Sunteți pe pagina 1din 3

Puzzle v2.0 Plugin for Total Commander e-mail: <BACRSOFT@mail.ru> forum: www.ghisler.com-BACRSOFT The program is freeware.

You can to disassemble the plugin, but modifications are prohibited. Hardware and Software: TotalCommander Version 6.53 or higher CPU 80386 or higher NT-compatible OS (NT\W2K\XP\Vista\7) RAM 10MB

1.Introduction -------------General purpose of the program is creation crypted archives, operations with which available under Your user's account only. Compression as additional possibility. User don't type any passwords. Key for encryption and decryption is key-file any size and content. Procedure for creation or definition key-file executes only once for each your extension. In process of working, access to the key-file and session key choice occur imperceptible for users and looks like simple archiver. 2.Features ---------- Don't need to invent, to keep in mind and to type password - Cryptosystem AES128 - Key takes by automation from special key-file, which makes YOU - Plugin includes embedded key-file generator - Key-file can have size up to 2^29 bytes - Archive size may be up to 4G - Time\date stamp archive creation distorts deliberately - Can be more than 1 Keyfile (one per extension) - Extraction ,packing, testing and deleting archive contents - Built-in LZW-compressor V1.3+ - Built-in key-file generator adds CRC32 for diagnostics purposes - You can to control LZW-compressor's behavior - Number characters for extensions and key-file names can be up to 8 V2.0+ - Unicode support - Multithreading(2 core) - Session key size now 512 bits (128+384) - Placement key-files and puzzle.ini based on %AppData% variable 3. How to install ----------------Before installation be sure that TotalCommander folder and wincmd.ini are writeable. a) Unpack Puzzle.wcx to any convenient location on your hard drive, for example to folder with other plugins - C:\Program Files\Total Commander\Plugins\wcx\Puzzle\Puzzle.wcx. b) Invent extension for your archives(ABB as example). c) Attach the plugin like usual archiver. For that in dialog "Cofigure packer extension WCX's" in edit control for extensions type your own("ABB"). Via button "Browse" we are searching our Puzzle.wcx, then press "OK". d) Create the key-file. For call function, that generate key-file, we must to get into plugin's dialogue. For that we are select any file or folder on TC panels, then press Alt-F5. You see the dialogue "Pack files", in which us interest the drop-down list external archivers. Choose our

extension(ABB) and press "Configure". Will appear the dialogue window of the plugin, in which choose the tab "MakeKey". The Point "1" - fill the field of edit control by our extension(ABB). The Button "2" - a choice of any file as the source of "white noise". Recommend to choose a archive files, since they the most close to "white noise". If error in the making key did not appear, that You see MessageBox with path to the file-key. e) Plugin is ready to work. The additional options is described in point 5. f) If You plan to communicate crypted archives with anyone, You should send him copy of Your file-key(ABB.key-in our example), using diskette, CD\DVD-disk, or Flash-disk. Your corresponder executes the points a) and c) for that- exten sion (ABB). Instead of point d) he simply copies your file-key near to Puzzle.wcx or to folder %AppData%\TCPuzzle. Now You may communicate through network, for instance. g) As key-file you may take any file, then in this case in process of the installation point d) is changed on simple copying with renaming of Your file-key near to Puzzle.wcx or to folder %AppData%\TCPuzzle. 4.Additional information -----------------------Usually password is string of chars from user. For provision of good stability to hack, the string must be long enough, not to be dictionary's and as far as possible contain chars from full charset range. Creation of such string possible to entrust on machine, however remember such abracadabra can not each. The difficulties with keep in mind and entering the password can spur the user to abandon cryptooperations. Below is described method, which saves the user from above mentioned problems without reduction quality of crypt. Password location is file. We shall mark such file as key-file. Imaging that key-file is a book with a lot of characters. Opening the book(key-file) at random and poking a one's finger to text on any page, we are hiting at some char. The char and some next chars will a password(session key)for the session. On next session we are probably hit to another chars(other session key). Thus every time when is created archive, session key will change, that must to dificult cryptoanalysis. We must notice, that key-file is not necessarily a text file, quite the contrary it must be chaotic and binary. Deleting or adding of the files from\to archive changes time stamp, indicating the making the file-archive.Also is executed reencrypting whole archive with new session key. The session key is chosen from key-file on random law. The accident is used and at shift of the time mark within aproximately halfyear back. The mode of the encryption is CFB. The initialization Vector takes also from file-key and has a length 128 bits. The realization is an approximation to disposable key, when under each new session is chosen new session key. Probability of the repetition of the concrete session key depends from size of the file-key. The built-in generator of the file-keys gives the result by size not more than 4096(1000h) bytes. This value is chosen from consideration more full use cluster on NTFS system. Built-in key-file generator adds checking information to file-key in the manner of CRC32. "Keys" tab will inform the user by green mark about good checking the key-file by CRC32. The question mark of the red colour will appear beside filename-key, created by previous versions, generated by other way or damaged. On the tab also present information about size of the key and its location. Inside of the plugin's body is located key-file with extension 'SAS' for demonstration purposes. Not trouble if beside You already occupied this extension, since external file-keys more priority.

Options for control of the LZW-compressor behaviour. You may its disable for speedup of the process when files already are archived (jpg,avi,rar,...). The files of the big size in most cases are already compressed so user can assign the threshold of the size of the file, above which the plugin will not try to compress, but will go immediately to encrypton. The previous versions of the plugin use the 'Press always' property that is default. If options are changed they will are remembered in file 'Puzzle.ini. 5.Difference from previous versions ----------------------------------In the version archive format is changed for: - an use resource multicore processors - an increase size of session keys - UNICODE charset The archives created previous versions(1.2-1.31), compatible with the version 2.0 on reading and deleting. The Pack function in this case inaccessibl e. Now the plugin creates the archives in coding UNICODE only. If you use the version TC 6.53-7.04a, that transformations to\from ANSI will are executed automatically. The size of the session key equals 128+384 bit. The parameters AES cryptosystem remained former(nk=4, nb=4, nr=10), but additional 384 bits takes from key-file and by XOR operation influence upon expanded key. The operating systems Vista and 7 have technology UAC, which forbids write to some branch of the file system and registry. For this reason file-keys and configure file are saved in %AppData%\TCPuzzle folder. Each user's account has varies value for system variable %AppData%. This are provided protection of the file-keys from other users. However if you want that all users could have an access to Your file-key, then move(!) them to plugin's folder. When plugin executes search for the key-files and configure file the first viewed place is folder %AppData%\TCPuzzle, then plugin's folder and finally plugin's body. "KeysInfo" tab in field Placement unseals the way to folder of each key-file. All operations with archive use the buffer in RAM. The user can assign the RAM size, which will is used under buffer. The size of the buffer is indicated on tab "Rules" in megabytes and influences upon power. The "Cancel" button on progress window canceled current operation so that at operation of the creation, adding and deleting in archive will remain completely processed files at the time of striking the button. Rest contents of the archive will inaccessible. 6.Important! -----------Cryptoalgoritm RIJNDAEL(AES) pertains to symmetrical cryptosystems, for which essential defect is a problem of the key's distribution. Thence follows that to send the file-key open through network it is impossible! Problem safe transmission of the key through network the plugin does not solve so Dear User - be attentive! At loss of the file-key to read contents of the archive practically impossible so keep the copies of the key-files and the plugin on withdrawable carrier from different producers as minimum in two copys. (C) 2007-2010 BACRSOFT

S-ar putea să vă placă și