⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 crypt.1

📁 unix v7是最后一个广泛发布的研究型UNIX版本
💻 1
字号:
.TH CRYPT 1 .SH NAMEcrypt \- encode/decode.SH SYNOPSIS.B crypt[ password ].SH DESCRIPTION.I Cryptreads from the standard input and writeson the standard output.The.I passwordis a key that selects a particular transformation.If no.I password is given,.I cryptdemands a key from the terminal and turnsoff printing while the key is being typed in..I Cryptencrypts and decrypts with the same key:.PP	crypt key <clear >cypher.br	crypt key <cypher | pr.PPwill print the clear..PPFiles encrypted by.I cryptare compatible with those treated by the editor.I edin encryption mode..PPThe security of encrypted files depends on three factors:the fundamental method must be hard to solve;direct search of the key space must be infeasible;`sneak paths' by which keys or cleartext can becomevisible must be minimized..PP.I Cryptimplements a one-rotor machine designed along the linesof the German Enigma, but with a 256-element rotor.Methods of attack on such machines are known, but not widely;moreover the amount of work required is likely to be large..PPThe transformation of a key into the internalsettings of the machine is deliberately designed tobe expensive, i.e. to take a substantial fraction ofa second to compute.However,if keys are restricted to (say)three lower-case letters,then encrypted files can be read by expending onlya substantial fraction offive minutes of machine time..PPSince the key is an argument to the.I cryptcommand,it is potentially visible to users executing.IR ps (1)or a derivative.To minimize this possibility,.I crypttakes care to destroy any record of the keyimmediately upon entry.No doubt the choice of keys and key securityare the most vulnerable aspect of.I crypt..SH FILES/dev/tty for typed key.SH "SEE ALSO"ed(1),makekey(8).SH BUGSThere is no warranty of merchantability nor any warrantyof fitness for a particular purpose nor any other warranty,either express or implied, as to the accuracy of theenclosed materials or as to their suitability for anyparticular purpose.  Accordingly, Bell TelephoneLaboratories assumes no responsibility for their use by therecipient.   Further, Bell Laboratories assumes no obligationto furnish any assistance of any kind whatsoever, or tofurnish any additional information or documentation.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -