NAME
gcipher - a simple encryption tool
SYNOPSIS
gcipher
gcipher [CIPHEROPTIONS]... [INPUT] [OUTPUT]
gcipher [CIPHEROPTIONS]... -p PROXIEDHOST PROXIEDPORT LISTENINGPORT
CIPHEROPTIONS:
(-c | -C) CIPHER [-k KEY]
"-" may be used for either INPUT or OUTPUT to represent STDIN or STDOUT
respectively.
EXAMPLES
Show the GUI:
gcipher
Encrypt a file using the Gie cipher:
gcipher -c Gie inputfile outputfile
Decrypt STDIN and output to STDOUT using Rot13:
gcipher -C Rot -k 13
Listen on port 1027 and act as a proxy for port 1028 on gnu.org.
Decrypt the data coming from gnu.org and encrypt data going to gnu.org
using Vigenere with key linux:
gcipher -c Vigenere -k linux -p gnu.org 1028 1027
DESCRIPTION
This is a simple encryption tool to work with home-grown encryption
algorithms. It can run as either a GUI, a command-line application, or
a network proxy.
-c CIPHER
encrypt using the given cipher
-C CIPHER
decrypt using the given cipher
-k KEY set the key for the previous cipher
-p PROXIEDHOST PROXIEDPORT LISTENINGPORT
act as a network proxy
CIPHERS
Gie a simple cipher doable by hand; no key is required
Ceasar Julius Ceasar’s code; no key is required
Rot linear rotation; the amount of the rotation is given by the key
which must be a number in the range [0, 25]
Vigenere
a version of ROT that uses a private key; the key must be made
of lower-case letters
FILES
.gcipher/plugins
See plugins/README in a source distribution for more
instructions on creating new plugins.
AUTHOR
Written by Shannon -jj Behrens.
REPORTING BUGS
Report bugs to <jjinux@yahoo.com>.
COPYRIGHT
Copyright © 2003 Shannon -jj Behrens.
This is open source software; see the source for copying conditions.
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE.