From 8c1d39d0e0619648047b6087733590af2e82c550 Mon Sep 17 00:00:00 2001 From: Mirek Kratochvil Date: Mon, 10 Mar 2014 15:44:09 +0100 Subject: [PATCH] version bump to 1.5 --- ChangeLog | 6 ++++++ README.md | 9 +++++++++ configure.ac | 2 +- man/ccr.1 | 15 +++++++++++---- 4 files changed, 27 insertions(+), 5 deletions(-) diff --git a/ChangeLog b/ChangeLog index fb8476e..07bdeca 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,6 +1,12 @@ Codecrypt ChangeLog +1.5 + +- add hashfile support with -S +- gf2m log/antilog saving, and several other speedups +- switched to icase matching for key names + 1.4.1 - compile on windows diff --git a/README.md b/README.md index 9d33b0a..83cbaa2 100644 --- a/README.md +++ b/README.md @@ -56,6 +56,12 @@ margin. Let's play with random data! #and delete pukeys of everyone who's Unfriendly ccr -x Unfri + #create hashfile from a large file + ccr -sS hashfile.ccr < big_data.iso + + #verify the hashfile + ccr -vS hashfile.ccr < the_same_big_data.iso + ## Option reference For completeness I add listing of all options here (also available from @@ -85,6 +91,9 @@ For completeness I add listing of all options here (also available from -u, --user use specified secret key -C, --clearsign work with cleartext signatures -b, --detach-sign specify file with detached signature + -S, --symmetric enable symmetric mode of operation where encryption + is done using symmetric cipher and signatures are + hashes, and specify a filename of symmetric key or hashes Key management: -g, --gen-key generate specified keypair, `help' lists algorithms diff --git a/configure.ac b/configure.ac index 6654b52..18da396 100644 --- a/configure.ac +++ b/configure.ac @@ -1,6 +1,6 @@ AC_PREREQ(2.6) -AC_INIT([codecrypt], [1.4.1]) +AC_INIT([codecrypt], [1.5]) AC_CONFIG_AUX_DIR(.) # because of libtoolize AC_CONFIG_MACRO_DIR([m4]) diff --git a/man/ccr.1 b/man/ccr.1 index e09e269..6b30c66 100644 --- a/man/ccr.1 +++ b/man/ccr.1 @@ -111,9 +111,10 @@ verify if the contents of input was changed. Purpose of the \fB\-\-symmetric\fR option is that symmetric cryptography is a lot faster than asymmetric, and symmetric primitives usually work also on very -large files and data streams. If working with a large file, process it -symetrically, then process the \fIfile\fR asymetrically and send it along with -the large file. +large files and data streams, as they don't need to be fully copied into +allocated memory for this purpose. Thus, if working with a large file, process +it symetrically first, then process the resulting small \fIfile\fR +asymetrically and send it along with the large file. .SS Key management: @@ -267,7 +268,7 @@ the message format and code clarity, whole input files and messages are usually loaded into memory before getting signed/encrypted. Fixing the problem requires some deep structural changes in Codecrypt, but you can easily workaround the whole problem using symmetric ciphers (for encryption of large files) or -hashfiles (for signatures of large files). +hashfiles (for signatures of large files). See the \fB\-\-symmetric\fR option. FMTSeq signatures are constructed from one-time signature scheme, for this reason the private key changes after each signature, basically by increasing @@ -332,6 +333,12 @@ ccr -m Frank -N "Unfriendly Frank" #and delete pukeys of everyone who's Unfriendly ccr -x Unfri + +#create hashfile from a large file +ccr -sS hashfile.ccr < big_data.iso + +#verify the hashfile +ccr -vS hashfile.ccr < the_same_big_data.iso .fi .SH DISCLAIMER