enigma.1 (b9716d687991faafe9172bd2d6726567034441f4) | enigma.1 (5dc67cd725cbe9284fb4250b1cd5789beb3f0cff) |
---|---|
1.\" 2.\" enigma (aka. crypt) man page written by Joerg Wunsch. 3.\" 4.\" Since enigma itself is distributed in the Public Domain, this file 5.\" is also. 6.\" | 1.\" 2.\" enigma (aka. crypt) man page written by Joerg Wunsch. 3.\" 4.\" Since enigma itself is distributed in the Public Domain, this file 5.\" is also. 6.\" |
7.\" $FreeBSD$ | 7.\" $Id$ |
8.\" " | 8.\" " |
9.Dd May 14, 2004 | 9.Dd October 30, 1998 |
10.Os | 10.Os |
11.Dt ENIGMA 1 | 11.Dt enigma 1 |
12.Sh NAME | 12.Sh NAME |
13.Nm enigma , 14.Nm crypt | 13.Nm enigma |
15.Nd very simple file encryption 16.Sh SYNOPSIS 17.Nm 18.Op Fl s 19.Op Fl k 20.Op Ar password 21.Nm crypt 22.Op Fl s 23.Op Fl k 24.Op Ar password 25.Sh DESCRIPTION | 14.Nd very simple file encryption 15.Sh SYNOPSIS 16.Nm 17.Op Fl s 18.Op Fl k 19.Op Ar password 20.Nm crypt 21.Op Fl s 22.Op Fl k 23.Op Ar password 24.Sh DESCRIPTION |
26The 27.Nm 28utility, also known as | 25.Nm Enigma , 26also known as |
29.Nm crypt 30is a 31.Em very 32simple encryption program, working on a 33.Dq secret-key | 27.Nm crypt 28is a 29.Em very 30simple encryption program, working on a 31.Dq secret-key |
34basis. 35It operates as a filter, i.e., 36it encrypts or decrypts a | 32basis. It operates as a filter, i. e. it encrypts or decrypts a |
37stream of data from standard input, and writes the result to standard | 33stream of data from standard input, and writes the result to standard |
38output. 39Since its operation is fully symmetrical, feeding the encrypted data 40stream again through the engine (using the same secret key) will 41decrypt it. | 34output. It automatically detects whether the input data stream is 35already encrypted, and switches into decryption mode in this case. |
42.Pp | 36.Pp |
43There are several ways to provide the secret key to the program. 44By | 37There are several ways to provide the secret key to the program. By |
45default, the program prompts the user on the controlling terminal for 46the key, using 47.Xr getpass 3 . 48This is the only safe way of providing it. 49.Pp 50Alternatively, the key can be provided as the sole command-line 51argument 52.Ar password | 38default, the program prompts the user on the controlling terminal for 39the key, using 40.Xr getpass 3 . 41This is the only safe way of providing it. 42.Pp 43Alternatively, the key can be provided as the sole command-line 44argument 45.Ar password |
53when starting the program. 54Obviously, this way the key can easily be | 46when starting the program. Obviously, this way the key can easily be |
55spotted by other users running 56.Xr ps 1 . 57As yet another alternative, 58.Nm 59can be given the option 60.Fl k , 61and it will take the key from the environment variable 62.Ev CrYpTkEy . 63While this at a first glance seems to be more secure than the previous | 47spotted by other users running 48.Xr ps 1 . 49As yet another alternative, 50.Nm 51can be given the option 52.Fl k , 53and it will take the key from the environment variable 54.Ev CrYpTkEy . 55While this at a first glance seems to be more secure than the previous |
64option, it actually is not since environment variables can also be | 56option, it actually isn't since environment variables can also be |
65examined with 66.Xr ps 1 . 67Thus this option is mainly provided for compatibility with other 68implementations of | 57examined with 58.Xr ps 1 . 59Thus this option is mainly provided for compatibility with other 60implementations of |
69.Nm . | 61.Nm enigma . |
70.Pp 71When specifying the option 72.Fl s , 73.Nm 74modifies the encryption engine in a way that is supposed to make it a 75little more secure, but incompatible with other implementations. 76.Pp 77.Ss Warning 78The cryptographic value of 79.Nm | 62.Pp 63When specifying the option 64.Fl s , 65.Nm 66modifies the encryption engine in a way that is supposed to make it a 67little more secure, but incompatible with other implementations. 68.Pp 69.Ss Warning 70The cryptographic value of 71.Nm |
80is rather small. 81This program is only provided here for compatibility 82with other operating systems that also provide an implementation 83(usually called 84.Xr crypt 1 85there). 86For real encryption, refer to 87.Xr bdes 1 , 88.Xr openssl 1 , 89.Xr pgp 1 Pq Pa ports/security/pgp , 90or 91.Xr gpg 1 Pq Pa ports/security/gnupg . 92However, restrictions for exporting, | 72is rather small. This program is only provided here for compatibility 73with other operating systems that also provide an implementation. For 74real encryption, refer to 75.Xr bdes 1 76(from the DES distribution package), or 77.Xr pgp 1 78(from the ports collection). Hoewever, restrictions for exporting, |
93importing or using such tools might exist in some countries, so those 94stronger programs are not being shipped as part of the operating 95system by default. 96.Sh ENVIRONMENT | 79importing or using such tools might exist in some countries, so those 80stronger programs are not being shipped as part of the operating 81system by default. 82.Sh ENVIRONMENT |
97.Bl -tag -offset indent -width ".Ev CrYpTkEy" | 83.Bl -tag -offset indent -width "XXCrYpTkEy" |
98.It Ev CrYpTkEy 99used to obtain the secret key when option 100.Fl k 101has been given 102.El 103.Sh EXAMPLES 104.Bd -literal -offset indent 105man enigma | enigma > encrypted 106Enter key: (XXX \(em key not echoed) 107.Ed 108.Pp 109This will create an encrypted form of this man page, and store it in 110the file | 84.It Ev CrYpTkEy 85used to obtain the secret key when option 86.Fl k 87has been given 88.El 89.Sh EXAMPLES 90.Bd -literal -offset indent 91man enigma | enigma > encrypted 92Enter key: (XXX \(em key not echoed) 93.Ed 94.Pp 95This will create an encrypted form of this man page, and store it in 96the file |
111.Pa encrypted . | 97.Ql encrypted . |
112.Bd -literal -offset indent 113enigma XXX < encrypted 114.Ed 115.Pp 116This displays the previously created file on the terminal. 117.Sh SEE ALSO 118.Xr bdes 1 , | 98.Bd -literal -offset indent 99enigma XXX < encrypted 100.Ed 101.Pp 102This displays the previously created file on the terminal. 103.Sh SEE ALSO 104.Xr bdes 1 , |
119.Xr gpg 1 , 120.Xr openssl 1 , | |
121.Xr pgp 1 , 122.Xr ps 1 , 123.Xr getpass 3 124.Sh HISTORY 125Implementations of 126.Nm crypt 127are very common among 128.Ux | 105.Xr pgp 1 , 106.Xr ps 1 , 107.Xr getpass 3 108.Sh HISTORY 109Implementations of 110.Nm crypt 111are very common among 112.Ux |
129operating systems. 130This implementation has been taken from the | 113operating systems. This implementation has been taken from the |
131.Em Cryptbreakers Workbench 132which is in the public domain. | 114.Em Cryptbreakers Workbench 115which is in the public domain. |