÍ Instruction Panel ------------------------------------------------------- ÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄĶ Home Ü End Ü ÄÄÙ Ü Quit Ü Sort Ü º ßßßßßß ßßßßßß ßßßßßß ßßßßßß ßßßßßß º ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄĶ ³ Select file(s) to Pack. º ÍÏÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ Use the TAB Key to move from one panel to the next or click the left mouse button anywhere within a panel to select that panel. As a panel becomes selected, or active, the drive boxes or lettering in a directory or file panel changes from light white to bright white. The lettering in the drive boxes or the highlighted selection bar in the directory and file panels changes from blue to red. This way if there is only one directory and one file you can tell which panel is active by the color of the lettering in the highlighted selection bar. Page 19 --------------------------------------------------------------- The Drive Panel: The drive panel lists all disk drives available to the system. Make the drive panel active and highlight whichever drive you want by using the left and right arrow keys or clicking the left mouse button on the left and right arrow Command Bars below the panels. Then press the enter key or click the left mouse button on the " <ÄÄÙ " Command Bar to make that drive active. When the new drive becomes active the Directory and File Panels will be updated with information from the new drive. Substituted Drives: Substituted drives for directory names will produce an Extended Error Reporting System Screen which tells you to use drives that have not been substituted. If you try to execute Global Security from a substituted drive the program will display an Extended Error Reporting System Screen and then abort the program. This applies to Assigned Drives also. The Directory and File Panels: Select whichever one you want to be active and use the Up, Down, PgUp, PgDn, Home, or End keys to move through the different directories or files. Clicking the left mouse button on the appropriate Command Bar does the same. Pressing and holding down the keyboard key or left mouse button on a Command Bar will quickly move you in the desired direction within the active panel. You can also use the Ctrl Key plus the first letter of a directory or file name as a Hot Key to quickly move to a known directory or file. Once you have the correct drive, directory, and file highlighed use the enter key or click the left mouse button on the " <ÄÄÙ " Command Bar to send the drive, directory, and file name back to the calling program as a fully formated ASCIIZ file specification. New to Global Security V3.00 is the addition of the Mark, UnMk, AltM, and AltU Command Bars which allow you to mark, unmark, mark all, or unmark all files for selection. These Command Bars only appear when you use the Pack/UnPack Files or the Wipe/Delete Files routines. They allow the selection of multiple files for processing by these routines. If no files are marked the file under the highlighted selection bar is marked and returned for processing. Below the first line of Command Bars is a place for a full line or half a line of instructions telling you what type of file(s) to select depending on what function the program is performing. New also is the replacement of the Help Command Bar with the Sort Command Bar. (The Help Screen can still be accessed with the F1 Key.) The Sort Command Bar is only active when the File Panel is active. It allows you to sort files in ascending or descending order by file name, file extension, date, time, or size. Page 20 --------------------------------------------------------------- ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ File Sort Criteria ³ Use the indicated Hot ³ ³ Keys or the mouse to ³ Sort Files By: ³ select the way you want ³ [ ] Name ³ to sort the files. The ³ [û] Extension ³ File Sort Criteria Screen ³ [ ] Date ³ will stay displayed until ³ [ ] Time ³ you get them sorted the ³ [ ] File Size ³ way you want and then ³ ³ select the Quit Command ³ Sort Order: ³ to return you to the File ³ [û] (A..B..C...Z) ³ Selection Screen. Each ³ [ ] (Z..Y..X...A) ³ time you sort the files ³ ³ the results are displayed ³ Sort Ü Quit Ü ³ in the File Panel. ³ ßßßßßß ßßßßßß ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ The Critical Error Reporting System ----------------------------------------------------------- The Critical Error Reporting System reports on all critical errors generated by DOS. When a critical error is encountered a dialog box will appear with the critical error information displayed. Below is an example for trying to create a file on a write protected disk. Disk Drive: A: Disk Operation: Write Disk Area Affected: Directory Error Code: 00H Error Message: Disk Write Protected Below this information will be displayed four Command Bars: Retry, Cancel, Abort, Help. If you can correct the criticial error select Retry and DOS will try to perform the operation again. In the above example remove the write protection from the disk and select Retry to allow DOS to perform the disk operation again. If you cannot or do not want to correct the error select Cancel. DOS will cancel the operation and the program will return you to an appropriate menu in the program. If the error is severe enough select Abort and the program will try to perform a controlled exit and return the computer to a stable condition. 99.999% of the time the program will be able to do so. If for some reason the computer has locked up your only recourse is to reset or reboot the computer. Page 21 --------------------------------------------------------------- If you have a hard or floppy disk that is constantly giving you critical error messages other than Disk Write Protected or Drive Not Ready you can pretty much tell which area of the disk is going bad and take steps to preserve the data on the disk. The Print Screen Key functions within the Critical Error Reporting System, but the F6 and F7 Keys do not because disk access is not allowed during critical error processing. The Extended Error Reporting System ----------------------------------------------------------- The Extended Error Reporting System is used to report DOS errors and program errors. It incorporates all known DOS errors plus errors that pertain to the program. Since the inclusion of the File Selection Screen in the program it is hard to generate a DOS error because you cannot enter a bad path or file name. I have included program errors in this reporting system to present a common format for reporting errors. In the example below the error is generated because you have tried to finish a Prime Number File that is already complete. ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ³ Extended Error Reporting System ³ ³ DOS/BIOS Function: 3FH - Read File ³ File Name: TEST.PRM ³ Error Locus: Block Device ³ Error Class: Complete ³ Error Message: File is Already Complete ³ Recommended Action: Enter Correct Data ³ ³ ³ Ok Ü Help Ü ³ ßßßßßßßßßß ßßßßßßßßßß ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ There are two Command Bars displayed that you can use at this point. One is "Ok" and the other is "Help". Help calls up the Quick Help Reference Screen and Ok returns you to an appropriate menu in the program. All program generated errors are listed and explained in the Errors Appendix of the documentation. To get a listing of all DOS errors you will have to purchase a book on DOS. At the present time there are close to 100 different errors that can be reported by DOS. Most are self-explanatory. The Printer Error Reporting System Page 22 ----------------------------------------------------------- The Printer Error Reporting System will report on any errors encountered while printing. See the Errors Appendix for complete details on all printer errors. The following screen was generated because the printer was not turned on. ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Printer Error Reporting System ³ ³ ³ ³ Printer [LPT1] Status ³ ³ ³ ³ NOT SELECTED ³ ³ ³ ³ ³ ³ Retry Ü Cancel Ü Help Ü ³ ³ ßßßßßßßßßß ßßßßßßßßßß ßßßßßßßßßß ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ At this point you could turn the printer on and select Retry. Or you could select cancel and be returned to an appropriate menu in the program. Using a Printer ----------------------------------------------------------- All printing is designed for printers using fanfold paper. They may or may not print correctly on printers that print on only a single sheet at a time or have paper trays that feed single sheets of paper. Printer Setup: All printers should be setup for 80 columns by 66 rows. Use the font of your choice. All laser printers will have to be set for IBM or EPSON emulation mode prior to printing with the program. Commom Setup Problems: 1. Printer prints double spaces between lines: printer is setup for an automatic line feed after a cariage return. Consult your printer manual on how to turn this off. 2. Printer does not print the extended ASCII character set. Consult your printer manual on how to turn this feature on. Page Pause: If you use the command line switch /P to pause printing after each page a dialog box will pop up at the end of each page that says "Printing Paused". When you have the next page ready to go click the left mouse button on Continue or press the "C" Hot Key. The Mouse Pad Page 23 ----------------------------------------------------------- ÚÄ´ Mouse Pad ÃÄ¿ The Mouse Pad allows easy entry of ³ ³ numbers with the mouse for those lazy ³ 7 Ü 8 Ü 9 Ü ³ people who do not use a keyboard when ³ ßßß ßßß ßßß ³ they do not have to. Use the Mouse ³ 4 Ü 5 Ü 6 Ü ³ Pad the same as you would a keyboard ³ ßßß ßßß ßßß ³ numeric pad. When you press the left ³ 1 Ü 2 Ü 3 Ü ³ mouse button on a number the shadow ³ ßßß ßßß ßßß ³ changes from black to grey and when ³ 0 Ü Ä Ü ³ you release the left mouse button on a ³ ßßßßß ßßßßß ³ number the shadow changes back to ³ Esc Ü ÄÙ Ü ³ black and the number is entered the ³ ßßßßß ßßßßß ³ same as it would be from the keyboard. ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ The " Ä " pad is for backspacing, erasing the last digit entered. The " Esc " pad needs no explanation. The " ÄÙ " pad is the enter key. Differences Between 16 and 32 Bit Versions ----------------------------------------------------------- All program features are supported in both versions of Global Security. The only difference between the two programs besides the different Intel microprocessors they run on is speed of execution. The 32 bit version has been optimized to use 32 bit registers for all math computations. Because of this it runs considerably faster than the 16 bit version. To build a file of 3,067 prime numbers takes less than 20 minutes using GS32.EXE on a 80386DX 20 Mhz computer. Using GS16.EXE on the same computer it takes anywhere from 2 to 4 hours. This is a simple demonstration of the power of a 32 bit over a 16 bit computer. USING GLOBAL SECURITY Page 24 --------------------------------------------------------------- When you first start Global Security the main menu at the top of the screen looks like this. ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ º Global Security þ 32 V3.00 WEDNESDAY 17 AUG 1994 þ º TOP SECRET UMBRA/HANDLE VIA COMINT CHANNELS ONLY ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ º Functions About Help Quit ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍËÍËÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ Selecting About displays a window with information about the program and the Author. Selecting Help displays the current Quick Help Reference System screen. Selecting Quit exits to DOS. This is the only one that does. Selecting Functions displays the following screen. ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ These are the main Functions About functions of Global ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍË Security. Before ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ you can Encipher ³ Build a Prime Number File ³ or Decipher files, ³ Create a Default File ³ Transform E-Mail ³ Scramble a Prime Number File ³ Files, or Make One ³ Generate a Key File ³ Time Pads you first ³ Pack/UnPack File(s) ³ have to Build a Prime ³ Encipher/Decipher Files ³ Number File, Create ³ Transform File for E-Mail ³ a Default File, ³ Make a One Time Pad ³ Scramble a Prime ³ Wipe/Delete File(s) ³ Number File, and ³ Frequency Distribution Tests ³ Generate a Key File. ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´ These files are used ³ Quit ³ by the pseudo random ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ number generators in the enciphering and deciphering process. The Pack/UnPack File(s) and Wipe/Delete File(s) Functions are stand alone functions. File Group ----------------------------------------------------------- Now is a good time to introduce the concept of a File Group. You must create four different types of files before you can encipher or decipher files, and make One Time Pads. The files are a Prime Number File with an extension of 'PRM', a Default Parameter File with an extension of 'DFT', a Scrambled Prime Number File with an extension of 'SCM', and a Key File with an Extension Page 25 --------------------------------------------------------------- of 'KEY'. A File Group would consist of 4 files with the same name and the file extensions mentioned above (e.g. YELLOW.PRM, YELLOW.DFT, YELLOW.SCM, and YELLOW.KEY). When you encipher or decipher files, and make One Time Pads you will be asked to select a KEY File which will require a corresponding DFT File, and SCM File. You could use the names of the people you frequently exchange messages with. This way when you need to send an enciphered message to TOM select TOM.KEY from the File Selection Screen. Build A Prime Number File ----------------------------------------------------------- When you select Build a Prime Number File from the Functions Menu the screen will change and the following menu will be displayed: TOP SECRET UMBRA/HANDLE VIA COMINT CHANNELS ONLY ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ Prime Number Files Build Finish View Help Quit ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ Selecting Build ------------------------------------------------------- ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ When you select Build the File ³ Enter File Name: ³ Selection Screen will appear ³ ³ and you will be instructed to ³ ALPHA Ü ³ enter an eight character name ³ ßßßßßßßßßßßßßßßß ³ for a Prime Number File. The ³ ³ file extension of "PRM" will be ³ Escape to Quit Ü ³ added by the program. Once the ³ ßßßßßßßßßßßßßßßß ³ name is entered you will be ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ instructed to select a drive and directory to place the file in. Next you will be asked to enter a Search Factor and a Starting Number for the prime number search. ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Prime Number Search Paramenters ³ ³ ³ ³ Enter a Search Factor for the prime number ³ ³ search between 2 and 100,000. It must be an ³ ³ even number that ends with 0, 2, 4, 6, or 8. ³ ³ ³ ³ ³ ³ Enter Search Factor ÄÄ 42,968 Ü ³ ³ ßßßßßßßßßßßßßßßßß ³ ³ ³ ³ ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Page 26 --------------------------------------------------------------- ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Prime Number Search Paramenters ³ ³ ³ ³ Enter a Starting Number for the prime number ³ ³ search between 100,000,001 and 4,294,967,295. ³ ³ It must be an odd number that ends with 1, 3, ³ ³ 5, 7, or 9. ³ ³ ³ ³ Enter Starting Number ÄÄ 1,466,308,911 Ü ³ ³ ßßßßßßßßßßßßßßßßß ³ ³ ³ ³ ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Tests will be performed on these numbers to make sure they are within the proper ranges and odd or even as required. Another test is performed to make sure that the Search Factor and Starting Number are not evenly divisible by a common number. If they are you will be informed by the Extended Error Reporting System and you will be asked to enter another Starting Number. The Search Factor determines which numbers after the Starting Number will be tested for being prime. If the Search Factor is 15 every 15th number will be tested. If it is 102 every 102nd number would be tested. If the test number exceeds 4,294,967,295 the test number will wrap around to a number above 100,000,001. Once all tests are satisfactorily completed the program will commence finding 3,067 prime numbers. Running stats are displayed while the program is testing and finding prime numbers. The number found, the current test number, and the last five prime numbers found are displayed and updated as each test number is found to be prime or not. In the Timer Box an elapsed timer informs you of how much time it is taking. In the Status Box the percent completed is displayed as a numeric percent and as a bar graph. In the Command Box you have the option of selecting Yes or No to saving a partially completed Prime Number File. If you select No the file will not be saved and it will be deleted from the disk. If you select Yes all the prime numbers found and all the data needed to restart and finish the file will be saved to disk. Once the program has found all 3,067 prime numbers they will be saved to disk, a dialog box will pop up to inform you that the file has been saved and a chime will sound. Selecting Finish Page 27 ----------------------------------------------------------- When you select Finish the File Selection Screen will appear and you will be asked to select the "PRM" File you wish to finish. The file will be read and the search for prime numbers will commence where it left off when the partially completed file was saved to disk. If the file you select is already complete the Extended Error Reporting System will inform you and you will be asked to select another file or Quit. Selecting View ----------------------------------------------------------- When you select View the File Selection Screen will appear and you will be asked to select the "PRM" File you wish to view. When the file contents are displayed use the PgUp, PgDn, Home, or End Keys to page back and forth through the file or use the Mouse on the PgUp, PgDn, Home, and End Command Bars to page back and forth through the file. This applies to "SCM", "KEY", "ENC", and "EEM" files too. Selecting Help ----------------------------------------------------------- When you select Help the current Quick Help Reference System Screen will pop up. This applies to all menus with Help in them. Selecting Quit ----------------------------------------------------------- Select Quit to return to the Function Menu. This applies to all program segments in the Function Menu. Create A Default Parameter File Page 28 ----------------------------------------------------------- When you select Create a Default Parameter File the screen will change and the following menu will be displayed: TOP SECRET UMBRA/HANDLE VIA COMINT CHANNELS ONLY ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ Default Parameter Files Create View Help Quit ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ Selecting Create ----------------------------------------------------------- When you select Create the File Selection Screen will appear and you will be asked to select a "PRM" File to create a "DFT" File for. If you have to change drives and/or directories to find where the "PRM" Files are do so. When you make your selection the new "DFT" File will be given the same name as the "PRM" File with a file extension of "DFT". If the file already exists the Extended Error Reporting System will inform you and you will be returned to the File Selection Screen to make another selection or Quit. You will then be asked to enter 7 numbers between 1 and 2,048. Duplicate numbers are not allowed. These 7 numbers specify where the 7 password characters used to encipher and decipher a file are placed in the header added to any file that is enciphered. Use the keyboard or the Mouse Pad if you have a mouse to enter the numbers. Next you will be asked to enter a Random Factor Array Shift between 16 and 24 used by the pseudo random number generators. Once this is entered the numbers will be saved to the specified file on disk. Selecting View ----------------------------------------------------------- When you select view the File Selection Screen will appear and you will be asked to select the "DFT" File you want to view. If you have to change drives and/or directories to find the desired "DFT" File do so. Scramble A Prime Number File Page 29 ----------------------------------------------------------- When you select Scramble A Prime Number File the screen will change and the following menu will appear: TOP SECRET UMBRA/HANDLE VIA COMINT CHANNELS ONLY ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ Scramble Prime Number Files Scramble Rescramble View Help ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ Selecting Scramble ----------------------------------------------------------- Selecting Scramble is for scrambling an original "PRM" File. You can only do this one time. The File Selection Screen will appear and you will be asked to select the "PRM" File you wish to scramble. The associated "DFT" File must be present also. If you have to change drives and/or directories to find the desired "PRM" File do so. If the selected "PRM" File has already been scrambled the Extended Error Reporting System will inform you and return you to the File Selection Screen to select another "PRM" File or Quit. You will then be asked to enter 5 seed numbers to scramble the "PRM" File 5 times. The first time through the "PRM" File acts as the base file for scrambling. The 2nd time through the new scrambled file acts as the base file and this file is scrambled into a new file. Each time through the new scrambled file acts as the next base file. Once it is scrambled 5 times the file is saved to disk with the same name as the "PRM" File but a file extension of "SCM". The "PRM" File remains on disk unchanged. Selecting Rescramble ----------------------------------------------------------- Rescramble is for scrambling a "SCM" File. You can and should do this as many times as possible. The more times you scramble and rescramble a "SCM" File the harder it will be for anyone to duplicate your efforts. Select the "SCM" File to rescramble from the File Selection Screen. The associated "DFT" File must be present also. If you have to change drives and/or directories to find the desired "SCM" File do so. You will then be asked to enter 5 seed numbers. Once the "SCM" File has been scrambled 5 times the new "SCM" File will replace the old "SCM" File on disk. Selecting View ----------------------------------------------------------- When you select view the File Selection Screen will appear and you will be asked to select the "SCM" File you want to view. If you have to change drives and/or directories to find the desired "SCM" File do so. Generate A Key file Page 30 ----------------------------------------------------------- When you select Generate a Key File the screen will change and the following menu will be displayed: TOP SECRET UMBRA/HANDLE VIA COMINT CHANNELS ONLY ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ Key Files Generate Scramble View Help Quit ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ Selecting Generate ----------------------------------------------------------- Selecting Generate allows you to create a "KEY" File. The File Selection Screen will appear and you will be asked to select a "SCM" File to generate a "KEY" File for. The associated "DFT" File must be present also. If you have to change drives and/or directories to find the desired "SCM" File do so. If a "KEY" File already exists for the "SCM" File the Extended Error Reporting System will inform you and you will be returned to the File Selection Screen to select another or Quit. You will then be asked to enter a seed number in the range between 100,000,001 and 4,294,967,295. Once the "KEY" File is generated it is saved to disk with the same name as the "SCM" File but a file extension of "KEY". This is the largest file created by Global Security. It is 172,800 bytes long and holds 43,200 randomly generated numbers between 100,000,001 and 4,294,967,295. Selecting Scramble ----------------------------------------------------------- Selecting Scramble allows you to scramble a "KEY" File. Select the "KEY" File you wish to scramble from the File Selection Screen. The associated "SCM" and "DFT" Files must be present also. If you have to change drives and/or directories to find the desired "KEY" File do so. Then enter the seed number and the file will be scrambled. The new scrambled "KEY" File will replace the old "KEY" File on disk. This should be done as often as possible. Selecting View ----------------------------------------------------------- Select the KEY File you wish to view from the File Selection Screen. Page 31 --------------------------------------------------------------- Now you have a complete File Group. A PRM, SCM, DFT, and a KEY File. The person you will be exchanging enciphered messages with will need a copy of these files. The only other requirement is a Password List (optional). If you want to use a different password for each message, or each day, or each week, or each month is up to you. A list will have to be maintained, and it must be kept in a safe secure place along with the Group Files. If you do not use a password the program will select a default password. Anyone trying to put the message through the program with a different set of Group Files will always get invalid password when he tries to decipher it. SPECIAL NOTE ----------------------------------------------------------- "Any repetition of any kind in the keys of cryptograms under analysis imperils them and perhaps dooms them to solution. It does not matter whether the repetitions lie within a single message or among several, arise from the interaction of repeating primary keys or from the simple repeating of a single long key. Repetitions in the key cannot be permitted." "The Codebreakers" page 398 by David Kahn. A set of Group Files contains only 43,200 sets of keys. If one set of Group Files were to be used to encipher and transmit hundreds or thousands of files/messages there is a chance that one or more would be enciphered by the same set of keys. These messages enciphered with the same set of keys would then be open to analysis and possible deciphering. A set of Group Files should therefore be used to transmit only 10 to 25 files/messages and then they should be changed. Pack/UnPack File(s) Page 32 ----------------------------------------------------------- New to Global Security V3.00 is the separate Pack/UnPack File(s) Function. When selected the following menu will be displayed: TOP SECRET UMBRA/HANDLE VIA COMINT CHANNELS ONLY ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ Pack/UnPack Files Pack UnPack Help Quit ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ Selecting Pack ----------------------------------------------------------- ÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ When you select Pack ³ CRC32 ASM 04-21-94 16:06:56 A the File Selection ³DEFAULT ASM 08-17-94 10:26:54 A Screen will appear ³ENC_DEC ASM 08-17-94 10:27:30 A and you can select ³ERROR ASM 08-13-94 15:33:20 A the file(s) to Pack ³E_MAIL ASM 08-17-94 10:28:10 A into one file. You ³H_D_T ASM 08-17-94 10:28:32 A may use the Mark ³ IO_PROC ASM 08-13-94 10:34:36 A Hot Key, the + Key, or the mouse in the Mark Command Bar to select files to pack. The UnMark Hot Key, the - Key, or the mouse in the UnMark Command Bar may be use to unmark a selection. The Alt Key with the "M" Key will mark all the files, and the Alt Key with the "U" Key will unmark all the files. Prior to selecting the files to pack you can sort the files in any order to make selection easier. Once the files are selected you have to enter a file name for the packed files. A file extension of "PKD" will be added by Global Security. Then select the drive and directory for the packed file. While the files are being packed the following will be displayed: ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Pack File(s) ³ ³ ³ ³ Creating :  EXPD32.PKD  Ü ÚÄ´ Packing........ ÃÄ¿ ³ ³ ßßßßßßßßßßßßßßßßßß ³ 4 E_MAIL.ASM ³ ³ ³ File(s) to Pack: 5 Ü ³ 3 ERROR.ASM ³ ³ ³ ßßßßßßß ³ 2 ENC_DEC.ASM ³ ³ ³ Size of File(s): 283,815 Ü ³ 1 DEFAULT.ASM ³ ³ ³ ßßßßßßßßßßßßßßß ³ ³ ³ ³ ÚÄÄÄÄÄÄÄÄ´ STATUS ÃÄÄÄÄÄÄÄÄ¿ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ ³ ³ ³ 40% Complete ³ ³ ³ ³ 63% Compression ³ ³ ³ ³ 28,800 Codes Used ³ 00:00:14 Ü ³ ³ ³ 70,901 Bytes Saved ³ ßßßßßßßßßß ³ ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Quit Ü ³ ³ ßßßßßßßßßß ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Page 33 --------------------------------------------------------------- Once all the files are packed the following will be displayed: ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Procedure Complete ³ ³ Packed File Status ³ ³ ³ ³  EXPD32.PKD  Ü ³ ³ ßßßßßßßßßßßßßßßßßß ³ ³ % Compression Bytes Saved ³ ³ 64% Ü 179,794 Ü ³ ³ ßßßßßßßßßßßßßßß ßßßßßßßßßßßßßßß ³ ³ Original Size Packed Size ³ ³ 283,815 Ü 104,021 Ü ³ ³ ßßßßßßßßßßßßßßß ßßßßßßßßßßßßßßß ³ ³ Ok Ü ³ ³ ßßßßßßßßßß ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ LIMPEL-ZIV-WELCH Algorithm ----------------------------------------------------------- The data compression/decompression routines used by Global Security are highly modified Lempel-Ziv-Welch algorithms. They use a 9 to 14 bit code which is reset to the lowest code size as each 16,384 element code table is filled. I have achieved data compression rates as high as 68% on some text files. The data compression rates achieved on your files will depend on the type of files and their content. A CRC_32, 32 bit Cyclic Redundancy Check, value is computed for each file that is compressed or stored in the packed file. When the file is decompressed or extracted the value is computed again and compared against the one stored in the file header. If a file cannot be compressed to a smaller size it will be stored in the packed file in its original form. Selecting UnPack Page 34 ----------------------------------------------------------- When you select UnPack the File Selection Screen will be displayed and you can select the file to unpack. Then select the drive and directory to place the unpacked files into. While the files are being unpacked, or extracted, the following will be displayed: ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ UnPack A File ³ ³ ³ ³ UnPacking:  EXPD32.PKD  Ü ÚÄ´ UnPacking...... ÃÄ¿ ³ ³ ßßßßßßßßßßßßßßßßßß ³ 4 E_MAIL.001 ³ ³ ³ File(s) to UnPack: 5 Ü ³ 3 ERROR.001 û ³ ³ ³ ßßßßßßß ³ 2 ENC_DEC.001 û ³ ³ ³ Size of File(s): 283,815 Ü ³ 1 DEFAULT.001 û ³ ³ ³ ßßßßßßßßßßßßßßß ³ ³ ³ ³ ÚÄÄÄÄÄÄÄÄ´ STATUS ÃÄÄÄÄÄÄÄÄ¿ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ ³ ³ ³ 44% Complete. ³ ³ ³ ³ 32,600 Codes Used ³ ³ ³ ³ 45,765 In Count ³ 00:00:06 Ü ³ ³ ³ 120,757 Out Count ³ ßßßßßßßßßß ³ ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Quit Ü ³ ³ ßßßßßßßßßß ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ The "û" after each file name after it has been decompressed or extracted means that the files CRC_32 Data Integrity Check is O.K. ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Procedure Complete ³ ³ File(s) UnPacked ³ After all the files have ³ ³ been decompressed or ³ 5 Ü ³ extracted this will be ³ ßßßßßßßßßßßßßßßß ³ displayed. It informs ³ FILE CRC_32 DATA ³ you of the final status ³ INTEGRITY CHECKS ³ of the CRC_32 Data ³ [ 5] O.K. ³ Integrity Checks on the ³ [ ] Failed! ³ files. ³ ³ ³ Ok Ü ³ ³ ßßßßßßßßßß ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Encipher/Decipher a File Page 35 ----------------------------------------------------------- When you select Encipher/Decipher a File the following menu will be displayed: ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ Encipher/Decipher a File Encipher View Decipher Help Quit ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ Selecting Encipher ----------------------------------------------------------- When you select Encipher the File Selection Screen will appear and you will be asked to select the file you wish to encipher. If you have to change drives and/or directories to find the desired file do so. You will then be asked to select a destination drive and directory to place the enciphered file into. If the file is already enciphered the Extended Error Reporting System will inform you and return you to the File Selection Screen to select another file or Quit. Next you will be asked to select a KEY File to use to encipher the file. The associated SCM and DFT files must be present also. If you have to change drives and/or directories to find the desired KEY File do so. After you have selected the KEY File to use you will be asked to enter up to a 7 character password. ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Encipher/Decipher a File ³ ³ ³ ³ Enter a 7 character Password to use to ³ ³ Encipher your file. It can be any character ³ ³ you can enter from the keyboard including ³ ³ those entered with the CTRL or ALT Keys. ³ ³ ³ ³ Enter Password ÄÄ 1234567 Ü ³ ³ ßßßßßßßßßßß ³ ³ Escape to Quit Ü Insert Ü ³ ³ ßßßßßßßßßßßßßßßß ßßßßßßßßßß ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ SPECIAL NOTE ----------------------------------------------------------- "Any repetition of any kind in the keys of cryptograms under analysis imperils them and perhaps dooms them to solution. It does not matter whether the repetitions lie within a single message or among several, arise from the interaction of repeating primary keys or from the simple repeating of a single long key. Repetitions in the key cannot be permitted." "The Codebreakers" page 398 by David Kahn. A set of Group Files contains only 43,200 sets of keys. If one set of Group Files were to be used to encipher and transmit hundreds or thousands of files/messages there is a chance that one or more would be enciphered by the same set of keys. These messages enciphered with the same set of keys would then be open to analysis and possible deciphering. A set of Group Files should therefore be used to transmit only 10 to 25 files/messages and then they should be changed. Page 36 ------------------------------------------------------------------- Next you will be asked to enter any Special Instructions for whoever will decipher the file. These instructions will be displayed before the file is deciphered. The Special Instruction section may also be used to pass authentication phrases so the person receiving the file knows it is genuine and not sent under duress. The absence or presence of a word or phrase can indicate if the enciphered file is genuine or not. ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ³ Encipher a File ³ ³ Enter Special Instructions to follow when deciphering t ³ If there are None press the Enter Key to continue. ³ ³ Pass this deciphered file on to Jim in accounting. ³ ßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßß ³ Escape to Quit Ü Insert Ü ³ ßßßßßßßßßßßßßßßß ßßßßßßßßßß ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ While the file is being enciphered the follow will be displayed: ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Encipher/Decipher a File ³ ³ ³ ³ Enciphering File:  EXPD32.PKD  Ü ³ ³ ßßßßßßßßßßßßßßßßßß ³ ³ Enciphered File will be called:  EXPD32.ENC  Ü ³ ³ ßßßßßßßßßßßßßßßßßß ³ ³ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ ³ ³ File Group Used į¯ ALPHA ³ ³ ³ ³ Password Used ÄÄį¯ 1234567 ³ ³ ³ ³ Date Used ÄÄÄÄÄÄį¯ 08-17-94 ³ 00:00:02 Ü ³ ³ ³ Time Used ÄÄÄÄÄÄį¯ 11:08:16 ³ ßßßßßßßßßß ³ ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Quit Ü ³ ³ ßßßßßßßßßß ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ A CRC_32, 32 bit Cyclic Redundancy Check, value is computed for the enciphered file. When the file is deciphered the value is computed again and compared against the one stored in the file header. Selecting View ----------------------------------------------------------- If you wish to see what an enciphered file looks like select view. The File Selection Screen will appear and ask you to select the "ENC" File you wish to view. If you have to change drives and/or directories to find the desired file do so. The file will then appear and you can page through it the same way as viewing any of the other files. The largest "ENC" File you can view is 5,952,000 bytes long. You can encipher and decipher files of any length allowed by DOS so do not worry about this limitation. The Print Screen Key and the F6 Key are disabled while viewing an enciphered file. Selecting Decipher Page 37 ----------------------------------------------------------- When you select decipher the File Selection Screen will appear and you will be asked to select the File you wish to decipher. If you have to change drives and/or directories to find the desired file do so. You will then be asked to select the destination drive and path to place the deciphered file into. The file to decipher will then be opened, the name of the "KEY" File and the Date/Time Stamp of the original file will be read from the file header, and then the file will be closed. If any Special Instructions are stored in the file header they will be displayed at this time. You will be given the option of continuing or quiting the deciphering process. You will then be asked to select the "KEY" File whose name is shown that is required to decipher the file. If you have to change drives and/or directories to find the designated "KEY" File do so. The associated "SCM" and "DFT" Files must be present also. These files will be opened and read into memory. You will then be asked to enter the password required to decipher the file. It must be exactly the same as the one used to encipher the file or you will constantly get invalid password reported by the Extended Error Reporting System. If you make a mistake in entering the password you will have as many tries as you like to get it correct. Once the password checks out the file will be deciphered and saved to disk with the same name as the original file. The file will be the same size as the original with the same DOS Date/Time Stamp, attributes, and the same name. If a file with the same name already exists in the directory the file will be given an extension of "001", "002", etc., all the way up to "999" if required. As the file is being deciphered the following will be displayed: ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Encipher/Decipher a File ³ ³ ³ ³ Deciphering File:  EXPD32.ENC  Ü ³ ³ ßßßßßßßßßßßßßßßßßß ³ ³ Deciphered File will be called:  EXPD32.PKD  Ü ³ ³ ßßßßßßßßßßßßßßßßßß ³ ³ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ ³ ³ File Group Used į¯ DON_GREG ³ ³ ³ ³ Password Used ÄÄį¯ 1234567 ³ ³ ³ ³ Date Used ÄÄÄÄÄÄį¯ 08-17-94 ³ 00:00:03 Ü ³ ³ ³ Time Used ÄÄÄÄÄÄį¯ 11:08:16 ³ ßßßßßßßßßß ³ ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Quit Ü ³ ³ ßßßßßßßßßß ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Page 38 --------------------------------------------------------------- The following will be displayed once the file is deciphered: ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Procedure Complete ³ You will be informed ³ File on Disk ³ if the CRC_32 Data ³ ³ Integrity Check is Ok ³  EXPD32.PKD  Ü ³ or if it failed. You ³ ßßßßßßßßßßßßßßßßßß ³ will also be informed ³ CRC_32 INTEGRITY CHECK ³ if the file needs to ³ [û] O.K. [ ] FAILED! ³ be decompressed and ³ ³ by whom. This is not ³ Decompression Required By: ³ an all inclusive list. ³ [ ] N/A ³ If the file needs to ³ [û] Global Security ³ be decompressed with ³ [ ] PKUNZIP ³ a different program ³ [ ] LHA ³ this information can ³ ³ be passed in the ³ Ok Ü ³ Special Instructions. ³ ßßßßßßßßßß ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Transform File for E-Mail Page 39 ----------------------------------------------------------- When you select Transform File for E-Mail the screen will change and display the following menu: ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ Transform File for E-Mail Transform Extract Reconstruct Help Quit ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ What is Electronic Mail (E-Mail)? ----------------------------------------------------------- Most E-Mail Services like MCI only accept character codes 32 to 127, the carriage return, line feed, and tab codes. All other character codes, like the line drawing codes above 127, are ignored. For this reason a file to be transmitted by an E-Mail Service must be handled differently. Global Security will transform any text or binary file for transmission by any E-Mail Service. Once received it will extract and reconstruct it. The transformation process uses the High RADIX 64 file format. This format takes three bytes of data, 24 bits, and converts it into 4 bytes of data six bits at a time. Each 6 bits is converted to a +, a /, a number between 0 and 9, or a capital or small letter between A and Z. This range of characters should be acceptable by any E-Mail service in the world, including a MIME mail system because there will be no conflict over the use of the '=' character which is not used by the High RADIX 64 file format. A carriage return and line feed characters are inserted after every 64 bytes of data. This results in a file that is approximately 33 to 36 percent larger than the original. Because of this it is always best to compress the file before it is enciphered and then transformed for transmission by E-Mail. Most people download their E-Mail only once or twice a day and it gets placed into one file. Because it is possible to have more than one High RADIX 64 message in this file Global Security scans the file and will find and extract each message in the file and place it into a separate file in the selected directory. As you can see, with the addition of routines for E-Mail, Global Security is a much more powerful program than before. Most large businesses, corporations, governments, etc. use E-Mail every day to transmit messages across town or around the world. Now the messages can be transmitted without fear of anyone being able to decipher and read them. If the home office in Washington D.C. needs a legal brief from a branch office in Japan within the next few hours the only way to get it there that fast may be by E-Mail. If the brief will have a major impact on Wall Street if intercepted by the wrong people, it must be enciphered before it is transmitted. Global Security is the only program available that can do the job and not even the National Security Agency (NSA) of the United States Government will be able to decipher the message. Selecting Transform Page 40 ----------------------------------------------------------- When transform is selected you will be asked to select the file to transform from the File Selection Screen, and the destination drive and directory to place the transformed file into. Once the selection is made the following screen will pop up and you can select to break up the file into smaller files or retain its original size. ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ Many E-Mail ³ Transform File for E-Mail ³ services, like ³ ³ the Internet, ³ TREE.ASM = 132,957 Bytes Ü ³ only accept ³ ßßßßßßßßßßßßßßßßßßßßß ³ files that are ³ Break File into Files of: ³ under a certain ³ [û] Original Size ³ length. Global ³ [ ] 10 KB ³ Security lets ³ [ ] 20 KB ³ you break up a ³ [ ] 30 KB ³ large file into ³ [ ] 40 KB ³ many smaller ³ [ ] 50 KB ³ ones that are ³ [ ] 60 KB ³ acceptable to ³ ³ the E-Mail ³ ÄÄÙ Ü Quit Ü ³ service you are ³ ßßßßßß ßßßßßß ³ using. If you ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ select Original Size the file will not be broken up into smaller ones. If you select 20 KB the file will be broken up into files that are 20 KB (plus CR, LF's added) long. The size of the last file will vary. Each file will be given a file extension of 001, 002, etc., up to 999. All the information needed to reconstruct these files back into the original file is passed in the header for the Reconstruct routine. The file is then transformed into one or many files in the High RADIX 64 file format and placed in the selected directory. It is now ready for transmission by any E-Mail service in the world. Selecting Extract ----------------------------------------------------------- When you download your E-Mail for the day you may have one or more messages in the High RADIX 64 format in the E-Mail file. Extract will extract each message and place it in a file of its own. Any header or trailer added by the E-Mail service will be discarded. If the E-Mail file is all one message you still have to use the Extract routine to remove any headers and trailers added by the E-Mail service. The Reconstruct routine expects a file's High RADIX 64 format ID to be at the beginning of the file it will reconstruct. All information between the High RADIX 64 format ID and the High RADIX 64 end ID is placed in the file. Select the file to extract messages from from the File Selection Screen. Then select the drive and directory to place them into. Page 41 ----------------------------------------------------------- ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ A screen will pop up ³ Separate High RADIX 64 File(s) ³ displaying the status ³ ³ of the files as they ³ From:  BONUS.EEE  Ü ³ are being extracted. ³ ßßßßßßßßßßßßßßßßßß ³ A "û" is placed after ³ ÚÄ´ Extracted..... ÃÄ¿ ³ each file as its ³ ³ 3 TREE.003 û³ ³ extraction is complete. ³ ³ 2 TREE.002 û³ ³ If a file is encountered ³ ³ 1 TREE.001 û³ ³ that does not have ³ ³ ³ ³ an end ID you will ³ ³ ³ ³ get a message informing ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ ³ you that end of file ³ ³ was reached before ³ ³ end of extraction. ³ Ok Ü ³ The procedure will ³ ßßßßßßßßßß ³ then be cancelled. ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Selecting Reconstruct ----------------------------------------------------------- First select the drive and directory to place the reconstructed file into. Then select the file or files to reconstruct. If you have three or four files that need to be reconstructed into one file they all have to be selected. If you select too many or not enough you will be informed and asked to select the proper number of files again. The file extensions should be numbered 001, 002, etc. If you used the extraction routine after you received the file via E-Mail this will be the case since the extraction routine gets the correct file name and extension out of the header. ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ As each file is being ³ File Reconstruction Data ³ processed its data is being ³ ³ checked for integrity. A ³ FILE CRC_32 DATA ³ CRC 32 value is calculated ³ INTEGRITY CHECKS ³ for the file and checked ³ [ 4] O.K. ³ against the one stored in ³ [ ] Failed! ³ the header. When the file, ³ Decryption Required? ³ or files, are reconstructed ³ [û] Yes [ ] No ³ a dialog box will pop up ³ Decomp. Required by: ³ to give you the results of ³ [û] N/A ³ the file reconstruction. ³ [ ] Global Security ³ The number of files that ³ [ ] PKUNZIP ³ passed or failed their ³ [ ] LHA ³ integrity checks will be ³ ³ displayed. You will be ³ Ok Ü ³ informed if the file needs ³ ßßßßßßßßßß ³ to be deciphered or not. ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ If not, you will be informed if the file needs to be decompressed by Global Security or one of the popular data compression programs. Page 42 ----------------------------------------------------------- If a file is transmitted by E-Mail to different countries and through many different E-Mail systems or gateways there is a chance that because of different formats the data may get changed along the way. Using the High RADIX 64 file format helps to prevent these errors. Since the file consists only of the most common ASCII characters, carriage returns, and line feeds it should make it through most E-Mail Systems without being changed. The characters that are most likely to be changed are the carriage returns and line feeds at the end of each line. This is because some systems use only carriage returns to end a line and throw out the line feed or vise versa. Global Security takes this into account during the extraction and reconstruction routines. The extraction routine depends on the start and end ID strings. Any data between the two is considered part of the message. The reconstruction routine discards all carriage returns, lines feeds, and data that is not a valid High RADIX 64 character. It relies on information in the header for the number of bytes to process during reconstruction. The only time an error will occur is if one or more bytes of good data are removed, added or changed in the file between the start and end ID's. Make a One Time Pad Page 43 ----------------------------------------------------------- When you select Make a One time Pad the screen will change and the following menu will be displayed: ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ Make a One Time Pad Make Instructions Help Quit ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ What is a One Time Pad ----------------------------------------------------------- A One Time Pad allows you to encipher and decipher written correspondence between two people. It is a pad with randomly generated letters (and the '-' for word spacing) in the top row. On the next row down write out the message you wish to encipher or decipher. Then using the Vigenere Tableau and the provided instructions encipher or decipher the message and place the enciphered or deciphered text on the bottom line. If you were enciphering a message transfer the enciphered text to a Message Pad for mailing or delivering. This is ideal for short messages. Once you reach a large volume of messages a computer is more appropriate. Great fun for kids to use too. See examples starting on Page 55. Selecting Make ----------------------------------------------------------- When you select make the File Selection Screen will appear and you will be asked to select a "SCM" File to use to make a One Time Pad. The associated "DFT" File must be present also. You will then be asked to enter a seed number between 100,000,001 and 4,294,967,295 and a 7 character Pad ID. ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Make a One Time Pad ³ ³ ³ ³ Enter a 7 character Pad Identification String. ³ ³ It can be any ALPHA character that you can ³ ³ enter from the keyboard between character codes ³ ³ 32 (space) and 126. ³ ³ ³ ³ Enter Pad ID String ÄÄ 1-1A-1B Ü ³ ³ ßßßßßßßßß ³ ³ Escape to Quit Ü Insert Ü ³ ³ ßßßßßßßßßßßßßßßß ßßßßßßßßßß ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Page 44 --------------------------------------------------------------- The Pad ID lets you tell one pad from another. If you exchange encrypted messages with two or more people you can use names to distinguish which pad to use with each person. Once these are entered the One Time Pad and a Message Pad will be sent to the printer. Each One Time Pad is 7 pages long (14 half pages) as is each Message Pad. Two copies of each are printed. You have the option of quiting before the printing is finished. ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Printing Of ³ ³ ³ ³ ONE TIME PAD ³ ³ MESSAGE PAD ³ ³ ³ ³ In Progress ³ ³ ³ ³ Quit Ü ³ ³ ßßßßßßßßßßßß ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Selecting Instructions ----------------------------------------------------------- This prints out the Vigenere Tableau and the Instructions for using the One Time Pads. You can select anywhere from 1 to 99 copies. Once printed they can be laminated for easier use. Wipe/Delete Files Page 45 ----------------------------------------------------------- When you select Wipe/Delete Files the following menu will be displayed: ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ Wipe/Delete File(s) Wipe Delete Help Quit ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ Selecting Wipe ----------------------------------------------------------- When you select the wipe file function the File Selection Screen will appear and you can select the files you desire to wipe. ÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ³DEFAULT 001 08-17-94 10:26:54 A The files marked ³ENC_DEC 001 08-17-94 10:27:30 A to be wiped will ³ERROR 001 08-13-94 15:33:20 A have an arrow to ³EXPD32 001 08-17-94 11:08:16 A the left of the ³E_MAIL 001 08-17-94 10:28:10 A file name. Select ³H_D_T 001 08-17-94 10:28:32 A as many files as ³EXPD32 002 08-17-94 11:08:16 A you want. When you ³ CRC32 ASM 04-21-94 16:06:56 A return the following screen will appear and you will have the option to proceed or quit. ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Wipe/Delete File(s) ³ ³ ³ ³ File(s) to WIPE: 3 Ü ÚÄ´ WIPING......... ÃÄ¿ ³ ³ ßßßßßßß ³ ³ ³ ³ Size of File(s): 429,284 Ü ³ ³ ³ ³ ßßßßßßßßßßßßßßß ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ ³ ³ ³ A Govt. WIPE on selected ³ ³ ³ ³ files is being performed. ³ ³ ³ ³ After a file is WIPED its ³ Proceed Ü ³ ³ ³ data CANNOT be recovered. ³ ßßßßßßßßßß ³ ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Quit Ü ³ ³ ßßßßßßßßßß ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Page 46 --------------------------------------------------------------- ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ File Attributes Set ³ As a default setting ³ ³ confirmation is asked ³ File Name:  EXPD32.PKD  ܳ on every file before ³ ßßßßßßßßßßßßßßßßßß³ it is wiped. If you ³ [ ] Read Only ³ used the /C command ³ [ ] Hidden ³ line parameter when ³ [ ] System ³ you started Global ³ ³ Security confirmation ³ Wipe this File? ³ will only be asked on ³ ³ files with any of the ³ Yes Ü No Ü Quit Ü ³ Read-Only, Hidden, or ³ ßßßßßß ßßßßßß ßßßßßß ³ System attributes set. ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ As each file is wiped its name will appear in the Wiping Box and when the wiping process is complete a "û" will appear after its name. When all the files have been wiped the following will be displayed: ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Wipe/Delete File(s) ³ ³ ³ ³ File(s) to WIPE: 3 Ü ÚÄ´ WIPING......... ÃÄ¿ ³ ³ ßßßßßßß ³ 3 EXPD32.PKD û ³ ³ ³ Size of File(s): 429,284 Ü ³ 2 EXPD32.ENC û ³ ³ ³ ßßßßßßßßßßßßßßß ³ 1 EXPD32.EEM û ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ ³ ³ ³ A Govt. WIPE on selected ³ ³ ³ ³ files is being performed. ³ ³ ³ ³ After a file is WIPED its ³ 3 Files WIPED!! Ü ³ ³ ³ data CANNOT be recovered. ³ ßßßßßßßßßßßßßßßßßßßßßß ³ ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Ok Ü ³ ³ ßßßßßßßßßß ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Government Wipe Procedure ----------------------------------------------------------- All files are wiped IAW the Department of Defense procedure DoD 5220.22-M. This is their procedure for wiping highly classified files so they cannot be read or recovered by anyone. The procedure goes like this: First overwrite the file with all 1 bits, then all 0 bits. Repeat this three times. Then overwrite the file a final time with any character - I use character code 240 which is ð. Then read the file to verify that the last write was successful. When this is completed the file has been overwritten a total of 7 times and the last write is verified to make sure it was successful. Any data you had in this file can never be recovered! Selecting Delete Page 47 ----------------------------------------------------------- The procedures for deleting files is the same as for wiping them. The only difference is that a deleted file can be recovered in some circumstances. A deleted file may be recovered by many of the popular file undelete utilities if it has not been overwritten by any other file. This is why if you realize that you deleted a file that you wanted to keep, immediately exit Global Security and use your undelete utility to recover the file. Frequency Distribution Tests Page 48 --------------------------------------------------------------- How do I know that the encryption program I want to use is any good or not? With all of the computer encryption programs being sold today there is no way to tell if they deliver on what they claim. With Global Security you can test the encrypted files yourself to see how good the program really is. But first, what are the requirements for a good field encryption program. There are six of them: 1. - The system should be, if not theoretically unbreakable, unbreakable in practice. (Global Security uses the One Time Pad System that is unbreakable in both theory and practice.) 2. - Compromise of the system (the program) should not inconvenience anyone. (Since the program is freely sold to anyone this is not an issue. Only the key (Group Files) must be kept secret.) 3. - The key should be rememberable without notes and should be easily changeable. (The keys used by Global Security are in the Group Files which can be changed in under 30 minutes on a 80386 or above.) 4. - The cryptograms should be transmissible by telegraph. (In this day and age by computer using binary file or E-Mail transmission.) 5. - The apparatus or documents should be portable and operable by a single person. 6. - The system should be easy, neither requiring knowledge of a long list of rules nor involving mental strain. The above six requirements were published by Auguste Kerckhoffs in 1883 in "La Cryptographie militaire" and still hold true today. It has been said that any modern cryptographer would be very happy if any cipher fulfilled all six. You are looking at one happy cryptographer. Global Security fulfills all the requirements listed above. Now that I have made the claim how can you prove that I am right or wrong? There are statistical tests that can be done on a file to see if it is enciphered in a random manner or not. Two tests and a frequency distribution table built up for an enciphered file can be conducted by Global Security. These tests can be performed only on enciphered files from Global Security. In order to conduct tests on enciphered files from other programs you would have to know the file format used. There are a few terms that have to be defined first. The first is "Kappa sub r" (r for random) which for the 26 letter english alphabet is .0385. What this value says is that there is a 3.85 percent chance of drawing any two letters that are the same out of two urns which contain the 26 letter alphabet. The second value is "kappa sub p" (for plaintext) which is equal to .0667 for english. If you have two urns that each contain 100 letters in the proportion in which they are used in normal test there is a 6.67 percent chance of drawing any two letters that are the same. The Kappa sub r value of .0385 for the 26 letter alphabet is equal to 1/26. If you take the 30 letter Russian Cyrillic alphabet the Kappa sub r value is .0333 or 1/30. For the 256 characters used by a computer the Kappa sub r value is .00390625 or 1/256. This value plays a central role in the Phi Test and Chi Test used in Global Security. Page 49 --------------------------------------------------------------- When Frequency Distribution Tests is selected the following screen will appear: ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ Frequency Distribution Tests Phi Test Chi Test Help Quit ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ Selecting the Phi Test --------------------------------------------------------------- First select the file to do a Phi Test and Frequency Distribution Count on from the File Selection Screen. Once all the calculations have been made on the file the results will be displayed as shown below. The Phi Test can determine whether a given frequency count reflects a monalphabetic or a polyalphabetic encipherment. A frequency table for a monalphabetic enciphered file will reflect the same distrubtion table as text in normal use. A frequency table for a polyalphabetic enciphered file will just reflect random text. To use it you first multiply the total number of characters in a file by the total number minus one. If the total characters is 17,539 then multiply 17,539 by 17,538. Then multiply this product by the Kappa sub r value of .00390625. The result will be the polyalphabetic expected Phi. I do not have a Kappa sub p value for the 256 character set on a computer. I suspect that it would be fairly close to the Kappa sub p value for the 26 letter alphabet since most of the time you would be enciphering english text. For the purposes of this test this value is not needed. Next you take the frequency count of each character and multiply it by its frequency count minus one. If the frequency count for the character A is 461 then you multiply 461 by 460. When this is done for all 256 characters add all these 256 products together to get one final value. This is the ovserved Phi value. The following values are from a text file enciphered by the author. ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Frequency Distribution Tests ³ ³ ³ ³ File Name:  STWATCH.ENC  Ü Phi Data Size: 125,020 Ü ³ ³ ßßßßßßßßßßßßßßßßßß ßßßßßßßßßßßßßßß ³ ³ Dec Hex Char Count Percent Dec Hex Char Count Percent ³ ³ ³ ³ Expected Phi Value (Kappa Sub r): 61,054,200 Ü ³ ³ ßßßßßßßßßßßßßßßßßßßßßßßßßßßß ³ ³ Observed Phi Value: 61,042,706 Ü ³ ³ ßßßßßßßßßßßßßßßßßßßßßßßßßßßß ³ ³ Frequency Table Statistics ³ ³ ³ ³ Mean Value: 488 Ü Variance (sý): 443 Ü ³ ³ ßßßßßßßßßßßß ßßßßßßßßßßßßßßß ³ ³  Ü  Ü PgUp Ü PgDn Ü Home Ü End Ü Help Ü Quit Ü ³ ³ ßßßßßß ßßßßßß ßßßßßß ßßßßßß ßßßßßß ßßßßßß ßßßßßß ßßßßßß ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Page 50 --------------------------------------------------------------- As you can see the observed Phi value is very close to the expected Phi value Kappa Sub r. This means that the frequency count for all 256 characters is based on a polyalphabetic encipherment. In other words, the frequency distribution for all 256 characters is completely random in nature. If it had been a monalphabetic encipherment, the frequency distribution would have been more in line with an expected Phi value Kappa Sub p which would have been a value approximately 16 times larger than 61,054,200. The Mean Value for the frequency distribution and the Variance (sý) is also given. If you take the square root of the Variance you will have the standard deviation. If these two values are close it means that the frequency distribution for all 256 characters in even, or random, in nature. Use the indicated Command Bars or keyboard keys to page through the Frequency Distribution table. It looks like the following: ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Frequency Distribution Tests ³ ³ ³ ³ File Name:  STWATCH.ENC  Ü Phi Data Size: 125,020 Ü ³ ³ ßßßßßßßßßßßßßßßßßß ßßßßßßßßßßßßßßß ³ ³ Dec Hex Char Count Percent Dec Hex Char Count Percent ³ ³ 48 30 0 436 .3487 56 38 8 466 .3727 ³ ³ 49 31 1 477 .3815 57 39 9 497 .3975 ³ ³ 50 32 2 478 .3823 58 3A : 446 .3567 ³ ³ 51 33 3 512 .4095 59 3B ; 480 .3839 ³ ³ 52 34 4 466 .3727 60 3C < 473 .3783 ³ ³ 53 35 5 498 .3983 61 3D = 485 .3879 ³ ³ 54 36 6 502 .4015 62 3E > 467 .3735 ³ ³ 55 37 7 447 .3575 63 3F ? 512 .4095 ³ ³ ³ ³  Ü  Ü PgUp Ü PgDn Ü Home Ü End Ü Help Ü Quit Ü ³ ³ ßßßßßß ßßßßßß ßßßßßß ßßßßßß ßßßßßß ßßßßßß ßßßßßß ßßßßßß ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ The Chi Test --------------------------------------------------------------- The Chi Test is used to compare two Frequency Distribution Tables to see if they have been enciphered with the same key. First select the first enciphered file from the File Selection Screen and then the second one. The Chi Test works like this. Multiply the number of characters in the first file by the number in the second, and then by the Kappa Sub r value. This is the expected Chi Value. Then take the first value in the first distribution table and multiply it by the first value in the second distribution table. Do this for all 256 characters in the distribution table. Then add all 256 products into one large value. This is the observed Chi value. If the two are close to one another is means that they have been enciphered using the same key. Since a pseudo random key as long as the original message is used, this means that the keys for any two messages enciphered by Global Security are the same in nature, ie. two long strings of different pseudo random characters. In order to reproduce this long string of pseudo random characters and decipher the file you need an exact copy of the Group Files used to encipher the file. Page 51 --------------------------------------------------------------- The following screen will appear showing the expected Chi value Kappa Sub r and the observed Chi value when the calculations are done. As you can see the expected Chi value Kappa Sub r and the observed Chi value are very close. This means that two long strings of pseudo random characters, each as long as the file it enciphered, was used as the key. When this test is used on two files enciphered using the One Time Pad System it can only mean that the two keys used are the same type and are not actually the same key. ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Frequency Distribution Tests ³ ³ ³ ³ File Name:  STWATCH.ENC  Ü Chi Data Size: 125,020 Ü ³ ³ ßßßßßßßßßßßßßßßßßß ßßßßßßßßßßßßßßß ³ ³ File Name:  WIN386.ENC  Ü Chi Data Size: 518,776 Ü ³ ³ ßßßßßßßßßßßßßßßßßß ßßßßßßßßßßßßßßß ³ ³ ³ ³ ³ ³ Expected Chi Value (Kappa Sub r): 253,349,123 Ü ³ ³ ßßßßßßßßßßßßßßßßßßßßßßßßßßßß ³ ³ Observed Chi Value: 253,332,073 Ü ³ ³ ßßßßßßßßßßßßßßßßßßßßßßßßßßßß ³ ³ ³ ³ ³ ³ Ok Ü ³ ³ ßßßßßßßßßß ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ An in depth explanation of both of these tests is presented on pages 377 to 382 in "The Codebreakers" by David Kahn and published by The Macmillan Company. If you want to write a program to perform your own tests on files enciphered with Global Security here is the format of an enciphered file. BYTES MEANING --------------------------------------------------------------- 1 - 30 Global Security ENC File ID. Do not include this in computations. 31 - 2,078 Enciphered password. Include this in the computations. 2,079 - 2,205 127 byte header. Do not include this in computations 2,206 - ? Enciphered data. Include it in the computations. The formulas for the Mean Value and Variance are taken from page 597 of "The VNR Concise Encyclopedia of Mathematics". _ 1 n 1 n _ Mean Value (x) = Ä ä xi Variance (sý) = ÄÄÄ ä (xi - x)ý n i=1 n-1 i=1 TIPS ON USING GLOBAL SECURITY IN THE REAL WORLD Page 52 --------------------------------------------------------------- Setting up the Group File and Passwords ----------------------------------------------------------- If two people across town or in different countries want to exchange enciphered files, or enciphered E-Mail messages, with Global Security, they will need to have the same set of "DFT", "SCM", and "KEY" files (Group Files). These files have to be exactly the same or else you will never be able to decipher any files. If you are the one creating these files you will need to get them to the other person by the safest means possible. The safest way is for you to deliver them yourself. The next safest way would be a private or public courier service. The least safest way would be to use the mail service of any country. The mail service of any country is owned by the government. The have the ability to open any and all mail, regular or registered, at any time, and you will never know for sure if they have opened yours or not. Only you can decide what method is safe enough for you. Next you have to decide where to keep these files. If you work in an office where other people have access to the computer you work on do not keep them on your hard disk. If you do anyone will be able to copy them when you are not around. Keep them on a floppy disk that you carry back and forth from home to the office. This decision is also up to you. Just remember, if anyone is able to copy the files someone probably will. How often should you change these files? The best answer is as often as possible or practical. If you suspect that someone may have copied them you need to change them right away. Other that that you should have an irregular schedule for issuing a new set of Group Files. A list of passwords you will use must be set up also. This list must be kept as safe as the Group Files. You could have a password that changes with every message, or every day, or every week, or every month, etc. How you set up the passwords is up to you. SPECIAL NOTE ----------------------------------------------------------- "Any repetition of any kind in the keys of cryptograms under analysis imperils them and perhaps dooms them to solution. It does not matter whether the repetitions lie within a single message or among several, arise from the interaction of repeating primary keys or from the simple repeating of a single long key. Repetitions in the key cannot be permitted." "The Codebreakers" page 398 by David Kahn. A set of Group Files contains only 43,200 sets of keys. If one set of Group Files were to be used to encipher and transmit hundreds or thousands of files/messages there is a chance that one or more would be enciphered by the same set of keys. These messages enciphered with the same set of keys would then be open to analysis and possible deciphering. A set of Group Files should therefore be used to transmit only 10 to 25 files/messages and then they should be changed. Page 53 ----------------------------------------------------------- Global Security is uncrackable even by the National Security Agency (NSA), but only if your Group Files and Password List are kept safe. If they are stolen without your knowledge your enciphered files or E-Mail messages can be intercepted and deciphered. Global Security will do its job if you do yours. Who is looking at your Computer Data and E-Mail Messages? ----------------------------------------------------------- You must always think that someone has intercepted your enciphered files or E-Mail messages but as long as they do not have your Group Files and password list they will never be able to decipher them. The people most likely to intercept them are the NSA and the FBI. I quote from the 2 March 1994 article in the business section of The Washington Post mentioned earlier: "The FBI and NSA have long enjoyed broad legal and technological powers to snoop-to capture virtually any conversation or data transmission over phone lines, by cellular or cordless phone and with a variety of exotic methods." Because of the nature of E-Mail Systems your data can very easily be intercepted and read at numerous points along the way. An E-Mail message sent from the Middle East to the head office in Los Angles, Calif. may go through several interconnected E-Mail Systems before it gets to the person it was meant for. Many of these E-Mail Systems overseas are owned and operated by different governments. You can be sure that any interesting messages wind up on the desks of numerous government agencies or intelligence services. This is why you need Global Security. It can encipher an E-Mail message so that not even the National Security Agency (NSA) can decipher the it. After you have written a very sensitive report you delete all backup copies and WIPE the original file after it is enciphered. Two days later data from this sensitive report appears in all the major newspapers. Where did the data come from? It came from the backup copy you deleted but did not wipe. Someone came in at night and looked at all the deleted files on your hard disk to see if there was anything of value he/she could use. A file that has been deleted by DOS only has its directory and FAT entries deleted. The data from the file is still on disk and can be recovered. Transmitting Enciphered Files ----------------------------------------------------------- Once you have a file enciphered you have to transmit it to another computer to get it delivered to the right person. This could be to another PC in the next state, the mainframe computer in the home office, or an E-Mail Service such as MCI. Page 54 --------------------------------------------------------------- The communications programs used will depend on the circumstances. The choice will be up to you. All communications programs used must be able to transmit files without any errors and without adding any extra bytes into the file between the File ID String and the end of the file. Characters or lines added to the beginning or end of the file are OK. A file enciphered and transformed for E-Mail is a text file. It has only printable ASCII characters, the carriage return, and line feed characters in the file. When you transmit a file by E-Mail, the E-Mail Service adds a header to the file. This usually contains a From and To line and may contain other information depending on the E-Mail Service you are using. The E-Mail Service then places this into the "mailbox" of the person you have sent it to along with all of his/her other mail from other sources. As long as the E-Mail Service did not alter any bytes between the High RADIX 64 file format ID and the end ID you will have no trouble reconstructing it when you download your mail. SPECIAL NOTE: Since there is no Global Security program to decipher an enciphered file that has been transmitted to a mainframe computer you will have to download the file from the mainframe to a PC before it can be deciphered. SPECIAL NOTE: If the enciphered file has been transmitted to an Apple Macintosh computer you will also have to download the file to a PC before it can be deciphered. This has to do with the way the Macintosh computer stores data as well as the fact that there is no version of Global Security for the Macintosh. Long and Short Term Storage of Enciphered Files ----------------------------------------------------------- For short term storage of enciphered files where they may be used on a daily, weekly, or monthly basis storage on floppy or hards disks should not pose any problems. Just remember that floppy and hard disks do fail from time to time so keep BACKUP copies of all your enciphered and Group Files. For long term storage or archiving of enciphered files where they may not be used for 6 months to many years a nonvolatile storage media such as optical disks which have a shelf life of up to 30 years should be used. It would be best to put the enciphered files on one optical disk and the Group Files required to decipher them on a different one, and keep them in separate places. Keep the passwords in a safe secure place where they can be retrieved even after a number of years. USING A ONE TIME PAD Page 55 --------------------------------------------------------------- The following examples will show you how to use a One Time Pad to encipher and decipher messages. A copy of the same instructions and Vigenere Tableau printed by the program is shown below so you can use it while doing the examples. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z - ÚÄÄÄÄÄÂÄÄÄÄÄÂÄÄÄÄÄÂÄÄÄÄÄÂÄÄÄÄÄÂÄÄÄÄÄÂÄÄÄÄÄÂÄÄÄÄÄÂÄÄÄÄÄ¿ A ³A B C³D E F³G H I³J K L³M N O³P Q R³S T U³V W X³Y Z -³ B ³B C D³E F G³H I J³K L M³N O P³Q R S³T U V³W X Y³Z - A³ C ³C D E³F G H³I J K³L M N³O P Q³R S T³U V W³X Y Z³- A B³ ÃÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄ´ D ³D E F³G H I³J K L³M N O³P Q R³S T U³V W X³Y Z -³A B C³ E ³E F G³H I J³K L M³N O P³Q R S³T U V³W X Y³Z - A³B C D³ F ³F G H³I J K³L M N³O P Q³R S T³U V W³X Y Z³- A B³C D E³ ÃÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄ´ G ³G H I³J K L³M N O³P Q R³S T U³V W X³Y Z -³A B C³D E F³ H ³H I J³K L M³N O P³Q R S³T U V³W X Y³Z - A³B C D³E F G³ I ³I J K³L M N³O P Q³R S T³U V W³X Y Z³- A B³C D E³F G H³ ÃÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄ´ J ³J K L³M N O³P Q R³S T U³V W X³Y Z -³A B C³D E F³G H I³ K ³K L M³N O P³Q R S³T U V³W X Y³Z - A³B C D³E F G³H I J³ L ³L M N³O P Q³R S T³U V W³X Y Z³- A B³C D E³F G H³I J K³ ÃÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄ´ M ³M N O³P Q R³S T U³V W X³Y Z -³A B C³D E F³G H I³J K L³ N ³N O P³Q R S³T U V³W X Y³Z - A³B C D³E F G³H I J³K L M³ O ³O P Q³R S T³U V W³X Y Z³- A B³C D E³F G H³I J K³L M N³ ÃÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄ´ P ³P Q R³S T U³V W X³Y Z -³A B C³D E F³G H I³J K L³M N O³ Q ³Q R S³T U V³W X Y³Z - A³B C D³E F G³H I J³K L M³N O P³ R ³R S T³U V W³X Y Z³- A B³C D E³F G H³I J K³L M N³O P Q³ ÃÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄ´ S ³S T U³V W X³Y Z -³A B C³D E F³G H I³J K L³M N O³P Q R³ T ³T U V³W X Y³Z - A³B C D³E F G³H I J³K L M³N O P³Q R S³ U ³U V W³X Y Z³- A B³C D E³F G H³I J K³L M N³O P Q³R S T³ ÃÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄ´ V ³V W X³Y Z -³A B C³D E F³G H I³J K L³M N O³P Q R³S T U³ W ³W X Y³Z - A³B C D³E F G³H I J³K L M³N O P³Q R S³T U V³ X ³X Y Z³- A B³C D E³F G H³I J K³L M N³O P Q³R S T³U V W³ ÃÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄ´ Y ³Y Z -³A B C³D E F³G H I³J K L³M N O³P Q R³S T U³V W X³ Z ³Z - A³B C D³E F G³H I J³K L M³N O P³Q R S³T U V³W X Y³ - ³- A B³C D E³F G H³I J K³L M N³O P Q³R S T³U V W³X Y Z³ ÀÄÄÄÄÄÁÄÄÄÄÄÁÄÄÄÄÄÁÄÄÄÄÄÁÄÄÄÄÄÁÄÄÄÄÄÁÄÄÄÄÄÁÄÄÄÄÄÁÄÄÄÄÄÙ To Encipher: Write in the plaintext message in the correct place on the One Time Pad. Find the plaintext letter in the top alphabet and the key letter in the side alphabet. Then trace down from the top and in from the side. The ciphertext letter stands at the intersection of the column and the row (i.e. plaintext "M" and key letter "W" equals ciphertext letter "H"). Place the ciphertext letter in the correct place on the One Time Pad. Page 56 --------------------------------------------------------------- To Decipher: Write in the ciphertext message in the correct place on the One Time Pad. Find the key letter in the side alphabet. Follow that row in until you find the ciphertext letter. Follow that column up to the plaintext alphabet at the top. This is your plaintext letter (i.e. key letter "S" and cipher- text letter "Z" equals plaintext letter "H"). Place the plaintext letter in the correct place on the One Time Pad. Below is what a section of a One Time Pad will look like. Your pseudo random KEY letters are in the top line. KEY: V W G K P W Z G Z B V P V G G J N J J E A H B E H PLAIN: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ CIPHER: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ If you want to encipher the phrase " ALL LAWYERS ARE CROOKS" place this text in the plaintext line as shown below. KEY: V W G K P W Z G Z B V P V G G J N J J E A H B E H PLAIN: A L L - L A W Y E R S - A R E - C R O O K S _ _ _ CIPHER: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Use the "-" as a word spacer. It will make it easier on the person who is going to decipher the message to separate the words. Next follow the instructions and fill in the ciphertext line according to the instructions. To encipher the first plaintext letter find the letter "A" in the alphabet on the top of Vigenere Tableau and find the first key letter "V" in the alphabet on the left side of Vigenere Tableau. Trace down from the top and in from the side. At the intersection of the column and row you have the ciphertext letter. In this case it is "V". Place the ciphertext letter "V" below the plain text letter "A". KEY: V W G K P W Z G Z B V P V G G J N J J E A H B E H PLAIN: A L L - L A W Y E R S - A R E - C R O O K S _ _ _ CIPHER: V _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Page 57 --------------------------------------------------------------- Now do the same for the rest of the message. The enciphered message should now look like the example below. KEY: V W G K P W Z G Z B V P V G G J N J J E A H B E H PLAIN: A L L - L A W Y E R S - A R E - C R O O K S _ _ _ CIPHER: V G R J - W U D C S M O V X K I P - X S K Z _ _ _ Now it is best to transfer the ciphertext to the message pad, or any plain piece of paper, for sending the enciphered message. To decipher just copy the ciphertext message to the correct One Time Pad. It must be on the same page and starting at the same place as the original message in order to decipher it. Otherwise you will just get a garbled message that no one can understand. This is why you should use a Message Pad because it tells the person receiving the message what pad to use and what page and place on that page to start to decipher the message. When you receive an enciphered message transfer it to the correct place on the One Time Pad as shown below. Following the instructions find the Key letter in the side alphabet. Trace that in along the row until you find the ciphertext letter. Go up the column to the top alphabet to find the plaintext letter. In this case the Key letter "V" and the ciphertext letter "V" give you a plaintext letter of "A". KEY: V W G K P W Z G Z B V P V G G J N J J E A H B E H PLAIN: A _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ CIPHER: V G R J - W U D C S M O V X K I P - X S K Z _ _ _ When you decipher the rest of the message you will get the following: KEY: V W G K P W Z G Z B V P V G G J N J J E A H B E H PLAIN: A L L - L A W Y E R S - A R E - C R O O K S _ _ _ CIPHER: V G R J - W U D C S M O V X K I P - X S K Z _ _ _ Take the dashes out and it will be very easy to read "ALL LAWYERS ARE CROOKS". As you can see it is very easy to encipher and decipher messages using the One Time Pad. Just make sure you are accurate and you will have no problems. It does take a little bit of work and that is why the One Time Pad is best used for short messages and low volume situations. Page 58 --------------------------------------------------------------- Five letter groups are used by the One Time Pad to break up any indication of how long individual words are. The ciphertext should be sent as five letter groups also. Appendix A Page 59 --------------------------------------------------------------- WHY ENCIPHER DATA --------------------------------------------------------------- Before you can understand the need for such a program as Global Security you have to understand the power of the United States Government to intercept and listen to any phone conversation in the world that uses satelite or microwave transmission facilities. This power resides in the government agency know as the "National Security Agency" (NSA). On 24 October 1952 President Harry S. Truman signed a presidential memorandum that established the National Security Agency. This memorandum is still one of the most closely guarded secrets of the U.S. Government. Since that day the growth of the NSA has been exponential. With super computers, super secret satelites, and top secret installations around the world it has the ability to listen in on, and record, electronic transmissions of any type anywhere in the world. Most of the information I am about to give you comes from a book titled "The Puzzle Palace" by James Bamford, published by Penguin Books in 1983. It is worth reading. The Communications Satelite Corporation (COMSAT) has four main satelite earth stations located in the U.S. for transmitting phone conversations, computer data, and television signals anywhere in the world. Close by each satelite earth station the NSA has built a secret installation which could be used to intercept any incoming or outgoing transmissions, record it, and send it to its headquarters for processing by its super computers. There are many who believe that the NSA also taps into the domestic microwave system to intercept, record, and process domestic phone conversations and computer data. There is a facility located a few hundred yards behind the NSA main Operations Building at Fort Meade, Maryland which is a very broadband microwave RCV, receive only station, which is tied into the local telephone company circuits, which are inter- connected with the nationwide microwave telephone system. Is NSA actually listening in on domestic long distance phone lines? No one really knows for sure, but if they want to they certainly have the capability to do it in a big way. Are they listening in on international transmissions? Of course they are, that is one of their primary missions. Computer transmitted data is especially open to interception, recording, and processing. Just record it and run it through another computer. Instant data to look at. There is a way to make it harder on the NSA to look at your computer data. Encipher it before transmitting it, then decipher it at the other end. This has its pitfalls too. Most commercial code systems utilize methods that have been cracked or are suspect because the U.S. Government is suspected of having their hands in the cookie jar so to speak. Read John C. Dvorak's "Inside Tract" in the March 17, 1992 issue of PC Magazine. He says that the WordPerfect security system was effortless to crack. He also reports a "back door" was discovered in an encryption system (using the El Gamal encryption algorithm) about to be approved by the U.S. Governments National Institute of Standards and Appendix A Page 60 --------------------------------------------------------------- Technologies. He reports that "onlookers" accused the NSA of being behind the "back door" because they really do not want anyone to have a code that cannot be broken, by them. If you look at the history of DES (Data Encryption Standard) which is the U.S. Governments standard for data encryption you will see that the NSA was caught with its hands in the cookie jar here also. DES was first developed by IBM in the early 1970's under the code name Lucifer. When the National Bureau of Standards solicited for encryption algorithms for the U.S. Government IBM submitted Lucifer. But before it did so IBM dropped the key length from 128 bits long to 56 bits long. James Bamford in "The Puzzle Palace" reports that this was due to closed door meetings between IBM and the NSA where IBM agreed to cut the key length from 128 to 56 bits. It was eventually approved as the nations standard for data encryption and became known as DES. By cutting the key from 128 bits to 56 bits the NSA made sure that it would be able to crack the code with super computers. In fact, Dvorak reports, same column mentioned above, that it only takes hours of super computer brute force to crack a message encrypted by DES. Plus he reports it is believed that Adi Shamir of RSA Data Security has cracked the DES by using math alone. It sounds like the governments standard is only a standard way of making sure the NSA can read your transmitted computer data. For a full report on the controversy over DES I suggest you read the chapter "Competition" in "The Puzzle Palace". In the same column John C. Dvorak also praises the RSA Data Security company and their "practical public key/private key" method of encoding and decoding messages. This method uses the patented Rivest-Shamir-Adelman (RSA) encryption algorithm. It works like this: pick a number N that is the product of 2 prime numbers. Call them X and Y so that N = X times Y. You then pick a number less than N to be your public key - call this number P. Your private key K is then calculated by the formula P times K = 1(mod L) where L is the least common multiple of (X - 1) and (Y - 1). To encrypt a message the sender must know N and P. With a "little" bit of computer work X, Y, and K can be calculated. The formulas used to encipher and decipher data seem to me to use very large numbers if N is large which would make encyphering and deciphering data a lengthly process. To crack the RSA algorithm would just take a little bit of time. Calculating prime factors of large numbers would be a cinch on any computer. On the super computers that the NSA has it would be even faster. You could even do the hard work in advance. Just generate a list of large prime numbers and then it would be a matter of trial and error to find two prime numbers that when multiplied together produce N. From that point on finding K would be a piece of cake. The RSA algorithm seems to be open to analytical attack also. Looking at the formulas to encipher and decipher data that are in the June 1990 issue of Byte magazine in the article Appendix A Page 61 --------------------------------------------------------------- "Cloak and Data" by Rick Grehan it appears that if the first 'A' in the message is encrypted into a 'Z' by the formula all other A's in the message will also be encrypted into Z's. If this is the case, any RSA encrypted message is open to the most basic cryptanalytic procedure: frequency and contact of letters. How many of each letter are there in the message and what letters do they come in contact with. Take the letter combination TH. It appears often in the english language. If the letter combination SB appears often in an enciphered message using the RSA algorithm it is a better than even bet that they stand for the TH in the plaintext message. From there it is just a matter of time until you solve the message. The longer the message the easier it is to solve. From the looks of things I would not place too much faith in the RSA algorithm. The 28 April 1994 edition of The Wall Street Journal has a front page article entitled "Cipher Probe" about the encryption program PGP - Pretty Good Privacy. This program is based on the RSA algorithm and is therefore open to the same basic attack as described above. Any encryption program not based on the "One Time Pad" System in this day and age can, with a little effort, be broken by the National Security Agency. Dvorak reports and I quote: "It's logically believed that the National Security Agency doesn't like the idea of truly secure encryption, since it means the NSA won't be able to keep tabs on foreign spies easily." To this I would add the NSA does not want the American public to have a truly secure method of encryption because then the U.S. Government could not keeps tabs on its own people like it has in the past. One such operation was known as Operation Shamrock which started in 1945 and continued for 30 years until 1975. Senate Intelligence Committee chairman Frank Church labeled this "probably the largest governmental inteception program affecting Americans ever undertaken". Operation Shamrock consisted of the three major international telegraph companies of the time voluntarily handing over to the U.S. Government all international cable traffic between foreign governments. Later it turned into a giant operation where the U.S. Government listened in on the American people. When the NSA was formed in 1952 it inherited Operation Shamrock. When the country started to convert to computers and magnetic storage devices the cable companies just turned over their magnetic drums with all the cable traffic to the NSA for copying. As the capabilities of the NSA grew to listen in on the American public agencies of the U.S. Government like the FBI, CIA, DIA, and Secret Service sent the NSA "watch lists" of people they would like the NSA to listen to. It only stopped in 1975 because it was close to being splattered all over the American press. What the government has done in the past it will do in the future. Appendix A Page 62 --------------------------------------------------------------- Now that the cold war is over governments everywhere will shut down their super secret spy agencies and the world will at last know peace of mind. If you believe that I have some real estate on the moon I would like to sell you - real cheap. What will the NSA and the CIA do in the future now that a major reason for their being no longer exists? Everyone knows that a govern- ment agency that has been in existence for any length of time over a few days can never be shut down. It just grows and grows and grows. So, who will the NSA and CIA target next? There is only one place to go and that is the American people. It may not happen over night or even in the next few years, but it will happen. Now is the time to get prepared for them. Even the phone system is going digital at a slow rate. Because of this a computer will be able to recognize words and intercept and record all phone conversations that contain a certain word. The NSA will have a lock on the American people. The following quote was made by Senator Frank Church of the Senate Intelligence Committee in 1975 in regard to the NSA's ability to intercept electronic transmissions: "At the same time, that capability at any time could be turned around on the American people and no American would have any privacy left, such [is] the capability to monitor everything: telephone conversations, telegrams, it doesn't matter. There would be no place to hide. If this government ever became a tyranny, if a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately done, it within the reach of the government to know. Such is the capability of this technology... I don't want to see this country ever go across the bridge. I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over the bridge. That is the abyss from which there is no return." If the NSA could do this in 1975 what can they do today? It has been 20 years and a revolution in the computer industry since then. It is something to think about in the dark of night when the moon is full and all the little government spies (worms) are busy watching you. Appendix B Page 63 --------------------------------------------------------------- WHY GLOBAL SECURITY --------------------------------------------------------------- Now that I have torn down every encryption method available that is supposed to be any good and shown you the capability of the NSA to intercept not only your phone conversations but all your computer transmissions too, where do we go from here? There is one method of encryption that can be used that is unbreakable in practice and in theory. It was first developed in America in 1918, completely rejected by the U.S. Government, and first used by the German diplomatic establishment sometime between 1921 and 1923. It is called the "One Time Pad System". It is a remarkable system in its simplicity. For further information see pages 398 to 400 of "The CODEBREAKERS" by David Kahn, published by The Macmillan Company in 1967. It consists of a random key used once, and only once. It provides a new and unpredictable key character for each plaintext character in the message. This means that every letter or character is enciphered with its own random key. The letter 'A' may be enciphered into a 'Z' the first time it is encountered in the message and into an 'N' the next time, a 'B' the next, and so on and so on. This means for a message that is encyphered as "Z T Q W" the first 'Z' could be deciphered into any of the 26 letters of the alphabet. This holds true for all the other letters also. This could be deciphered into the word "L O O K" where both the 'T' and the 'Q' stand for the letter 'O'. "The perfect randomness of the one-time system nullifies any horizontal, or lengthwise, cohesion, as in coherent running key or autokey, and its one-time nature bars any vertical assembly in Kasiski or Kerckhoffs columns, as in keys repeated in a single message or among several messages. The cryptanalyst is blocked." If you were to use the brute forc method and try to decipher this message with every possible key combination all you would have done is compile a list of every possible four letter word in the world. There are stop, hard, slow, kiss, etc., etc., etc. The longer the message the more possibilities there are. What is boils down to is that you have an equation in two unknowns with only 1 equation and that is impossible to solve. X + Y = 9. You know that 9 is the ciphertext. Without another equation there is no way to solve X (the plaintext) or Y (the key). X and Y could be any values you choose that equal 9. All this does is compile a long list of possible solutions with one just as good as the other. Since there are an infinite number of numbers there are an infinite number of solutions to the above equation. One could be just as valid as the other. There is no way to know which one is right. In this age of computers why is this "One Time Pad System" not in widespread use? Could it be the fact that computers cannot generate random numbers. All they can generate is pseudo-random numbers. This means that the string of random numbers produced by any computer can be reproduced by that or another computer using the same formula. But this is exactly what is required by any computer program to encipher data. You need to be able to reproduce that same set of random numbers to decipher the data. Appendix B Page 64 --------------------------------------------------------------- This is easy enough. There are many formulas to generate pseudo- random numbers on computers. But even this is not enough. Most of these formulas only require a small seed number to get the formula going. This is the key to why these formulas and other encryption formulas are no good. Remember this: NO MATTER HOW INTRICATE OR COMPLEX ANY DATA ENCRYPTION FORMULA IS, IF THE SEED NUMBER TO START THE FORMULA IS SMALL, THAT ENCRYPTION FORMULA CAN BE VERY EASILY CRACKED BY THE BRUTE FORCE METHOD. Just plug in all possible seed numbers into the formula using a super computer and within a matter of hours any message can be decoded. This is the bane of most encryption formulas. They try to keep the seed number small by using very complex and lengthy formulas because human beings, you and me, do not like to enter 100 and 200 digit seed numbers into a computer every time we have to encipher or decipher a message. The small seed number is their Achilles Heel. In this day of the super computer I would call any seed number under 40 digits small. This equates to about a 128 bit number on a computer. So what would it take to make an ideal computer program for enciphering and deciphering data. 1 - The formulas used to encipher and decipher data have to be as simple as possible for fast, economical, error free performance. 2 - The formula must have a very long key (seed number), but one that does not have to be entered by a human into the computer. A number that is 7,776 bits (972 bytes) long is used by Global Security. 3 - The program must use the "One Time Pad System" by generating a unique key letter for each plaintext letter in the file or message enciphered. 4 - The files created to enter this long seed number into the formula must be easy to make, and more important, easy to produce new files as often as required. 5 - The system must be reliable. It must decipher all files or messages without error. 6 - The system must be "software only". No extra hardware required. 7 - The cryptosystem must be easy to use. The more complicated a cryptosystem is the less it will be used. All this and more describes Global Security, the best little enciphering/deciphering program in the world. The 7 items listed above all apply to Global Security. What follows is a detailed Appendix B Page 65 --------------------------------------------------------------- explanation of why Global Security is the most secure, bar none, of any encryption/decryption method or program available in the world today. This has to be done so you will know that what I say is true. You will not have to take my word for it. You can then make up your own mind about how good Global Security really is. Run the Phi and Chi Tests to confirm this in the new Frequency Distribution Tests included in Global Security. There are four files that have to be created by the program before you can encipher and decipher files, or make actual "One Time Pads". The first is called a Prime Number File. This file holds 3,067 prime numbers in the range 100,000,001 to 4,294,967,295. You enter a search factor between 2 and 100,000 (an even number must be used) and a starting number equal to or greater than 100,000,001. The search factor is there so you will not find consecutive prime numbers. If you enter a search factor of 32,984 and a starting number of 1,496,392,593 the second number to be checked for being prime would be 1,496,425,577 and so on and so on until 3,067 prime numbers are found. The numbers wrap around if they exceed 4,294,967,295. There are approximately 83,899,345,900,000 different prime number files that can be created. On my 20 Mhz 386DX computer this takes only about 20 minutes or less with the 32 bit version of Global Security. The next step is to create a Default Parameter File. When you encipher a file 2,205/2,326 bytes are added to the length of the file or E-Mail Message. A group of 2,048 bytes hold a 7 character password (enciphered) needed to decipher the rest of the file. Where the 7 character password is placed within these 2,048 bytes is determined by the Default Parameter File. This file also holds one parameter used by the enciphering, decipher- ing, and scrambling formulas. This file takes only a few minutes to create. There are 1.19657994458 times 10 to the 24th power different ways to create a Default Parameter File. The third step is to scramble the Prime Number File and create a Scrambled Prime Number File. How many different ways are there to scramble 3,067 prime numbers? Using Stirling's Approximation formula for calculating large factorials you get: 3,067! = 8.17375658029 times 10 to the 9,363rd power This is a number 9,364 digits long. It is best to scramble and rescramble this file as often as possible. The more you do this the harder it will be to duplicate the file. The fourth and last file to create is a Key File. This holds the initial key used to select 243 prime number from the Scrambled Prime Number File to plug into the encryption/ decryption formula. How can you automatically select an initial key from a file? DOS provides the answer to that for us. Every file you are going to encrypt has a date/time stamp assigned by DOS when the file was created. Since DOS assigns date/time stamps in 2 second intervals there can be 43,200 different date/ time stamps in one 24 hour period. Therefore the Key File holds 43,200 different numbers in the range 100,000,001 to Appendix B Page 66 --------------------------------------------------------------- 4,294,967,295. These numbers are randomly selected. Once created this file can also be scrambled as many times as you like. Due to the way the file is scrambled in sections there are only apprximately 3.48143426965 times 10 to the 30,261 different ways to scramble a Key File. The program checks the date/time stamp of the file and uses it to index into the Key File to select an initial seed to use in the formulas. This initial seed is then used to randomly select 243 prime numbers from a Scrambled Prime Number File. These 243 prime numbers are placed into 3 arrays which comprise 81 different pseudo random number generators. One pseudo random number generator is used to randomly select from the other 80 pseudo random number generators for each character in a file to encipher or decipher. These 81 pseudo random number generators require 3 prime numbers each for a total of 243 prime numbers. Each prime number is 4 bytes or 32 bits long. This equals 7,776 bits. This is the initial starting seed for all the random number generators. For anyone to duplicate a seed number 7,776 bits (972 bytes) long without the original files used to create it would require a miracle in the absolute true sense of the word. What is all boils down to is that a brute force attack on any message enciphered with Global Security would require more time and more computer power than is possible within the next few million years or so. To decipher a message you need the exact same set of files used to encipher it. The only way to get these files would be to steal them. So what? If someone stole the files all you have to do is change them - it only takes 20 minutes or so. In fact, to really be secure, you could make it a practice to change the files every week. This way if someone did steal the files they could only decipher the messages for that week and no more. There is also the question of the password. This could be set up to change on every message. Now someone would have to steal the files and the correct password for each message to decipher them. The best place to keep these files is on a floppy disk locked up in a very good safe. They should only be taken out by an authorized person. If you left the files on a hard disk on a single computer or a network it would be very easy for someone to copy them. The best program in the world will not protect you from "inane" actions like this. For each person or organization you exchange enciphered data with it is a good idea to maintain a different set of Scrambled, Default, and Key files. A separate list of passwords should be kept also. I envision a setup much like the following one. You are an auditing department of a large accounting firm with teams of auditors that travel fequently around the country making audits on large corporations and companies. These auditing teams send back to the home office very sensitive data and reports that could have major implications on Wall Street if the information leaked out. Just before a team heads out to audit a company they Appendix B Page 67 --------------------------------------------------------------- are given a new set of Group Files to use with Global Security and a list of passwords to use for each day. At the home office the only person that has the other set of files and passwords is their boss. He is the only one that can decipher the incoming data and reports. The next time a team went out a new set of Group Files would be created again. This is as secure as you can get. The key to having a secure system is to use a set of Group Files only a few times and then create new ones. This ensures that every message that is enciphered will have a unique set of keys which means a unique string of pseudo random characters that is just as long as the file. If this is always adhered to any message that is intercepted will not be able to be broken or analysed in any way. The government, or anyone with a lot of money, could set up a special van that when parked outside of your home or office could record the keystrokes from your computer and the data going to your screen from the electrical signals they emit. It would then be possible to create duplicates of the Group Files from this data. If you think someone is doing this to you, you can guard against this interception by using "Tempest" shielding on your computer which does not permit these electrical signals to be emitted. Check with your local hardware vendor to see if this "Tempest" shielding can be installed on your computer. Clear and Present Danger --------------------------------------------------------------- Just recently I had the pleasure of reading "Clear and Present Danger" by Tom Clancy. The only reason I mention this here is that on page 240 of the paperback novel he presents a very excellent explanation of the One time Pad System. This is the system used by most major governments in the world and now you, an individual, have at your command Global Security which is based on the same secure One Time Pad System. Appendix C Page 68 --------------------------------------------------------------- STARTUP/TERMINATION ERRORS --------------------------------------------------------------- There are 4 errors that can be displayed upon startup and 1 upon termination of GS16.EXE. They will be displayed and you will be returned to the DOS prompt. 1. Global Security þ 16 requires DOS Version 3.x or above. 2. Global Security þ 16 needs to be in 25 rows by 80 columns Mode. If your display is set to display anthing other than the above please set it back using the DOS Mode Command (MODE CO80 for color or MODE BW80 for black and white). 3. Gobal Security þ 16 cannot find itself at the end of the Environment. In DOS 3.0 and above a fully qualified drive, path, and program name is place at the end of the environment assigned to the program. Global Security uses this information to find itself and place the GLOBAL.PRN file in the same directory. If you get this error message it means that you are using a DOS version of 1.x or 2.x. Or your version of DOS does not place this information at the end of the program environment. 4. Insufficient extra memory to run Global Security þ 16. Global Security uses dynamic memory allocation for its text window buffers. If there is not 20K of extra memory available when the program is started this message will be displayed. Remove some TSR's and run Global Security again. 5. (Termination Error) Global Security þ 16 terminated due to memory allocation/release error. An error was encountered while allocating or releasing memory for use by a text window. This error should never be encountered unless another program has grabbed all available memory for its own use. Appendix C Page 69 --------------------------------------------------------------- PROGRAM ERRORS --------------------------------------------------------------- The following errors are displayed by the Extended Error Reporting System as required by the program. 1. Drive Index Too Large for Drive Table When the program first determines which drives are installed in your system (substituted drives included) it builds a drive table and an index for the current drive. It checks for a maximum of 26 drives but only the first 12 are usable by the program. If the drive you loaded the program from has an index greater than 12 the program will display this error and then exit the program. 2. Wrong KEY File Selected When deciphering a file you will be asked to select the designated KEY File to decipher the program. If you select the wrong one you will be told and then returned to the File Selection Screen to select the correct KEY File. 3. More than 1,000 Directories on Disk If you load Global Security from a disk with more than 1,000 directories the Extended Error Reporting System will display this error and then exit the program. If you select a disk drive within the program to use that has more than 1,000 directories you will be returned to the File Selection Screem to select another disk drive. 4. Number Already Used While creating a Default Paramter File you cannot place 2 or more password characters in the same position. If you try to use a number twice the Extended Error Reporting System will tell you and you will be returned to the number entry screen to enter another number. 5. Enciphered File too Large to View If the enciphered file you selected to view is larger than 5,952,000 bytes the Extended Error Reporting System will tell you and return you to the File Selection Screen to select another enciphered file to view. 6. Number Entered too Small Number entered is out of range on the small side. You will be returned to the number entry screen to enter a number in the correct range. Appendix C Page 70 --------------------------------------------------------------- 7. Number Entered too Large Number is out of range on the large side. You will be returned to the number entry screen to enter a number in the correct range. 8. Number Entered not Even While entering a number for the Search Factor an odd number was given. You will be returned to the number entry screen to enter an even number. 9. Number Entered not Odd While entering a Starting Number for the Prime Number search an even number was entered. You will be returned to the number entry screen to enter an odd number. 10. S.F./S.N. Evenly Divisible by Same Number The Search Factor and Start Number are checked to make sure they have no common divisors between them. If they were to have a common divisor no prime numbers would be found. If they do have a common divisor you will be returned to the Start Number entry screen to enter another starting number. 11. Insufficient Space on Disk When creating any file the program checks to make sure there will be enough space on the disk to hold it. If not the Extended Error Reporting System will tell you and then return you to an appropriate menu. At this point you may have to change disks or exit the program and erase some files on the disk you want to use. 12. Substituted Drive While selecting a drive to use in the File Selection Screen you selected a substituted drive (ie. a drive letter has been substituted for a path name). You will be returned to the File Selection Screen to select an unsubstituted drive. This applies to Assigned drives too. (See DOS ASSIGN and SUBST commands in your DOS Manual) 13. File is Incomplete When you selected a Prime Number File to scramble you selected one that was incomplete. You will be returned to the File Selection Screen to select another Prime Number File to scramble. Appendix C Page 71 --------------------------------------------------------------- 14. File Contains Invalid Data A check is made on some of the files created by Global Security. If you ever get this error message the file has been corrupted. You will be returned to an appropriate menu. 15. File is Already Complete When selecting a Prime Number File to finish you selected one than is already complete. You will be returned to the File Selection Screen to select another file to finish. 16. File Not Found At various times in the program you will need 1 or 2 additional files in a process. When you encipher a file you are asked to select a KEY File to use. The SCM and DFT files with the same name must also be present. If they are missing you will get this error message with the file name and then returned to an appropriate menu. 17. More than 12 Levels of Subdirectories If you have more than 12 levels of subdirectories the program will exit upon startup after displaying the above error message. After startup if you use a disk that has more than 12 levels of subdirectories the program will display this error message and return you to an appropriate menu. 18. Decompression Integrity Check Failed Decipher Integrity Check Failed Reconstrcution Integrity Check Failed An error was detected during the integrity check while deciphering, decompressing, or reconstruction a file. Data may be corrupted. If the file was transmitted to you ask for it to be enciphered, compressed, transformed, and transmitted again. 19. Disk Full Since the calculations of the required disk space needed to decipher a file or set of messages for E-Mail may not always be accurate you will get this message if the disk you are using to put deciphered files/messages onto runs out of room. Make more room on the disk or use your hard disk to put the deciphered files onto. 20. Not a Valid "ENC" File to Decipher The decipher routine could not find the proper Global Security File ID String which identifies this as an "ENC" File. The ID String may be corrupted or you have selected a file with an "ENC" file extension but which is not a true "ENC" file. Appendix C Page 72 --------------------------------------------------------------- 21. No "HR64" Messages in File to Extract While scanning a file of E-Mail messages none were found to extract. If you know for a fact that there are messages to extract in the file the High RADIX 64 ID String has been corrupted. 22. Too Many Files With The Same Name The decipher routines will assign the original name to any file it decipheres. If a file with the same name already exists in the directory it will use the same file name but assign a file extension of "001". If "001" is in use it will use "002", etc. all the way up to "999". If you already have 999 file names like this in the directory you will get this message. 23. Future Compression Method Used Future Encryption Method Used You are attempting to decipher or decompress a file or message that has been enciphered or compressed by a method used by a future version of Global Security. Select Ok from the Extended Error Reporting System Screen and you will be returned to an appropriate menu or, if you are deciphering E-Mail Messages, the program will continue looking for valid messages to decipher until the end of the file has been reached. 24. Not a Valid File to UnPack. You have selected a file that does not have the Global Security Pack File ID String in the header or the ID string has become corrupted. 25. WIPE File Verify Error. After the last overwrite of a file with character 240 the file is read and verified that it is filled with character 240. If for any reason the file is not filled with character 240 this error is displayed. 26. Suspected Computer Virus Attack! (Registered Versions Only) Every time Global Security is executed it calculates a CRC_32 value for its EXE file on disk. If it does not match the one stored in the program this message will be displayed in an Extended Error Reporting System Screen and then the program will perform a controlled exit to DOS. 27. All Files Selected to Pack are Empty. If the files you have selected to Pack are all 0 length this error message will appear and you will be returned to an appropriate menu. Page 73 --------------------------------------------------------------- 28. "HR64" Files to Create Exceeds 999 When trying to break up a very large file into smaller ones for transmission by E-Mail the number of small files to create exceeds 999. 29. No. Selected Does Not Match No. in Header Not all the files needed to reconstruct the original file have been selected. 30. Recon Group Files Not in Proper Order The first file in the selected list is not the first file in the group needed to reconstruct the original file. 31. End of File Before End of Reconstruction End of File Before End of Extraction The actual end of file came before it should have. The file you have received may have lost some data along the way. 32. Not a Valid "HR64" File to Reconstruct The file selected does not have the "HR64" file format signature in it. Select another file. 33. Not a Valid "ENC" File for Phi/Chi Tests The file selected does not have a valid ENC signature in it. Select another file. Appendix C Page 74 --------------------------------------------------------------- CRITICAL ERRORS --------------------------------------------------------------- The following errors are reported by the Critical Error Reporting System. Possible remedies are also suggested. 1. Disk Write Protected Remove the write protection from the disk and select Retry from the Critical Error Reporting System menu. 2. Unknown unit With the File Selection Screen this error should never be encountered. But if it is select Cancel from the Critical Error Reporting System menu and you will be returned to an appropriate menu. 3. Drive Not Ready You have selected a drive without a disk in it. Insert a disk in the drive and select Retry from the Critical Error Reporting System menu or select cancel and you will be returned to the File Selection Screen to select another drive. 4. Unknown Command A device has received an unknown command. If you ever encounter this critical error select Cancel from the Critical Error Reporting System menu and you will be returned to an appropriate menu. 5. Data Error (Bad CRC) A data error as indicated by a bad CRC value has been encountered. You may select Retry from the Critical Error Reporting System menu and DOS may be able to overcome the error. If it still reports Data Error after a few attempts select cancel from the menu and you will be returned to an appropriate menu. The process you were trying to do will be cancelled and all files being worked on or created will be taken care of. If you continue to get this error repeatedly on a floppy or hard disk it indicates that the disk is going bad in the area reported by the Critical Error Reporting System. 6. Bad Request Structure Length Select cancel from the Critical Error Reporting System menu and you will be returned to an appropriated menu. Appendix C Page 75 --------------------------------------------------------------- 7. Seek Error A disk drive is having problems finding a specific track or cluster on a disk. Select Retry from the Critical Error Reporting System menu a few times to see if DOS can overcome this error. If it cannot select Cancel and you will be returned to an appropriate menu. If you continue to get this error repeatedly on a floppy or hard disk it indicates that the disk is going bad in the area reported by the Critical Error Reporting System. 8. Unknown Media Type A disk with an unknown or improper format type is being used. This may also happen because of different format programs being used which are not compatable with all computers (ie. my 386 will not read any disk formated by my brothers IBM PS/2 286). Select Cancel from the Critical Error Reporting System menu and you will be returned to an appropriate menu. 9. Sector Not Found A disk drive could not find the sector it was looking for. You can select Retry from the Critical Error Reporting System menu a few times to see if DOS can overcome this error. If it cannot select Cancel and you will be returned to an appropriate menu. If you continue to get this error repeatedly on a floppy or hard disk it indicates that the disk is going bad in the area reported by the Critical Error Reporting System. 10. Out of Paper Will never be reported by Global Security because it does not use DOS to print with. 11. Write Fault Select Retry to see if DOS can overcome the error. If it cannot select Cancel and you will be returned to an appropriate menu. If you continue to get this error repeatedly on a floppy or hard disk it indicates that the disk is going bad in the area reported by the Critical Error Reporting System. Appendix C Page 76 --------------------------------------------------------------- 12. Read Fault Select Retry to see if DOS can overcome the error. If it cannot select Cancel and you will be returned to an appropriate menu. If you continue to get this error repeatedly on a floppy or hard disk it indicates that the disk is going bad in the area reported by the Critical Error Reporting System. 13. General Failure May be caused by a floppy disk drive going bad. This is the only time the author has seen this critical error on his system. Select cancel to be returned to an appropriate menu, or abort to exit the program. PRINTER ERRORS --------------------------------------------------------------- The following errors are reported by the Printer Error Reporting System. 1. TIMEOUT - Printer has timed out. Select Cancel from the menu in the Printer Error Reporting System, reset your printer and try again. 2. I/O ERROR - Printer has encountered an I/O Error. Select Cancel from the menu in the Printer Error Reporting System and try again. 3. NOT SELECTED - Printer not turned on. Turn your printer on and select Retry from the menu in the Printer Error Reporting system 4. OUT OF PAPER - Put more paper in your printer and select Retry from the Menu in the Printer Error Reporting System. 5. BUSY - Usually means that the printer is turned on but is not on line. Put the printer on line and select Retry from the menu in the Printer Error Reporting System. Appendix D Page 77 --------------------------------------------------------------- PROGRAM LIMITATIONS --------------------------------------------------------------- The File Selection Screen will only handle: 1. 12 disk drives. 2. 1,000 directories on a disk drive. 3. 2,048 files in a directory. 4. 12 levels of Subdirectories. (DOS has 32) Floppy Disk Drive Systems: If your computer has only one floppy disk drive you are not allowed to use this drive as an A: and B: drive as some DOS utilities do. Appendix E Page 78 --------------------------------------------------------------- TERMINOLOGY --------------------------------------------------------------- Algorithm A set of rules for solving a problem in a finite number of steps. Back Door Used in reference to a formula in a Pseudo Random Number Generator. Allows whoever inserted the back door to decipher a message without knowing the seed number used to encipher it. Binary File Any file that does not meet the definition of a text file (See Below). Click To quickly press and release a mouse button. Command Bar A shadowed bar that carries out a command or action. May be activated by pressing the indicated Hot Key or clicking with the left mouse button. Common Command Bars are Quit and Help. Some Command Bars do not have a Hot Key. In that case use the indicated keyboard key (ie. PgUp, Home, End). Cursor Keys The Left, Right, Up, and Down Arrow keys. Ciphertext Plaintext that has been put through a transformation into secret form. Directory A collection of computer files (programs, data, and subdirectories) stored at the same location on disk. Directory Tree A graphic display of the directory structure on a disk. Shown as a branching structure that looks like a tree. All directories and subdirectories are branches off of the root directory. E-Mail Electronic Mail (messages) sent from computer to computer. Usually restricted to text files (See Below). File Group A group of four related files with the same name but different file extensions created by the program. The file extensions are PRM for Prime Number Files, DFT for Default Parameter Files, SCM for Scrambled Prime Number Files, and KEY for Key Files. Mouse Pointer The non-blinking rectangular box on the screen indicates the mouse position. Paging Keys The Page Down, Page Up, Home, and End Keys. The Home Key takes you to the beginning of a file or list. The End Key takes you to the end of a file or list. Appendix E Page 79 --------------------------------------------------------------- Plaintext A message that will be put into secret form (ie. data file). Prime Number Prime numbers are numbers that have only improper divisors (ie. only divisible evenly by themselves and one). Pseudo Random Numbers Numbers generated by a formula that exhibit properties of random distribution. Can be duplicated. Pseudo Random Number Generator A process that continuously generates pseudo random numbers under control of a formula. Seed Number The initial number used by a formula in a pseudo random number generator to start generating pseudo random numbers. Sometimes called a key or key number. Text File Any file that uses only the character codes 32 to 127, the carriage return, line feed, and tab control characters. Appendix G Page 80 --------------------------------------------------------------- PGP on PGP --------------------------------------------------------------- I have just received my first copy of Pretty Good Privacy (PGP) and have had a chance to look over the program and documentation. I still stand by my statement on page 61 that any program not based on the "One Time Pad" System can be broken by the NSA. The documentation for PGP has not changed my mind. Once you read the documentation you realize that they really use a conventional cipher called IDEA(tm) invented in Europe. The only part that uses the RSA algorithm is the encryption of the key for the conventional cipher. If the public key can be broken to get the secret key you can then get the key to the conventional cipher and decrypt the message. The math to retrieve a secret key from a public key is known and published. Anyone who thinks the NSA cannot break a public key is a fool. I will let PGP's own documentation say the rest. "A major vulnerability exists if public keys are tampered with. This may be the most crucially important vulnerability of a public key cryptosystem, in part because most novices don't immediately recognize it." "Another similar attack involves someone creating a clever imitation of PGP that behaves like PGP in most respects, but doesn't work the way it's supposed to. For example, it might be deliberately crippled to not check signatures properly, allowing bogus key certificates to be accepted." This is possible because the source code to PGP is published for anyone to use, change, etc. "An expensive and formidable cryptanalytic attack could possibly be mounted by someone with vast supercomputer resources, such as a Government intelligence agency. They might crack your RSA key by using some new secret factoring breakthrough." "Perhaps the Government has some classified methods of cracking the IDEA(tm) conventional encryption algorithm used in PGP. This is every cryptographer's worst nightmare. There can be no absolute security guarantees in practical cryptographic implementations." "They are concerned that the whole package is weakened if we use a hybrid public-key and conventional scheme just to speed things up. After all, a chain is only as strong as its weakest link. They demand an explanation for this apparent "compromise" in the strength of PGP. This may be because they have been caught up in the public's reverence and awe for the strength and mystique of RSA, mistakenly believing that RSA is intrinsically stronger than any conventional cipher. Well, it's not." AND THEY ARE RIGHT! INDEX Page 81 Achilles Heel...............64 DoD 5220.22-M...............46 Algorithm...................78 Dvorak, John C..............59 Association of Shareware Professionals (ASP) E_Mail, What is it..........39 Address..................5 El Gamal Encryption Disputes.................5 Algorithm...................59 Member...................5 Encipher/Decipher a File....35 Ombudsman................5 Errors Available by same Author.....6 Start Up/Termination....68 Program.................69 Back Door................59,78 Critical................74 Bamford, James..............59 Printer.................76 Block Cursor................15 Executing Global Security...12 Build a Prime Number File...25 Extended Error Byte Magazine...............60 Reporting System............21 Extract E-Mail Files........40 Chi Test....................50 Chime.......................16 FBI.........................61 CIA.........................61 Features.....................4 Ciphertext..................78 File Group..................24 Clear and Present Danger....67 File Selection Screen.......17 "Cloak and Data"............61 Four Ways to use Command Bars................16 Global Security Command Line Parameters Normal Encipher..........9 Any Order/Combination...12 E-Mail Encipher..........9 /B......................12 Storage on Disk..........9 /P......................12 One Time Pads............9 /T......................12 Frequency Distribution /V......................12 Tests.......................48 /C......................12 Functions Communications Satelite Build a Prime Corporation (COMSAT)........59 Number File.............25 Compressing Files...........32 Create a Default Computer Requirements.......10 Parameter File..........28 Create a Default Parameter Encipher/Decipher File........................28 a File..................35 Critical Error Generate a Key File.....30 Reporting System............20 Make a One Time Pad.....43 Pack/UnPack File(s).....32 Data Encryption Standard Scramble a Prime (DES).......................60 Number File.............29 Data Integrity Checks....34,38 Transform E-Mail Files..39 Decipher a File.............37 Wipe/Delete File(s).....45 Decompressing Files.........34 Default Parameter Files.....28 Grehan, Rick................61 Password Character Generate a Key File.........30 Positions...............28 Government Wipe Procedure...46 Random Factory Array Shift.............28 High RADIX 64 File Format...39 DIA.........................61 Directory...................78 "Inside Track"..............59 Directory Tree..............78 Installing Global Security..11 INDEX Page 82 Intercepting Computer Data PC Magazine.................59 and E-Mail Transmissions....53 PGP - Pretty Good Privacy...61 PGP on PGP..................80 Kahn, David.................63 Phi Test....................49 Kappa Sub r.................48 Phone System - Digital......62 Kappa Sub p.................48 Plaintext...................79 Kerckhoffs, Auguste.........48 Preface......................7 Keyboard President Truman, Harry S...59 Control C Key...........15 Prime Number................79 Keyboard (Cont.) Printer Control Break Key.......15 Extended ASCII Escape Key..............15 Characters..............22 Function Keys...........14 Command Line Switch /P..12 Hot Keys................16 Emulation Modes.........10 Pause Key...............15 Laser...................10 Print Screen Key........15 Pause After Page........22 Key Files...................30 Print Screen Key........15 Printer Error La Cryptographie militaire..48 Reporting System........22 Lempel-Ziv-Welch Method.....33 Printer Errors..........76 Licensing....................6 Setup Problems..........22 Lucifer.....................60 Using...................22 Program Limitations.........77 Main Menu...................24 Public Key/Private Key......60 Make a One Time Pad.........43 Pseudo Random Numbers.......79 MCI.........................39 Pseudo Random Mouse Number Generator............79 Click...................78 Hide Pointer............15 Receive Only Station (RCV)..59 Pad..................16,23 Reconstruct E-Mail Files....41 Right Button............15 Registration Incentives......5 Using...................15 Rivest-Shamir-Adelman (RSA) Using the Mouse Pad.....23 encryption algorithm........60 RSA Data Security...........60 National Institute of Standards and Technologies..59 Scramble a Prime National Security Number File.................29 Agency (NSA)..............7,59 Secret Service..............61 Operation Shamrock......61 Senate Intelligence Committe Senator Church, Frank One Time Pad System Chairman................62 First Developed.........63 Tyranny Speach......62 First Used by...........63 Setting up the Group Files Rejected by.............63 and Passwords...............48 Unbreakable.............63 Shamir, Adi.................60 Using a One time Pad....55 Sorting Files...............19 Vigenere Tableau........55 What is a One Time Pad..43 Text File................39,79 Operation Shamrock..........61 "The CODEBREAKERS"..........63 "The Puzzle Palace".........59 Pack/UnPack File(s).........32 Tips on Using Global Pass It Along................6 Security in the Real World..52 INDEX Page 83 Tom Clancy..................67 Transform E-Mail Files......39 Transmitting Enciphered Files.......................49 Using a One Time Pad........55 What is Electronic Mail?....39 Why Encipher Data...........59 Why Global Security.........63 Wipe/Delete File(s).........45