Cloak2 Quick Start

Ritter Software Engineering
2609 Choctaw Trail, Austin, Texas 78745
(512) 892-0494 ritter@io.com


Contents


Installing Cloak2 in DOS

  1. Copy one of the Cloak2 versions (typically CLOAK2.EXE, the Advanced version) into one of the program directories in your DOS command "path". To see your path, just type "set" -- plus enter -- at the DOS prompt, and look for "PATH".

    Alternately, use the DOS "md" command to create a new subdirectory such as "clo2" and copy the program there. Then use the DOS "cd" command to move to that directory whenever you use the program. You can use the program from any directory by adding the cloak2 subdirectory (e.g., ";C:\CLO2") to your command path, which is normally set in AUTOEXEC.BAT.

  2. Check out the internal help panels: Just enter the name of the program (plus return). When the program starts without command-line parameters, it offers an option to enter the help system. Almost all needed information is available in help. Then exit the program.

  3. Suppose you have advanced CLOAK2 and a file named FILE.TXT; to encipher the contents of FILE.TXT into a new file FILE.CLO, enter:
           cloak2  file.txt  file.clo  /e
             ^        ^         ^       ^ encipher
             |        |      resulting file
             |      source file
         program name
    
    CLOAK2 will announce itself, then ask for the User Key, twice. The User Key can be any sequence of characters, but a long unique text phrase is easier to remember than random characters. After getting the key, a 30K file should finish in a second or two. The result is a file of random-like binary data.

  4. Decipher FILE.CLO to FILE.RES:
           cloak2  file.clo  *.res  /d
             ^        ^         ^    ^ decipher
             |        |      resulting file (FILE.RES)
             |      source file
         program name
    
    Cloak2 will again ask for the User Key twice, and this must be exactly the same key as was used to encipher the file. (An advanced Cloak2 alias file makes using keys much easier.)


Alias Files (Advanced Version)

An alias file holds a list of hidden keys. A particular hidden key can be selected from the list by using an "alias" or "nickname." The alias file is enciphered to protect the hidden keys, but each particular alias need not be secret. This means that we need only remember the one secret key for the alias file instead of remembering a different secret key for each person.

  1. Create a new alias key:
         cloak2  newfred.trn  /a fred  /g
    
    Here Mary creates a new key to Fred: "fred" is the local alias tag she will use to access the new key. "newfred.trn" is the name Mary gives the file she will later send to Fred (she has already erased any file of that name). Cloak2 will generate a random key for alias "fred" and automatically place it at the start of Mary's closest existing alias file, or will create a new alias file in the current directory.

    Mary will be asked to enter the key for her alias file twice; this is the most-used and most-important key she will have, and should be a long unique phrase which she can remember and keep secret.

    Cloak2 will also place the same new random key in NEWFRED.TRN (the transport file) and Mary will enter "mary" as the far-end tag; this is the alias Fred will use for the new key, once he installs it in his own alias file. Mary will also enter another phrase (the transport key) twice, to protect NEWFRED.TRN until it gets to Fred.

  2. Encipher or decipher using an alias key:
         cloak2  file.txt  *.clo  /e  /a fred
    
    Now Mary only needs to enter a key once: the key for the alias file. The actual encipher key is found automatically in the alias file under alias "fred". Decipher uses the same alias, the same way (with /d).

  3. Transport the key to the far end: Mary copies the transport file onto a floppy and sends it through the postal mail, or gives it to a friend to deliver. She could also use an express delivery service, or just hand the disk to Fred the next time she sees him.

  4. Add a transported key to your alias file (not in the Corporate version): Fred needs both the transport file and the transport key; then he can decipher the transport file, immediately re-encipher it under his own alias key, and place the result at the start of his alias file:
         cloak2  newfred.trn  /d
               (one-filename decipher; Fred enters the transport key)
         cloak2  newfred.trn  /e
               (one-filename encipher; Fred enters his own alias-file key)
         copy  /b  cloak2.mgt  clo2mgt.old
         copy  /b  newfred.trn+clo2mgt.old  cloak2.mgt
    
    We assume that Fred is in his alias directory (which is usually the Cloak2 directory) and so will have direct access to his alias file. Fred could have several alias files, and the last two commands could be modified and repeated for each file where the new alias is needed.


Installing Cloak2 in Microsoft Windows

  1. Copy the Cloak2 program to your hard drive. First create an appropriate directory, such as CLO2, using File Manager, double-clicking on root (typically "c:\") and using the File, Create Directory selections. Then copy CLOAK2.EXE and CLOAK2.PIF from the distribution floppy to that directory, using the File Manager selection File, Copy.

  2. Create a new program item under Program Manager, and connect it to an icon. Use Program Manager to open the Accessories group and use File, New to create a new Program Item. Enter the Description "Cloak2 Cipher" and set Command Line as the full path to the program (e.g., "c:\clo2\cloak2.exe"). Set Working Directory to where you want files without full paths to end up (e.g., "c:\clo2"). (Your alias file will also normally be in that working directory.) Enter "c" for Shortcut Key (which becomes Ctrl+Alt+C), and check Run Minimized. Use Change Icon and select the safe icon, if desired.

  3. If you do not have CLOAK2.PIF, construct it!

    Use the PIF Editor (in Program Manager group Main) selections File, New to start a new definition. Then set Program Filename as the complete path to Cloak2 (e.g., "c:\clo2\cloak2.exe"). Optional Parameters and Start-up Directory should be empty. Video Memory should be "Text". Memory Requirements for KB Required should be "200"; KB Desired should be "320"; for both EMS and XMS memory, KB Required and KB Limit should be "0". Display Usage should be "Windowed", Close Window on Exit checked, and neither Background nor Exclusive Execution need be checked.

    Of the Advanced Options, Uses High Memory Area need not be checked, but Emulate Text Mode should be. Then use the PIF Editor selections File, Save As to save the new file as CLOAK2.PIF, in the same directory as Cloak2 (e.g., "c:\clo2\cloak2.pif").

    The "PIF" file tells Windows how to set up the DOS window when Cloak2 is invoked.

  4. Now Cloak2 can be started by double-clicking on the selected icon in the Accessories group, and then activated when desired with Ctrl-Alt-C, or Ctrl-Esc and Switch To.


Using Cloak2 in Microsoft Windows

  1. Cloak2 can be started by double-clicking on its icon (probably the safe in the Accessories group), or by double-clicking on CLOAK2.EXE in File Manager. Cloak2 will lurk in the background waiting for interactive command-line parameters.

  2. When desired, bring up the waiting Cloak2 (use Ctrl-Alt-C or Ctrl-Esc and Switch To). Normally, Cloak2 waits in the interaction menu where there are three options: "h" to enter the help system, "e" to "Enter new command line parameters", and "q" to end the program. If you enter a command line, Cloak2 will execute it and then return for another.

  3. When done using Cloak2, type "q" to quit. The window should close automatically and remove Cloak2 from memory.

To Encipher a file with Cloak2 open up Cloak2 (use Ctrl-Esc, Switch To), select "Enter" and enter an encipher command (for example, "/e c:\email\john01.ltr"). You will be asked to enter a User Key, twice, and then Cloak2 will encipher that file.

If you have Advanced Cloak2, it is better to establish an alias file to hold your keys. You can use public alias tags to select any of the keys, and you need only enter the one key for the alias file, once. A typical command would be: "/e c:\email\john01.ltr /a johnj" after you establish a key for "johnj".

To Decipher a file with Cloak2 open up Cloak2 (use Ctrl-Esc, Switch To), select "Enter" and enter a decipher command (for example, "/d c:\email\fred1.msg"). You will be asked to enter a User Key, twice, and then Cloak2 will decipher that file.

Again, if you have Advanced Cloak2, it is better to establish an alias file for your keys. Then "/d c:\email\fred1.msg /a fredw" will select the key for "fredw".


Terry Ritter, his current address, and his top page.

Last updated: 1995-12-14