Name | Modified | Size | Downloads / Week |
---|---|---|---|
wscacmd.java | 2020-03-18 | 15.8 kB | |
scacmd.java | 2020-03-18 | 118.4 kB | |
Readme.txt | 2020-03-18 | 2.3 kB | |
wscacmd.zip | 2020-03-18 | 98.1 kB | |
Totals: 4 Items | 234.7 kB | 0 |
SCA - Simple Cipher Algorithim Encrypt/Decrypt a binary or text file with a simple GUI or easy to use powerful command line utility. The encrypted file has no specific header information so to a file scanner it looks like a ordinry binary file. **** INSTALL **** Last compiled on 2020/03/18 JDK 11.0.6 1) save wscacmd.zip to hard drive. 2) extract all to folder. 3) goto wscacmd folder 4) double click on wscacmd.jar or run java -jar wscacmd.jar from command line. **** GUI **** java -jar wscacmd.jar Note: Output file writes to the same directory as the input file. The input file remains un-touched. I recomend you name the ciphertext "filename.ext.enc" so you know it's an scacmd encrypted file. For best results, always use the file chooser for the input file, it sets the directory to be correct. **** COMMAND LINE **** Read from Stdin, write to Stdout OR -i <input> -o <output> Encrypt: cat [type] plaintext | java -jar scacmd.jar [-v] -e [-p]<cipher key> [-m] <modifier> [-h] > ciphertext Decrypt: cat [type] ciphertext| java -jar scacmd.jar [-v] -d [-p]<cipher key> [-m] <modifier> [-h] > plaintext -- or -- Decrypt: java -jar scacmd.jar [-v] -d -i <ciphertext> -o <plaintext> [-p]<cipher key> [-m] <modifier> [-h] [-v] Encrypt: java -jar scacmd.jar [-v] -e -i <plaintext> -o <ciphertext> [-p]<cipher key> [-m] <modifier> [-h] [-v] Where -v = version -h = help -p = optional password -m = modifier (second password) If the environmental VAR is set then no <-p password> is requred. Windows: set CIPHERKEY="f00Bar" UNIX/MAC: export CIPHERKEY=f00Bar To unset: unset CIPHERKEY $CIPHERKEY of 6 char or more required. Blair T Simpkins 803-802-7086 wrx@comporium.net 1.0 Aug 27 2014 - initial release. 1.1 Aug 29 2014 - add byte swap logic. 1.2 Nov 3 2014 - add GetOpt logic. 1.3 Nov 3 2014 - add four byte header. 1.4 May 24 2015 - add -e -d options. 1.5 May 31 2015 - add sha256. 1.6 Oct 18 2015 - add cipherkey creep logic. 1.7 Nov 29 2015 - add large arrays. 1.8 Feb 22 2016 - add -i -o options. 1.9 Mar 10 2016 - add block cipher. 2.0 Oct 14 2016 - add enhanced block cipher (even/odd). 2.1 Oct 14 2016 - add -v option.