The Tomb v2.01 for DOS
by Patrick J. Winter
winter@ecf.utoronto.ca
Copyright (c) 1996. All rights reserved.
Available for DOS, OS/2, UNIX

- Fast, easy-to-use, reliable encryption/decryption program.

- Versatile: can encrypt/decrypt any file type.

- Use a character string key to encrypt a file; the same key
  is needed to decrypt it.

- All parameters (options, file names, key) accepted on the
  command line.

- By default, the key is embedded in the encrypted file; then,
  when decrypting, the Tomb checks that the same key is being
  used.

- Can encrypt without embedding the key, and can decrypt
  without checking against an embedded key (if any) -- 
  this will always allow decryption, but if the decryption key 
  is wrong the 'decrypted' file will be corrupted.

- Seemingly mangles files beyond recognition, then brings 
  'em back!

________________________________________________________________________
Run 'tomb /?' to get the following help:

Usage: tomb [options] <inputfile> <outputfile> <key>
Options:  /e   - encrypt (default)
          /d   - decrypt
          /k   - don't embed/check embedded key (encrypting/decrypting)
          /q   - quiet: suppress messages
          /o   - overwrite outputfile (no prompting!)
          /?   - this help; use /?? for examples

Notes: - decrypting without checking embedded key is allowed, but
         if key is wrong output will be corrupted.
       - works on all file types.
       - encryption algorithm uncrackable by all save the CIA
         and its accomplices -- please try to crack it.
       - use and distribute free of charge; you may NOT sell
         the Tomb without the author's written permission.
       - if you find this program useful, or have any suggestions,
         please let the author know.
USE AT OWN RISK; THE AUTHOR ASSUMES NO RESPONSIBILITY FOR LOSSES
OR DAMAGES ARISING DIRECTLY OR INDIRECTLY FROM USE OF THE TOMB.


________________________________________________________________________
Run 'tomb /??' to get the following examples:

Encrypting examples:
tomb x.exe x.tmb pjw
   - encrypt 'x.exe' into 'x.tmb', embedding key 'pjw'
tomb /k win.ini win.tmb olympic
   - encrypt file 'win.ini' into 'win.tmb' with key 'olympic'
     (not embedding key)
tomb /o doom.exe doom.tmb DoomIsEvil
   - encrypt 'doom.exe' into 'doom.tmb' (overwriting doom.tmb if
     it already exists), embedding key 'DoomIsEvil'

Decrypting examples:
tomb /d mech2.tmb mech2.exe OCanada
   - decrypt 'mech2.tmb' into 'mech2.exe' using key 'OCanada'
     (checking vs. embedded key)
tomb /k /o /d etc.tmb etc HAPPY
   - decrypt 'etc.tmb' into 'etc' (overwriting etc if it already
     exists), using key 'HAPPY', not checking vs. embedded key
tomb /q /d nss.tmb nss.htm redknight
   - decrypt 'nss.tmb' into 'nss.htm', with no messages
     using key 'redknight' (checking vs. embedded key)

Note: the Tomb allows any character in the key, but whether
or not special characters (e.g. '*') are accepted on the command
line will be determined by the operating system.
________________________________________________________________________
