System Control Files
The System Control Files (SCF) comprise the Key Components required in order
to perform encryptions and decryptions of messages or attachments should you
desire to do so.
Overview:
There are three components used in the cryption processes. You do not need to
fully understand what role these play in the application, just which ones are used.
The Key Components 1 are the heart of
the cryption process and Key Components 2 and 3 are the drivers of it. You
will need the same SCF and the same three settings in order to decrypt any data.
There is an option where you can increase the security of your data by using
the expansion feature. This enlarges the size of your data embedding the data
randomly throughout it. In order to have expansion, you Create System and set
the Key Component 3 Keys button to either the Low, Med or High positions. When the cryption
screen comes up while in a message or while decrypting attachments, you can
then set the Use Expansion box to 'Yes'.
In this section we'll go over creating the SCF, copying, restoring and
killing (deleting) the SCF, and the Code Book.
Let's now create a system. To do this, from the main screen, either click on
the top icon on the vertical toolbar, or click on System then Create System.
Create System Screen

The first thing to do is name the new system. Put 'Sys1' in the top input box.
You see the default settings for a system. We recommend never having less than the
default settings in your system. You can increase or decrease the number to your
specifications.
Let's examine each of the setup components in this screen:
Key Component 1
There are three portions. The number to generate, the file prefix and the number
of passes. You can create up to 99 per system. The number of passes is
a tool during the creation process. You do not need to change it from the default
of 1. The prefix is the start of the actual file that will be written followed
by the current number. If three Key Component 1 files were generated and with the prefix
of 'Em' we'd have a Em01, Em02 and Em03 file written. The prefix cannot
exceed six characters and cannot begin with a number.
Key Component 2
Only
the number to generate appears for the Key Component 2.
Key Component 3 - Text
The Key Component 3 has three parts. The number to generate, the Style type
and the type of Keys used. The Style can be set to Low, Med or High.
You change it by clicking on the button. You don't have to change this one; Low
settings are just fine.
The Keys can be None, Low, Med or High. The significance of the Keys type is
it will expand the size of your data by embedding it in a sea of data, unless
the type is 'None'. Low, Med and High types will produce expansion data
correspondingly to their type. A low expansion on the average is about eight
times the original size of the data. Med and especially High settings can
create extremely large file sizes, depending on the size of your data.
Key Component 3 - Binary
This is identical to the above Key Component 3 description except that it will
be used with the Binary (256 character) processing.
Considerations:
There are text (94 characters) and binary (all 256 characters) data modes.
The text mode is used for encrypting and decrypting messages. The
binary mode is used for encrypting and decrypting attachments. Binary is the
stronger of the two in regard to brute force attacks on your encrypted data.
Clicking on the Reset button will return the values to the defaults.
When you click on the Create button, the system will be created and you will
return to the main screen.
You cannot create a new system when one is in place. You'll need to transfer
the current system (if you haven't already) to another location and Kill the
system (Kill System option) before you can create a new one.
Copying Systems
You will need a backup of your SCF. You will to distribute your SCF to the
people you will communicating with. Whether to a floppy diskette or a network
drive you'll need to copy the SCF. Click on System then Copy System or
on the vertical Copy System Icon to bring up the copy screen. The
screen contains a standard drive and subdirectory box to select where to put
the SCF. There are also check boxes whether to include the Address Book and
the Code Book as well. Click on the Copy button when the proper path for
the copy is displayed. Click on Exit to abort. You'll be returned to
the main screen after the copy has occurred.
Restoring Systems
You may need to change systems from time to time. Or you received a system
disk from someone you'll be communicating with. Click on System then Restore
System or on the Restore System icon on the vertical toolbar. Restoring the
SCF is done exactly the same way as transferring them. You'll select the path
from where the SCF currently reside, then click on the Restore button. If the
Address Book and/or Code Book were transferred, you'll be notified of it and
given the choice of whether to restore them or not. In most cases you probably
would. You'll be returned to the main screen after the restore has taken
place.
Killing Systems
This deletes and completely removes the SCF from the computer. This must be done
before you can create a new system. We recommend not leaving the SCF on the
computer while you are away either. Click on System then Kill System or the
Kill System icon on the vertical toolbar. This is no screen associated with
the Kill System process, but you will have message boxes where you select 'Yes'
or 'No'. You will see a warning regarding transferring the current system. Make
sure you have transferred the system before clicking on 'Yes'. If a Code Book
or Address is/are present, you'll be prompted whether to kill them or not. Click
on 'Yes' only if you transferred those as well. Once you have killed your
system, there is no recovery on them possible. Only a restore system option can
bring them back, so be extra sure you have a backup of the current system before
you perform this feature.
The Code Book

The Code Book allows you to predefine the particular Key Components
to a particular person or group without having to continually manually select
them when you encrypt or decrypt data. You'll notice both Text and Binary
Key Component 3 are present. That way, predefined Key Components will be present in
both messages (Text) and attachments (Binary) when used.
To create a new entry: Enter the new name in the top combo box. Select the
Key Component values for that listing. Click
on Save.
To change an entry: Select the entry name you want to change from the top combo
box. Change whichever of the Key Components and then click on Save.
To delete an entry: Select the entry name you want to delete from the top combo
box. Click on Delete.
When you get to the cryption setup screens you can select a Code Book entry and
the corresponding Key Components will be populated automatically.
Return to Help Menu
Copyright © 1998-2002 Data Security Solutions, Inc. All rights reserved.
All registered marks and trademarks mentioned in this site
are the property of their owners.