Archive manager | Entry window to create, open, and manage Spa archive (.spa) files. |
Item manager | Shows a directory tree of items in an archive. |
Item | Window for creation, editing, and display of items in an archive. |
File cryptography | Encrypting and decrypting of files with keys from items in the archive. |
Options | Customizing functionality and display. |
Daisy cryptosystem | Users guide to the Daisy cryptosystem. |
Some screen shots may differ slightly from the current version. The functionality is the same, however.
|
Start the program by double-clicking on the Spa.jar icon.
Read and respond to the disclaimer. A green-bordered
window labelled "Spa (2.x)" with a combination dial
will appear.
This Archive manager window creates and selects
the encrypted archive files. The border is green because access to your archives isn't possible at this point, that is, your data is secure. Red-bordered windows contain sensitive information and you should be alert when they appear. The Tools menu starts the file hash generator (FileHash) or the True Random Password generator (Trap). The Help button provides information and allows setting of options. Windows produced by Spa can be repositioned and resized at your convenience. Each archive item has its own window position and size. Window positions and sizes are remembered by Spa so that a window will have the same position and size as the last time you used it. |
The menu bar of the Archive manager window has three menus: File, Tools, and Help:
Locate the file you'd like to remove in this list and push "Remove" to remove it from the list.
Removing archive files with this command removes them from the File menu, it doesn't actually delete them from your computer. They can always be re-accessed by the "Open" command.
The name of the default archive file is displayed in the Archive manager window title. This file can be accessed by clicking anywhere on the combination lock.
|
After selecting an archive file, a red-bordered
Password window appears for you to enter the password for the
archive file. Pressing the "Done" button or typing "Enter" (or "Return")
in the text field enters the password. This is a timed window
and if you don't work in it it will
disappear, leaving you back in the Archive manager window. If this happens,
try again.
|
If you're accessing a previously-created archive, you'll be asked for its password. If you enter an incorrect password a warning will appear and you'll need to start over. From time to time you may wish to change the password on an existing archive file. To do this, check the "Change on exit" box and continue with the existing password. A new password will be requested when you're done working with the archive.
To allow testing and transitions between cryptographic systems, a special password, *NOCRYPTO*, turns off both encryption and decryption. This is a very risky procedure because the output file is unencrypted and can be read by anyone having access to your machine. Many warning windows appear when this password is in use. To produce an unencrypted archive file, first copy the encrypted file to another file, such as DANGEROUS.spa. Open DANGEROUS.spa with the correct password for the archive, but check the "Change password" box in the Password window. Then quit Spa, changing the password to *NOCRYPTO* on exit. Subsequently, the unencrypted DANGEROUS.spa file may be opened by entering *NOCRYPTO* as the archive password.If you enter the correct password for an archive the Item manager window pops up. It's also red-bordered and timed to prevent visual compromise.
The Item manager window gives the name and path of the archive file as well as the date/time of the last time it was last changed. The Item manager window displays a directory tree having the archive file name as its root. The tree shows individual items and folders in the archive. Tree paths can be expanded and compressed in the usual manner for your machine.
|
An Item manager window resulting from a "New" command pushed in the Archive manager
is shown below.
A typical, filled Item manager window is shown at the left.
Four "Program" folders are always present. These are a Trash folder with Deleted, Edited, and Cut subfolders. These folders may not be renamed, moved, or deleted. Their contents may be edited, if desired, however. When viewed or edited "Program" folders have black borders on their text fields and the word "Program" in the upper right-hand corner. |
A right mouse click in the New window makes a pop-up window available with a choice: "Paste". This allows pasting from the insecure system clipboard.
A right mouse click in the New folder window makes a pop-up window available with a choice: "Paste". This allows pasting from the insecure system clipboard.
A right mouse click in the View window makes a pop-up window available with two choices: "Copy all" or "Copy selected". This allows copying the entire item or a selected portion of the item to the system clipboard. This is an insecure operation! If you choose to do this, the Clipboard Warning! window pops up and flashes annoyingly.
If the "Clear clipboard" button isn't pushed, the window times out and clears the clipboard by itself.
A right mouse click in the Edit window makes a pop-up window available with three choices: "Paste", "Copy all", and "Copy selected". This allows pasting from the system clipboard and copying the entire item or a selected portion of the item to the system clipboard. This is an insecure operation! If you choose to copy to the system clipboard, the Clipboard Warning! window pops up and flashes annoyingly. If the "Clear clipboard" button isn't pushed, the window times out and clears the clipboard by itself.
Items already in "Edited", "Deleted", or "Cut" subfolders of the "Trash" folder are permanently removed by this command.
The Item manager window is a timed window, if you wait too long, you'll return to the Archive manager window and need to re-enter the archive password.
The "More..." menu item brings up five additional commands to organize data in the tree.
All new items are unlocked in default operation.
The "Lock" command doesn't control the security of your data. It protects against accidental, but authorized, changes or deletion of items. File cryptography can only be done with locked keys.
A Item window is popped-up whenever an item is doubled-clicked in the Item manager window or any of the New, New folder, View, or Edit commands are selected from the pop-up menu.
| The items available in the pop-up menu depend on the type of Item window.
The commands are:
|
Always use double-clicking or the View command to see existing keys. This reduces the risk of changing them inadvertently.
Spa can encrypt and decrypt files on your machine using keys contained in an archive. This is a very useful and potent feature; however, both care and practice are required to ensure that critical files aren't lost or destroyed. Be careful and practice before using file cryptography! This is even more important when the file drop feature is enabled. File cryptography is based on keys contained in the archive. File cryptography commands are only enabled when a locked item is selected. This is to reduce the chance that a item containing a key might be changed slightly between encryption and decryption. Remember that files encrypted with a key can only be recovered with that key...if the key is lost or altered the data is lost and gone forever. As a matter of conservative practice, lock an item containing a key immediately after entering it and don't throw it out. The best way to set a key is to use the true random password generator, Trap. Run Trap from the "Tools" menu in the Archive manager window. Generate an alphanumeric key having at least 250 bits. Then open Spa and create an item by the "New" command. Select the "Paste from Trap" command in the item window to paste the generated password into the item. Press the "Define" button, then lock the item with the "Lock" command (under "More...").When the right mouse button is pressed on any locked item 3 file cryptography menu items are enabled.
|
![]()
|
Select the "File decrypt" menu item and choose Letter.doc.bin in the resulting file chooser window. A "Pre-existing file" warning will appear because decryption would otherwise overwrite the file Letter.doc. For practice, enter "No". A file chooser window allows you to name the output plaintext file. The default filename is often convenient.
Select the "Encrypt null file" menu item and note that a dated Null file appears on the Desktop. Select the "File decrypt" menu item and choose the null file. A notice window explains that the decrypted file was a null file and that it has not been written.
Note that the background color and the text message at the bottom of the window have changed.
Here the locked key "Key - 20 Aug 2002 [myggu]" has been selected, as indicated by the light blue background. (The File drop feature follows the same procedures for placing the output files as in the "Encrypt file" and "Decrypt file" commands.) Now if the two files Something.doc and Another.doc are grabbed and dragged to the yellow portion of the Item manager window, then they will be encrypted. First, the following window pops up, however:
When the button "No" is pushed the result of the drop, is:
The location of the result on the screen will almost certainly be different. (Here the file extension ".daisy" has been assigned to a key chain icon.)
Similarly, if a group of encrypted files, that is, files with the ".daisy" extension, are dragged to the yellow portion of the Item manager window, then the files will be decrypted using the selected key.
The file drop feature works on any number of files, but each drop does either encryption or decryption of all the files. That is, for encryption none of the files may have a ".daisy" extension. For decryption all the files must have a ".daisy" extension. A drop of a mix of files with the ".daisy" extension and other files yields a warning note.
The Options tab in the Help window allows changes in system appearance and window delays.
Changes in settings are made ONLY when the "Save settings" button is pressed. Pressing "Done" does NOT change the settings.
Here are two Appearance panel settings of interest:
If you get everything out-of-order by playing with the Options tab, push the "Reset defaults" button to get back to start. Fortunately, actions in the Options tab have no effect on an archive file.
To maintain assorted system parameters, such as those on the Options tab, the program maintains a constants file called Spa.X.Y.ini in your home directory. This file contains no password information (It does contain the names of the archive files, however.) and can be written as a text file Spa.ini.txt in your home directory by pushing the "List settings" button. FileHash and Trap produce settings files FileHash.X.Y.ini and Trap.X.Y.ini respectively.
The Daisy cryptosystem serves as a wrapper for the particular Rijndael cipher described above. Cipher block chaining (CBC) is a common example of a wrapper for a block cipher. The Daisy wrapper increases security over an electronic codebook (ECB) application of the cipher. Spa encrypted files can not be decrypted directly with a Rijndael block cipher, even with the correct key, because of the Daisy wrapper.
The strength of files encrypted with Daisy depends on the length and randomness of the particular passwords used. The minimum acceptable password for an archive or external file for Daisy encryption must have at least 10 non-blank, non-control characters. The recommended password size for archive files is 15 - 20 characters derived from Trap. For file encryption 100 character keys derived from Trap are recommended. If these recommendations are followed classic cryptanalysis of encrypted files is infeasible. Burglary, TEMPEST, and "Magic Lantern" attacks are more feasible approaches to getting your data.
Practically, the user must be aware of the following characteristics of the Daisy cryptosystem:
The current "Output size" for a Spa archive is 1 MByte. The default "Output size" for file encryption is 100 kBytes and should be increased if files longer than about 75 kBytes are encrypted.
© C. V. Kimball 2007