Theta Pi Encryption System Manual 2. The general interface 2.1 The Main Menu 2.2 Enc/Dec options 2.3 What's going on when the thing is running? 3. ENCPROSB - the original algorythm 3.1 how to enter data and enryption codes 3.2 what happens 3.3 how to use encrypted material 4. ENCPROS1 - the cryptogram algorythm 4.1 How to get to algorythm 4.2 algorythm options 4.3 how to use output 5. ENCPROS2 - the simple shift 5.0 WARNING - this algorythm is for novelty purposes only and is not a secure algorythm 5.1 how to use this algorythm 5.2 how to use output 6. ENCPROS3 - the list encrypt system 6.1 how to get to this algorythm 6.2 overview of options 6.3 how enclist and declist works 6.4 how to use output 7. PICPROS 1 & 2 - graphical extensions to list encryption 7.1 what they are 7.2 what you need to do before using them 7.3 how to use them 7.4 how to use their output 8. ENCPROSP - another graphical extension to list encrypt 9. Credits, acknowledgements, etc. APPENDIX A - Writing your own algorithms and the ADK 2. The General Interface The general interface is what you will use to interface with most of the algorithms available for the encryption system. The bulk of it, however, is comprised in the program's main menu. To start using the encryption system, run NUENCODE, which is the main program. The encryption system will not work correctly if one of the other programs are run instead. 2.1 The Main Menu After the opening introduction screen, you will be faced with a menu called STEPS. It has six options: ENTER TEXT, GENERATE [A], ENCRYPTION, DECRYPTION, READ MSG/QUIT, and v1.0b. 2.1.1 the ENTER TEXT option This is the option to use to enter the text you want to encrypt or the encrypted text (or 'string') that you want to decrypt. Especially for encrypted text, the characters must be entered exactly as written. After entering this command, you will be faced with a screen that looks like this: ALPHANUMERIC + .,-?/*+()�uvw^e TEXT: The top two lines tell you mwhat you can enter into the input below. You can enter any standard upper-case alphabetical characters (using the ALPHA key) including the theta character, the numbers 0-9, and the other characters listed, including lower-case u,v,w, and e. You may enter any length of message you want, but it is inadvisable to enter anything greater that 255 characters while using some of the options, and if your calculator is fully loaded, too big of a message may cause a memory error. It takes 2.253 seconds to encrypt or decrypt each character. After entering your message, the program will display how many characters the message it and how long it will take to encrypt it. 2.1.2 the GENERATE [A] option This is used to genrate sets of encryption keys for the standard encryption algorithm, and creates 20 different sets in [A]. More on this later. 2.1.3 the ENCRYPT and DECRYPT options Once you are ready to run the program, choose ENCRYPT for encrypting your regular text and DECRYPT for decrypting an encrypted string. Note that you must have entered your text before using these options. 2.1.4 the READ MSG option This option exits the program. upon exiting, you will see this display: COPYRIGHT 1998 ؽ SOFTWARE a string of text The string of text is either an encrypted stirng or your decrypted message, depending on which option you chose. If it is longer than 16 characters, there will be a ... at the end of it. Use the <> keys to move back and forth through the string. 2.1.5 the v1.0b option This displays product and contact information. 2.2 Encryption and Decryption options When you choose either ENCRYPT or DECRYPT in the main menu, you will be presented with three options: ENTER VALUES, USE MATRIX, or CODES IN ALG. If you are using the standard or simple shift algorithms, you would choose one of the first two options to define your encryption keys. If you are using the cryptogram or list encryption programs, however, who use their own encryption keys, you would choose CODES IN ALG. to use their internal coding systems. When you choose the ENTER VALUES option you will be asked to provide four values: the + offset key, the - offset key, the instance addl, and then enter either 3, 5, or 7. you can enter any value between 1 and 52 to the first three values, but remember what they are. You will have to use them the same way if you want to decrypt your message later. The second option, USE MATRIX, lets you choose a set of pre-generated code keys if you previously used the GENERATE [A] option. You can choose between 1 and 20, and the program will display the keys before encrypting/decrypting. It is best to write down and verify these keys that just writing the number of the matrix code you used, in case the matrix becomes corrupted. The values should look like this: CODES: {17 27 12 3} 2.3 What's going on? As soon as you finish choosing your options for encryption or decryption, the display clears and is replaced with the string LOADING TEXT -, with a number counting slowly upwards below it. What the program is doing is taking your string and converting it to a list of numerical values, which can be manipulated easier. After a while, another menu will come up. It looks like this: ALGORYTHM? STANDARD CRYPTOGRAM SHIFT LIST ENCRYPT AUX 1 AUX 2 AUX 3 From this menu, you can choose which algorith you want to use: the STANDARD, original algorith, the CRYPTOGRAM creator, the simple SHIFT algorythm, and the secure LIST ENCRYPT algorithm. In addition, AUX 1-3 are slots for additional algorithms that you can either develop yourself or download from my website as they are created. For more ionformation on these, see Appendix A. After choosing your algorithm, the screen will look something like this: CRYPTOGRAMMER v1 By ؼ SOFTWARE ENCRYPTING - ## When you see this screen, the particular algorithm is manipulating the list of numebr to encrypt the data. After this is finished, the string RELOADING TEXT - and another number will pop up. While this is displayed, the program is taking the now-encrypted values and turning them back into a text string. When the process is complete, the following will be displayed: DONE MESSAGE STORED IN Str1 Hitting enter will take you back to the main menu, where you can use the READ MSG option to see the contents of your message. 3. ENCPROSB - the original algorythm This subroutine is the original algorythm of EncPRo Alpha. It is tried and true, is relatively secure, and you only have to remember 4 numbers at the most for encrypting and ecrypting your message. 3.1 how to enter data and enryption codes Using the explanations of section two, input your data and encryption keys. Be sure to fill in all sections exactly as you want them to appear. 3.2 what happens After entering your codes, the program will take you to the algorithms menu. Select the STANDARD option, and the program will do the rest. Using your keys, the algorithm shifts certain characters up or down based on their position in the list. 3.3 what to do with the output When you exit the program, your encrypted string will be displayed. You must write it down letter for letter if you want to use it again, along with the encryption codes. If you do not want them on the same piece of paper, write them down in a safe place. You can use the same codes for many messages or a different code for each one. AN EXAMPLE: Let's take the text "GREAT SOULS SUFFER IN SILENCE" by Johann Christoph Friedrich von Schiller. After entering, the program tells us that we have 29 characters, and that it will take 65.337 seconds, or a little over a minute, to process. Next, we go to encryption and encrypt with the values {13 34 28 3}. After loading the text, we choose STANDARD from the algorithms menu, and watch it finish encrypting. After we use the READ MSG option, we get the string T9)T5�46I34�4-�YRLM0BS4CYXBVR. There you have it, your first encrypted message! Now you try it: decrypt the string 67+-2�E-253XP*9YwT7/E6 using the codes {30 33 23 7} to read a famous quote by Joseph Patrick Kennedy. 4. ENCPROS1 - the cryptogram algorythm This algorithm, while not exactly an encryption program, creates cryptogram word puzzles automatically. Instead of sitting around with a pen and paper assigning letters and shifting each character by hand, now any quote, famous or otherwise, can be turned into a publication-quality cryptogram. A cryptogram, for those who don't know, is a puzzle where each letter corresponds to a different letter in the alphabet. 4.1 How to get to algorythm Enter your quote. Since this program has its own internal shifting codes, use the CODES IN ALG. option under ENCRYPTION. NOTE: THIS PROGRAM CAN NOT DECRYPT CRYPTOGRAMS. Remember to choose CRYPTOGRAM in the alogrithms menu. 4.2 algorythm options There are two options: AUTO and MANUAL. Manual is for those people who insist on assigning which letter corresponds to which painstakingly by hand. By using this, you will enter a letter for each letter of the alphabet that the encrypted version will correspond to. It is error-correcting, and luckily won't allow you to assign the same letter to two different alphabet letters. Auto will do all the work for you, and spit out a nice cryptogram. 4.3 how to use output This program can only detect the letters A-Z and �. All other characters will remain as is. To generate a clue, compare your original quaote to your cryptogram and find which letters correspond to the plain-text version. AN EXAMPLE: For a fun addition to our website, we are going to include a cryptogram. For this one, we are going to use the quote "THE HISTORIAN IS A PROPHET IN REVERSE - FREDERICH VON SCHLEGEL." It is 62 characters long and will take a little over 2 minutes to encrypt. We encrypt it using CODES IN ALG., and choose CRYPTOGRAM from the algorithms menu, then choose AUTO to automatically generate the codes. When the encryption is finished, we get the string "DAV AXODRMXHT XO H LMRLAVD XT MVEVMOV - QMVZMXIA ERT OIAUVYVU." Then, to get our clue, we compare the two and find that M in the cryptogram is the same as R in the regular version. Then we write the output in proper cryptogram format like this: "DAV AXODRMXHT XO H LMRLAVD XT MVEVMOV" - QMVZMXIA ERT OIAUVYVU Hint: M equals R And there it is - FUYN CJNHD RNFXDUZNOL (hint: U equals O)! 5. ENCPROS2 - the simple shift This is another type of extremely simple encryption algorithm. It simply shifts letters of the alphabet up a certain number of characters. Another name for this algorithm is Caesar's Code, and it is relatively easy to crack. Therefore, do not use it if you do not want other people to read it. 5.1 how to use this algorythm Use the same procedure as you did for ENCPROSB, but only the + OFFSET counts, as it is the amount of characters to shift up by. The rest of the values have no meaning and you can fill them in however you want to. However, the + OFFSET must still be between 1 and 52. Remember to select the SHIFT option in the algorithms menu. 5.2 how to use output Write the text as you would normally. Make sure that you remember how much you shifted it by so that you can decrypt it again. AN EXAMPLE: "IT IS THE NEWSPAPERS DUTY TO PRINT THE NEWS AND RAISE HELL" shifted up by 8 would be "QB QA BPM VMEAXIXMZA LCBG BW XZQVB BPM VMEA IVL ZIQAM PMTT." 6. ENCPROS3 - the list encrypt system This is by far the most secure encryption system in the entire package. Instead of just an algorithm, this system encrypts each character with a unique shift, meaning that without the list of encryption codes, there is absolutely no way to undo this kind of encryption, because each letter could stand for 52 others and therefore an infinite number of messages. Can work for any message under 255 characters, or encrypt one larger message in parts. Works with all 52 usable characters. 6.1 how to get to this algorythm Write your message as usual, then choose CODES IN ALG. and choose LIST ENCRYPT from the algorithms menu. If you chose ENCRYPT, you will see a menu with a number of options. If you chose DECRYPT, then it will run automatically with the pre-installed list. NOTE: if you encrypted a file and wrote the numbers from the list down, set List 5 to the right size and enter the numbers sequentially. If you used another method of securing the list data, read on. 6.2 overview of options The options that are displayed in the list encrypt menu are: Gen. List, En/Decrypt, Enc. List, Dec. List, Wipe List, and Info. REMEMBER THAT YOU CAN ONLY GET HERE BY USING THE ENCRYPT COMMAND. 6.2.1 Gen. List This command prompts you for how many characters long the list should be (as many or more than what you are trying to encrypt), and then generates a list of random shifts. It then encrypts your data. To generate your own, set the dim() of List 5 to your desired length, then enter values from 1 to 52 in each of the entries. 6.2.2 En/Decrypt Use this option if your list is already defined and you just want to encrypt the data. 6.2.3 Enc. and Dec. List This encrypts or decrypts your list codes into text strings with ENCPROSB. More on this later. 6.2.4 Wipe List Erases the list codes. You should save or back up these codes (with encryption or otherwise) before doing this, or lose all hope of ever decrypting your data. 6.2.5 Info Tells you how long the current list is, and how long your text string is. The list length must be greater than or equal to the string length. 6.3 how enclist and declist works Enc. and Dec. List are a method of securing your list codes for transfer. While they are only as secure as ENCPROSB, most people will not be able to distinguish the encrypted lists from a standard string of encrypted text. If you decrypt a list normally, however, it will end up looking like random characters. To encrypt a list: Enter a few characters of random text into the text entry, then choose encrypt and CODES IN ALG. Choose LIST ENCRYPT. Go to Enc. List and enter your 4 code values like you do normally in ENCPROSB. The program will then encrypt as if it were running ENCPROSB, but the output string is the encoded list. To decrypt a list: Enter your encrypted list string into the text entry, then choose encrypt and CODES IN ALG. Choose LIST ENCRYPT. Go to Dec. List and enter your 4 code values from before. It will run as if you had run ENCPROSB, but the output will just be random characters. However, the encrypted list has now been decrypted and is ready to encrypt or decrypt your text. 6.4 how to use output The output is similar to the type of output created by ENCPROSB, but is much more secure. Make sure you do not get the two types mixed up, and remember which encrypted list goes with which encrypted text string. AN EXAMPLE: I have the encrypted string [BFHB8.We] which has been encoded using list encrypt. The list, in turn, has been wiped, but not before being encrypted with the values {14 27 35 7}, resulting in the string [wLDH((ev]. To start, we boot NUENCODE and enter the string for the encrypted list, then encrypt with CODES IN ALG. and choose LIST ENCRYPT. We go to Dec. List and enter our code numbers. ENCPROSB starts, then gives us the string [8,*73SCW]. These are just random characters, but what you can't see is that the list has been reloaded. Now we start the program again, this time entering our string of encrypted text. Then we choose DECRYPT and CODES IN ALG., and then LIST ENCRYPT from the algorithms menu. The text string will automatically decrypt, leaving you with the string [STRTEST1], or STRing TEST 1, the original message. 7. PICPROS 1 & 2 - graphical extensions to list encryption Another way of encrypting your lists for safekeeping. 7.1 what they are the PICPROS system is a method for securing your lists, by transforming the list values into a seemingly random Pic file, Pic3. However, in actuality, this picture can be read and transfromed back into list data. This method of securing lists means that you can send it as an image to others instead of using a randomized text string. Just download it with your link onto your computer and use the Pic<>PICT converter, and then you can transport it as an FTP or E-mail attachment. 7.2 what you need to do before using them You must have a previously created code list in List 5, no larger than 95 entries. 7.3 how to use them To use this feature, open PICPROS1. This will give you a menu with 3 options: ENC. LIST, DEC. LIST, and MAX. LENGTH. Enc. List will take your list and convert it to a Pic file, while Dec. List will take the pic file you have stored in Pic3 and convert it back to a list of codes. Max. Length is just a reminder to keep the lists under 95 characters. All options will run automatically without further input. 7.4 how to use their output Upload the Pic files to your computer, and save your lists as graphical data. Or, keep a popular list hanging around while freeing up the actual list for other uses. 8. ENCPROSP - another graphical extension to list encrypt This creates both a unique 63-character list and a set of pictures to go along with it. Not as secure as the previous type, but the pictures look much more attractive and gather less suspicion, as they look like pictures that other games and screensaver programs might generate. ENCPROSP is completely automatic. As soon as you run it, you are faced with two options: READ a pre-existing picture set, or WRITE a new picutre-and-list code pair. Make sure the program has completed running before trying to encrypt with this code pair. This program uses both Pic1 and Pic2. 9. Credits, acknowledgements, etc. The ؼ Encryption System and all accompanying documentation � David Kibrick Parts of ؼ � 1998 Most of ؼ EncPro and documentation � 1999 Written entirely on the TI-83, converted to computer format by TI Graph Link 83 software. Rom Version 1.0600 Total application size: 7473 bytes The author would like to thank: My computers, calculator, math teachers for not getting too mad, Duracell Ultra batteries, my parents for encouragement, my brother for trying to carck all of my algorithms in vain, the Texas Instruments corporation, various brands of crunchy tortilla pieces and sugary carbonated beverages, CD93 Santa Cruz for helping me not to concentrate too hard (until I turned it off), 7-11, my goldfish for not caring about this whatsoever, and, last but not least, to the 4.3 billion other people who did the same. APPENDIX A - Writing your own algorithms and the ADK WARNING: THIS SECTION IS FOR SERIOUS TI PROGRAMMERS ONLY. IF YOU HAVE NO IDEA WHAT A BYTECODE INTERPRETER OR A COMMAND-LINE INTERFACE IS (DESPITE THE FACT THAT NEITHER OF THEM OCCUR IN THIS SECTION), THEN LEAVE NOW! Step One: Boot up the �on Flux Spacial Interface System on your SGI, and wait for the goedesic coordinate mip-mapping matrices to coincide. Then, whip out your trusty TI-83, and hit <MODE> <ALPHA> <S>, and then, after verifying your ROM version, press enter. Step Two: If you tried to make believe you understood all of that stuff, but only got the explicit TI instructions and entered them, then you're one: a complete idiot, and two: royally screwed. Anyone who knows anything about computers would know that the fist part is almost totally gibberish, and anyone who knows about TIs knows that if you follow the instructions that I gave you, then you have just started a calculator self-test and erased all of your programs and other data. So, if your calculator is now slowly counting its way up to 1000, skip the rest of this before you do something really stupid. And now, the fun part. Remember those AUX commands way back in Chapter 2? Well, now they are coming back to haunt you. By having these commands, you are now able to write your very own encryption and decryption algorithms! The following is the ADK - or Algorithm Development Kit - which is basically a set of rules you have to follow to create your own algorithms. First off, your program must be named AUXENC1, AUXENC2, or AUXENC3. These program names fit into Auxiliary slots 1, 2, and 3 respectively. Next, the encryption bit. This bit is defined in List 2(1). If L2(1) is 0, then the user has selected encryption, and if L2(1) is 1, then they have selected decryption. Use this to send the program to the appropriate areas depending on the mode. All regular encryption programs should also be able to decrypt data. The data set you are working with is stored in List 1, and the data is all integers between 1 and 52. You may manipulate it in any way you want, except that at the end of your program all of the entries must be integers between 1 and 52. To facilitate decryption all of your manipulations to this data set must be able to be reversed. Finally, you can store your own codes in lists 4 through 6, but you can also use the ENCPROSB numbering system. List 3 contains the 4 control numbers; the first three are from 1 to 52, the fourth is either 3, 5, or 7. You may use these numbers however you wish. You may not write in [A], but you may write in any of the other matrices. Or, you can use the 80 code numbers in [A] to create an even larger algorithm. You should have a counter that goes up as the characters are encrypted, in this design on the screen (you should use ClrHome first): YOUR ALGORITHMvX BY YOUR NAME EN/DECRYPTING - ## (your counter display) Your algorithm must not use the Stop command, but it can use Return. Aside from that, it's all up to you. Good luck.