psyfer/README.md

114 lines
2.5 KiB
Markdown
Raw Normal View History

2016-03-14 13:39:24 -07:00
# Psyfer
2016-03-14 13:38:05 -07:00
# Overview
2016-02-11 22:41:36 -08:00
2016-03-14 13:38:05 -07:00
Psyfer is a app which lets you perform various different ciphers to input
strings. It also provides the ability to guess certain ciphers.
Psyfer is project for UC Davis ECS 235A Computer and Information Security
# Getting Started
If you have a working Go enviroment on your computer, you can download pull
down this repo and build this code. Otherwise, visit https://derek.mcquay.me/ecs235a/
for downloadsTODO
Once you have psyfer, you can run commands like:
> psyfer vig -k xyz "this is my string"
which will perform the vigenere cipher with a key of "xyz" on the given input
# Concept
Psyfer is built on a structure of commands, arguments & flags.
**Commands** represent actions, **Args** are things and **Flags** are modifiers for those actions.
# Usage
## psyfer trans
Running `psyfer trans [mode] [flags] [input]` will perform various different
transposition ciphers to your input string. the possible options are `random`,
2016-03-14 13:39:24 -07:00
`railfence`, and `split`.
2016-03-14 13:38:05 -07:00
Here is an example:
```
psyfer trans railfence "my input string"
```
Likewise, you can also decrypt by adding the `-d` flag:
```
psyfer trans railfence "m nu tigyiptsrn" -d
```
## psyfer sub
Running `psyfer sub [flags] [input]` will perform a substitution cipher according
to a key file. An example key file is found in the repo called key.json.
Here is an example:
```
psyfer sub -k key.json "my input string"
```
Likewise, you can also decrypt by adding the `-d` flag:
```
psyfer sub -k key.json "ax nmpir krqnmb" -d
```
## psyfer vig
Running `psyfer vig [flags] [input]` will perform the vigenere cipher with
the provided key.
Here is an example:
```
psyfer vig -k mykey "my input string"
```
Likewise, you can also decrypt by adding the `-d` flag:
```
psyfer vig -k mykey "decrypt this string" -d
```
## psyfer aes
Running `psyfer aes [flags] [input]` will perform the AES cipher with keysizes
128, 192 or 256 bit in Electronic Codebook (ECB). The key is "baked" into the
program (example keys found in FIPS publication 197.
The default behavior is to return the hex representation of the string. the
`-a` flag will display in ascii.
Here is an example:
```
psyfer aes -k 128 "my input string"
```
Likewise, you can also decrypt by adding the `-d` flag:
```
psyfer aes -k 128 "my input string" -d
```
## psyfer guess
Running `psyfer guess [flags] [input]` will return the top five most likely
solutions to the caesar cipher provided.
Here is an example:
```
psyfer guess "wklv lv d vhfuhw phvvdjh"
```
which will return "THISISASECRETMESSAGE" as the most likely answer