<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://gunkies.org/index.php?action=history&amp;feed=atom&amp;title=32v_1m_crypt</id>
		<title>32v 1m crypt - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://gunkies.org/index.php?action=history&amp;feed=atom&amp;title=32v_1m_crypt"/>
		<link rel="alternate" type="text/html" href="https://gunkies.org/w/index.php?title=32v_1m_crypt&amp;action=history"/>
		<updated>2026-05-12T19:29:48Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.30.1</generator>

	<entry>
		<id>https://gunkies.org/w/index.php?title=32v_1m_crypt&amp;diff=6947&amp;oldid=prev</id>
		<title>Neozeed: New page: CRYPT(1)            UNIX Programmer's Manual             CRYPT(1)    == NAME ==      crypt - encode/decode  == SYNOPSIS ==      crypt [ password ]  == DESCRIPTION ==      _C_r_y_p_t reads ...</title>
		<link rel="alternate" type="text/html" href="https://gunkies.org/w/index.php?title=32v_1m_crypt&amp;diff=6947&amp;oldid=prev"/>
				<updated>2009-10-26T13:37:17Z</updated>
		
		<summary type="html">&lt;p&gt;New page: CRYPT(1)            UNIX Programmer&amp;#039;s Manual             CRYPT(1)    == NAME ==      crypt - encode/decode  == SYNOPSIS ==      crypt [ password ]  == DESCRIPTION ==      _C_r_y_p_t reads ...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;CRYPT(1)            UNIX Programmer's Manual             CRYPT(1)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NAME ==&lt;br /&gt;
     crypt - encode/decode&lt;br /&gt;
&lt;br /&gt;
== SYNOPSIS ==&lt;br /&gt;
     crypt [ password ]&lt;br /&gt;
&lt;br /&gt;
== DESCRIPTION ==&lt;br /&gt;
     _C_r_y_p_t reads from the standard input and writes on the stan-&lt;br /&gt;
     dard output.  The _p_a_s_s_w_o_r_d is a key that selects a particu-&lt;br /&gt;
     lar transformation.  If no _p_a_s_s_w_o_r_d is given, _c_r_y_p_t demands&lt;br /&gt;
     a key from the terminal and turns off printing while the key&lt;br /&gt;
     is being typed in.  _C_r_y_p_t encrypts and decrypts with the&lt;br /&gt;
     same key:&lt;br /&gt;
&lt;br /&gt;
          crypt key &amp;lt;clear &amp;gt;cypher&lt;br /&gt;
          crypt key &amp;lt;cypher | pr&lt;br /&gt;
&lt;br /&gt;
     will print the clear.&lt;br /&gt;
&lt;br /&gt;
     Files encrypted by _c_r_y_p_t are compatible with those treated&lt;br /&gt;
     by the editor _e_d in encryption mode.&lt;br /&gt;
&lt;br /&gt;
     The security of encrypted files depends on three factors:&lt;br /&gt;
     the fundamental method must be hard to solve; direct search&lt;br /&gt;
     of the key space must be infeasible; `sneak paths' by which&lt;br /&gt;
     keys or cleartext can become visible must be minimized.&lt;br /&gt;
&lt;br /&gt;
     _C_r_y_p_t implements a one-rotor machine designed along the&lt;br /&gt;
     lines of the German Enigma, but with a 256-element rotor.&lt;br /&gt;
     Methods of attack on such machines are known, but not&lt;br /&gt;
     widely; moreover the amount of work required is likely to be&lt;br /&gt;
     large.&lt;br /&gt;
&lt;br /&gt;
     The transformation of a key into the internal settings of&lt;br /&gt;
     the machine is deliberately designed to be expensive, i.e.&lt;br /&gt;
     to take a substantial fraction of a second to compute.  How-&lt;br /&gt;
     ever, if keys are restricted to (say) three lower-case&lt;br /&gt;
     letters, then encrypted files can be read by expending only&lt;br /&gt;
     a substantial fraction of five minutes of machine time.&lt;br /&gt;
&lt;br /&gt;
     Since the key is an argument to the _c_r_y_p_t command, it is&lt;br /&gt;
     potentially visible to users executing _p_s(1) or a deriva-&lt;br /&gt;
     tive.  To minimize this possibility, _c_r_y_p_t takes care to&lt;br /&gt;
     destroy any record of the key immediately upon entry.  No&lt;br /&gt;
     doubt the choice of keys and key security are the most&lt;br /&gt;
     vulnerable aspect of _c_r_y_p_t.&lt;br /&gt;
&lt;br /&gt;
== FILES ==&lt;br /&gt;
     /dev/tty for typed key&lt;br /&gt;
&lt;br /&gt;
== SEE ALSO ==&lt;br /&gt;
     [[32v 1m ed|ed(1)]], [[32v 8m makekey|makekey(8)]]&lt;br /&gt;
&lt;br /&gt;
== BUGS ==&lt;br /&gt;
     There is no warranty of merchantability nor any warranty of&lt;br /&gt;
     fitness for a particular purpose nor any other warranty,&lt;br /&gt;
     either express or implied, as to the accuracy of the&lt;br /&gt;
     enclosed materials or as to their suitability for any par-&lt;br /&gt;
     ticular purpose.  Accordingly, Bell Telephone Laboratories&lt;br /&gt;
     assumes no responsibility for their use by the recipient.&lt;br /&gt;
     Further, Bell Laboratories assumes no obligation to furnish&lt;br /&gt;
     any assistance of any kind whatsoever, or to furnish any&lt;br /&gt;
     additional information or documentation.&lt;br /&gt;
&lt;br /&gt;
[[Category:32v man section 1]]&lt;/div&gt;</summary>
		<author><name>Neozeed</name></author>	</entry>

	</feed>