crypt.1
来自「<B>Digital的Unix操作系统VAX 4.2源码</B>」· 1 代码 · 共 121 行
1
121 行
.TH crypt 1.SH Namecrypt \- encode/decode (available only if the Encryption layered product is installed).SH Syntax.B crypt .I key .B < input.File > output.File.SH Description.NXR "encryption" "crypt command" .NXR "crypt command" "encryption" This reference page describes software that is available onlyif the Encryption layered product is installed..PPThe.PN cryptcommand reads from the standard input and writeson the standard output.You must supply a.I key which selects a particular transformation.If no password is given,.PN cryptdemands a .I keyfrom the terminal and turnsoff printing while the .I keyis being typed in.The.PN cryptcommandencrypts and decrypts with the same .I key..PPFiles encrypted by.PN cryptare compatible with those treated by the ed, ex and vi editors in encryption mode..PPThe security of encrypted files depends on three factors:the fundamental method must be hard to solve,direct search of the .I key space must be infeasible, andsneak paths by which .I keysor clear text can becomevisible must be minimized..PPThe.PN cryptcommandimplements a one-rotor machine designed along the linesof the German Enigma, but with a 256-element rotor.Methods of attack on such machines are known, but not widely;moreover the amount of work required is likely to be large..PPThe transformation of a .I key into the internalsettings of the machine is deliberately designed tobe expensive, for example, to take a substantial fraction ofa second to compute.However,if .I keysare restricted to three lowercase letters,then encrypted files can be read by expending onlya substantial fraction offive minutes of machine time..PPSince the .I key you choose is an argument to the.PN cryptcommand,it is potentially visible to users executing ps(1)or a derivative.To minimize this possibility,.PN cryptdestroys any record of the .I keyimmediately upon entry.The most vulnerable aspect of .PN cryptis the choice of .I keysand .I keysecurity..ne 10.SH ExamplesThe following examples use KEY as the key to encrypt and decrypt files.The first example encrypts the file.PN plain.File , naming the resulting encrypted file .PN crypt.File .The second example decrypts the file .PN crypt.File , naming the resulting decrypted file.PN decrypt.File .The third example prints the encrypted file in clear text..EXcrypt KEY < plain.File > crypt.File.EE.EXcrypt KEY < crypt.File > decrypt.File.EE.EXcrypt KEY < crypt.File | pr.EE.SH Files.TP 12.PN /dev/tty for typed .I key.SH See Alsoed(1), ex(1), vi(1), xsend(1), crypt(3), makekey(8)
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?