亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? manual.txt

?? 加密算法實現 Pegwit is a program for performing public key file encryption and authentication. Encr
?? TXT
字號:
Pegwit v8 manual
================

Introduction
============

Pegwit is a program for performing public key file encryption
and authentication.

Encryption means that pegwit allows you to keep the information
in files you send by email (or other means) confidential.
Eavesdroppers will not be able to read the email.

Authentication allows you to check that a file has not been
tampered with (changed) since it was signed.

Installation
============
There is no installation process - all you need is an
executable, e.g. pegwit.exe. Pegwit is a 'command line'
program - if you are using Windows 95 you first need
to start a DOS shell. Running pegwit with no parameters
will cause a brief summary of the command syntax to be
output.

The summary reads:

Pegwit v8.x
Usage (init/encrypt/decrypt/sign/verify) :
-i <secret-key >public-key
-e public-key plain cipher <random-junk
-d cipher plain <secret-key
-s plain <secret-key >signature
-v public-key plain <signature
-E plain cipher <key
-D cipher plain <key
-S plain <secret-key >clearsigned-text
-V public-key clearsigned-text
-f[operation] [type pegwit -f for details]


This summary is also output if you supply the wrong
number of parameters, or if the first parameter is not
correct. Note that -E,-D,-S,-V are distinct from -e,-d,-s,-v.

The '<' and '>' characters indicate where pegwit
requires standard input, and where it generates
standard output.

Choosing a secret key
=====================
To start with you need decide on a secret key. Your secret
key needs to be unguessable by a cracking program even with
a very large number of attempts. For the purpose of this
manual, the secret key "hello there" (plus a newline) will
be used. Obviously "hello there" is a rotten choice for a
secret key, it is far too easy to guess. You should use a
much better key than this.

Note that pegwit (unlike for instance PGP) does not generate
secret random keys internally - the secret key is *not* just
a pass phrase which protects a stored key. Your secret key
should be at least 10 characters, and more if the characters
are not random (for example words), or if you might be up
against a determined snooper with considerable computing
resources.

Pegwit reads secret values from standard input.
If standard input is not redirected, you will need to
terminate input by using CTRL-Z (this may vary on different
operating systems). After using your secret key, you should 
clear the screen, for example by using the cls clear screen 
command (on DOS/Win95) or by entering several blank lines.

Creating your public key
========================
Your public key is created using the pegwit -i command.
For example, at a command prompt, try:

pegwit -i > my.pub
hello there
CTRL-Z

Now inspect the file my.pub (e.g. type my.pub)
It should contain the text

pegwit v8 public key =cc23ea8bc28aac71ee19befcb2beba4b349cbdc020965e2411d48f6dfa
28f4fd

Encryption
==========
To encrypt a file, you need a public key. Normally this will
not be your own public key, but for example the public key
of a friend who you are emailing a confidential file.

There are many possible ways you could obtain this, but
it is important to guard against forgery, that is a
public key which claims to be for your friend, but
actually is generated by someone who wishes to snoop
on your mail.

If in doubt ( when there is a lot at stake ) check the public
key by making telephone call. This should be good enough for
most purposes, provided you can recognise your friend over
the telephone. If possible, check using multiple methods and
sources.

There are also more sophisticated ways of checking, using
digital signatures of trusted third parties.

For the moment though, create a text file which contains the
text (say) 'I love you', and try

pegwit -e my.pub test.txt text.tx0
any old random junk
CTRL-Z

Notice that pegwit reads some random input as well as
a public key. The reason is that pegwit does not have
access to good random numbers (for portability reasons).
The junk you type does not have to be different on every
occasion, but must be unguessable by an adversary.
An attacker needs to guess the junk, the time of encryption
and the entire contents of the file being encrypted for a
successful 'crack'. [ He may make a very large number of
guesses, using a 'cracking' program, possibly aided by
well-educated human guesses ]. Alternatively he can
guess (or steal) the private key of your friend.

Decryption
==========
To decrypt a file, you use your secret key, for example
pegwit -d test.tx0 test.chk
hello there
CTRL-Z

The contents of test.chk should now be be identical
to the contents of test.txt.

Signing a file
==============
To sign a file, you use your secret key. This means that
nobody else can forge your signatures.

For example try

pegwit -s test.txt >test.sig
hello there
CTRL-Z

Verifying a signature
=====================
To verify a signature, you use the public key of the signer.
As for encryption (the other public key operation) you need
to be sure the public key is not a forgery.

For example try

pegwit -v my.pub test.txt <test.sig

Pegwit should just return quietly (this means the signature is OK).

Now make a small modification to test.txt, and try again.
Now pegwit should output 'signature did not verify'

Utilities
=========
If you are using Win95, pwkey and pwjunk are simple
utilities intended to be used for entering secret keys 
and random junk. 

pwkey has the advantage that keys are not echoed to the
screen, for example use

pwkey | pegwit -s test.txt >test.sig

pwjunk uses key timings to increase the randomness of 
the output.

For example, you can use
pwjunk | pegwit -e my.pub test.txt test.tx0

pwjunk estimates how much 'randomness' has been
generated, and does not allow input to be terminated
until the estimate reachs 128 bits.

More security considerations ( getting paranoid )
=================================================
You should not use your secret key on a computer to
which an enemy may have had access, either physically
or remotely via modems, networks, viruses etc. In practice
this is a risk you may have to live with. You may choose
to have several secret keys, using the highest grade secret
key only under the most secure conditions. There is no
substitute for keeping the computer(s) you use physically
secure.

Symmetric encryption
====================
-E and -D can be used for conventional (non public-key) encryption. 
These commands are slightly faster, and the encrypted file is 32 bytes 
smaller. 

-E can be useful for distributing a large file to several people.
Use pegwit -s to generate a signature for the large file, then 
use -E to encrypt the file using the signature as the key. 
The encrypted large file can now be put in a public FTP area.
Now send the signature to each person, encrypted with their public key. 

Note that keys have to be larger to achieve the same level of 
security as -e, so the use of -E is not recommended for keys 
which are entered manually.

Signing text files
==================
When using pegwit with email and usenet, the -S and -V commands
may be more convenient. -S reads the input file as text lines,
and outputs text with delimiters and the signature appended to
the text.

Filtering and ascii armoring of encrypted files
===============================================
pegwit -fX where X is a normal command gives a set of
commands which act as filters. In addition, encrypted
output is converted to ascii, and encrypted input is
also expected to be in ascii form. Secret values are
read from a file, rather than standard input.

The manual for the -f variants is output when pegwit 
is run with just -f, and is as follows:

Pegwit v8.x [filter sub-mode]
Usage (encrypt/decrypt/sign/verify) :
-fe public-key random-junk <plain >ascii-cipher
-fd secret-key <ascii-cipher >plain
-fE key <plain >ascii-cipher
-fD key <ascii-cipher >plain
-fS secret-key <plain >clearsigned-text
-fV public-key <clearsigned-text >plain

Note that 'plain' files read from standard input
should not be binary ( this also applies to 
the -S command ), although on some UNIX-like systems
binary files may work OK (but the result will not
be portable, especially to Windows/MSDOS, due to
CR/LF translation ).

George Barwood

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产欧美日韩中文久久| 日韩欧美激情四射| 亚洲视频一区二区在线| 成人app软件下载大全免费| 中文字幕一区二| 91在线码无精品| 人禽交欧美网站| 国产精品欧美一区喷水| 欧美肥妇bbw| 91亚洲精品乱码久久久久久蜜桃 | 精品美女被调教视频大全网站| 国产一区美女在线| 亚洲精品水蜜桃| 精品久久久久久久久久久久包黑料 | 色欧美88888久久久久久影院| 午夜精品123| 中文字幕第一页久久| 在线播放国产精品二区一二区四区| 午夜精品免费在线| 婷婷丁香激情综合| 精品在线播放免费| 国产成人在线视频网址| 亚洲色图欧美在线| 午夜欧美电影在线观看| 久久成人免费日本黄色| 亚洲一区二区精品3399| 国产精品不卡一区| 久久这里只有精品6| 91精品国产综合久久精品app | 亚洲男同1069视频| 国产色婷婷亚洲99精品小说| 777午夜精品免费视频| 777午夜精品免费视频| 欧美电影免费观看高清完整版| 久久久久久夜精品精品免费| 日韩一区二区在线看| 56国语精品自产拍在线观看| 久久亚洲捆绑美女| 亚洲电影一区二区三区| 日本一区二区视频在线| 亚洲大型综合色站| 国产精品乡下勾搭老头1| 蓝色福利精品导航| 99精品视频一区| 精品美女被调教视频大全网站| 国产精品嫩草影院av蜜臀| 日韩主播视频在线| 麻豆精品一区二区av白丝在线| 日韩精品五月天| 成人高清免费观看| 日韩一二在线观看| 亚洲精品成人在线| 粉嫩av亚洲一区二区图片| 成人av电影在线网| 欧美v亚洲v综合ⅴ国产v| 亚洲一区二区在线观看视频| 国产风韵犹存在线视精品| 欧美日韩一区高清| 欧美sm极限捆绑bd| 亚洲成人av资源| 91女人视频在线观看| 国产亚洲1区2区3区| 日韩av高清在线观看| 激情综合色综合久久综合| 国产亚洲美州欧州综合国| 天堂蜜桃一区二区三区| 欧美色涩在线第一页| 国产精品国产精品国产专区不片| 精品亚洲aⅴ乱码一区二区三区| 欧美日韩国产中文| 精品国产一区二区三区四区四 | 97久久精品人人澡人人爽| 久久久国际精品| 国模无码大尺度一区二区三区| 不卡的av电影在线观看| 国产亚洲欧洲997久久综合| 精品一区二区三区香蕉蜜桃| 欧美一区二区三区影视| 日本va欧美va精品| 欧美一级日韩一级| 经典一区二区三区| 久久女同互慰一区二区三区| 国产一区二区视频在线| 精品国产污污免费网站入口| 国产在线视频一区二区| 久久久三级国产网站| 国产精品一区二区三区99| 国产精品理论在线观看| 91丝袜高跟美女视频| 有坂深雪av一区二区精品| 欧美性欧美巨大黑白大战| 国产三级精品三级| eeuss影院一区二区三区| 日韩免费一区二区三区在线播放| 日韩vs国产vs欧美| 久久久精品2019中文字幕之3| 国产成人精品免费视频网站| 亚洲欧美一区二区视频| 欧美性极品少妇| 久久精品久久99精品久久| 国产清纯在线一区二区www| 成人免费观看视频| 久久久亚洲国产美女国产盗摄| 国产精品自拍在线| 亚洲视频在线观看一区| 3atv在线一区二区三区| 国产xxx精品视频大全| 亚洲精品成人天堂一二三| 日韩久久久精品| 91丨九色丨蝌蚪富婆spa| 日韩国产高清在线| 中文字幕在线不卡视频| 欧美日韩国产成人在线91| 国产成人亚洲综合a∨婷婷图片| 亚洲欧美日韩中文字幕一区二区三区 | 国产成人综合网| 亚洲午夜一二三区视频| 久久久综合精品| 欧美日韩精品一区二区三区 | 国产精品美女视频| 91精品国产综合久久精品图片 | 不卡视频一二三| 日本系列欧美系列| 亚洲日本电影在线| 国产欧美一区二区精品忘忧草| 欧美性受极品xxxx喷水| 成人综合婷婷国产精品久久| 视频一区欧美精品| 一区二区三区高清在线| 在线视频你懂得一区二区三区| 亚洲色图在线播放| 久久精品欧美一区二区三区不卡| 欧美日韩日日骚| 99精品久久只有精品| 国产一区二区在线免费观看| 亚洲aⅴ怡春院| 日韩伦理av电影| 国产精品麻豆欧美日韩ww| 日韩一区二区三区电影在线观看| 色天使色偷偷av一区二区| 成人av在线资源网| 国产另类ts人妖一区二区| 免费成人av在线| 视频在线观看91| 性欧美大战久久久久久久久| 亚洲视频资源在线| 亚洲欧美综合色| 日韩一区欧美小说| 国产精品的网站| 国产蜜臀97一区二区三区| 精品粉嫩超白一线天av| 日韩一区二区电影网| 欧美精品亚洲二区| 制服丝袜成人动漫| 欧美精品一卡两卡| 日韩欧美电影在线| 91麻豆精品91久久久久久清纯| 欧美日韩三级在线| 日韩欧美国产一区二区三区 | 中文av字幕一区| 欧美韩国日本不卡| 最新国产成人在线观看| 国产精品成人在线观看| 亚洲欧美精品午睡沙发| 亚洲精品视频在线| 天天综合天天做天天综合| 蜜臀a∨国产成人精品| 另类综合日韩欧美亚洲| 韩国午夜理伦三级不卡影院| 激情综合五月婷婷| 成人国产精品免费网站| 91浏览器入口在线观看| 欧美亚洲尤物久久| 日韩亚洲欧美高清| 欧美韩日一区二区三区四区| 亚洲欧洲一区二区在线播放| 亚洲精品成人a在线观看| 亚洲国产欧美一区二区三区丁香婷| 午夜精彩视频在线观看不卡| 久久99精品国产.久久久久久| 国产成人免费视频精品含羞草妖精| 成人做爰69片免费看网站| 在线观看三级视频欧美| 日韩三级精品电影久久久 | 亚洲一级二级三级在线免费观看| 午夜久久久影院| 国产凹凸在线观看一区二区| 日本精品裸体写真集在线观看 | 丁香天五香天堂综合| 色天天综合色天天久久| 欧美一级欧美三级| 国产精品每日更新在线播放网址| 亚洲你懂的在线视频| 精品午夜一区二区三区在线观看| 成人免费va视频| 欧美一区二区观看视频| 国产精品色哟哟| 麻豆91精品视频| 91国偷自产一区二区开放时间 | 99这里只有精品|