man gcipher (Commandes) - a simple encryption tool

NAME

gcipher - a simple encryption tool

SYNOPSIS

gcipher

gcipher [CIPHEROPTIONS]... [INPUT] [OUTPUT]

gcipher [CIPHEROPTIONS]... -p PROXIEDHOST PROXIEDPORT LISTENINGPORT

CIPHEROPTIONS:
(-c | -C) CIPHER [-k KEY]

"-" may be used for either INPUT or OUTPUT to represent STDIN or STDOUT respectively.

EXAMPLES

Show the GUI:
gcipher
Encrypt a file using the Gie cipher:
gcipher -c Gie inputfile outputfile
Decrypt STDIN and output to STDOUT using Rot13:
gcipher -C Rot -k 13
Listen on port 1027 and act as a proxy for port 1028 on gnu.org. Decrypt the data coming from gnu.org and encrypt data going to gnu.org using Vigenere with key linux:
gcipher -c Vigenere -k linux -p gnu.org 1028 1027

DESCRIPTION

This is a simple encryption tool to work with home-grown encryption algorithms. It can run as either a GUI, a command-line application, or a network proxy.

-c CIPHER
encrypt using the given cipher
-C CIPHER
decrypt using the given cipher
-k KEY
set the key for the previous cipher
-p PROXIEDHOST PROXIEDPORT LISTENINGPORT
act as a network proxy

CIPHERS

Gie
a simple cipher doable by hand; no key is required
Ceasar
Julius Ceasar's code; no key is required
Rot
linear rotation; the amount of the rotation is given by the key which must be a number in the range [0, 25]
Vigenere
a version of ROT that uses a private key; the key must be made of lower-case letters

FILES

.gcipher/plugins
See plugins/README in a source distribution for more instructions on creating new plugins.

AUTHOR

Written by Shannon -jj Behrens.

REPORTING BUGS

Report bugs to <jjinux@yahoo.com>.

COPYRIGHT

Copyright © 2003 Shannon -jj Behrens.

This is open source software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.