P O T A S S I U M
H Y D R O X I D E
(KOH) Disk Encryption System Written by "The King of Hearts"
The executable program KOH.COM and this document file KOH.DOC may be distributed for free. Please spread them all over the known universe!
Complete source, or an original distribution disk is available from: American Eagle Publications, Inc. P.O. Box 41401 Tucson, AZ 85717
See the order form at the end of this document. (C) 1993 American Eagle Publications, Inc.
--------------------------------* This software was developed in MEXICO * WARNING: Certain entities who claim civil authority in the United States consider this to be an export-controlled item due to the strong cryptography implemented therein. We do not intend to defy them though their claims to said authority are somewhat dubious in view of their disdain for the
constitution. This matter you must consider for yourself. -------------------------------
3
INDEX =====
CHAPTER 1. 2. 3.
Warning How KOH Works Installation Floppy Disk Installation Hard Disk Installation 4. Speed Considerations 5. IDEA-Based Cryptography 6. Hotkeys 7. System Backup 8. How do I . . . ? 9. If you have problems 10. Order Information
PAGE 5 6 7 7 8 12 13 16 18 21 23 25
5
1. WARNING ========== This disk encryption system employs a state-of-the-art encryption algorithm called IDEA in conjunction with a sophisticated low-level disk intercept to secure your IBM compatible personal computer system from intrusion. PLEASE READ THESE INSTRUCTIONS COMPLETELY BEFORE INSTALLING THIS PROGRAM ON YOUR COMPUTER SYSTEM. If you do not, you could render all of the data in your system PERMANENTLY INACCESSIBLE WITHOUT REMEDY! Secondly, improper installation could leave your computer system vulnerable to cryto-analytic attack. Although KOH uses a very good cryptographic algorithm, YOU have a part to play in making sure you are secure. This manual will tell you how. In short, take your time, read the manual, and do it right and you'll be glad you did!
6
2. HOW KOH WORKS ================ Potassium Hydroxide is an on-the-fly disk encryption program. When you install it, it will encrypt your hard disk (and floppies) so that all of the information on it will look like jibberish without the corresponding decryption in place, and the proper password entered when you start the computer. KOH hides itself in a small space on your hard disk that is normally never used, and it is the very first thing loaded from disk when you turn your computer on. It installs itself in your computer's memory, and then asks you for a pass phrase. If you enter the wrong thing, your disk still looks like jibberish. Once KOH is installed in memory, it monitors all attempts to access the disks in your system. Everything that is written to disk is encrypted by KOH, and everything read from disk into memory is decrypted. Nothing is ever stored to disk in an unencrypted form as long as KOH is in the system. Thus, if you are in a situation where you have a security problem, all you have to do is turn your computer off, or hit the reset button, and everything is instantly locked out of the reach of anyone who doesn't know your pass phrase. Functionally, KOH works in a manner similar to a computer virus. It uses "stealth" technology developed by computer virus writers to hide itself in your computer system's memory and on its disks. Likewise, it uses technology first developed by virus writers to help you keep all of your work encrypted without having to remember to do all the housekeeping yourself. KOH differs from a virus in that it is friendly. It doesn't just come along and do something nasty whether you want it to or not. You remain in control, and KOH does an important job for you! This virus technology actually makes KOH a much more effective program than some other commercial programs. For example, some programs implement encryption using a device driver. This, however, makes it impossible to encrypt the boot-up code, and part of the directory structure. Others force you to set up a separate partition on your hard disk, etc., etc. By hiding like a virus, KOH allows you to encrypt EVERYTHING.
7
3. INSTALLATION =============== IMPORTANT: Read this section through once from start to finish and then go through it again, step by step, while doing what it says. A. Floppy Disk Installation --------------------------There are two ways to put an active copy of KOH on a floppy disk. The first way we will discuss is to use the KOH.COM program, provided with this DOC file. To create a disk encrypted with KOH, you should first create a bootable floppy of the type used in your A: drive. To do this, use the command FORMAT A: /S /U to format the disk in drive A: and put the system files on it, so that it can be booted. The /U calls for an unconditional format, which just wipes out any pre-existing data on that disk. Once you've done this, simply run the KOH program as KOH A: When you run KOH, you will be prompted for a pass phrase for that floppy disk. You should always pick a good pass phrase. A bad one will seriously compromise security in your system. If somebody (or somebody's computer) can guess your password, then you're wide open. See the discussion of pass phrases below, IDEA-Based Cryptography. After you enter a pass phrase, KOH will proceed to encrypt this disk and install itself. The process takes a minute or two. When complete, KOH will inform you that is is done, and you will find yourself back at the prompt. If you attempt to do a directory of that floppy now, it will look like pure gibberish. Now, if you have a floppy-only computer system, or if you don't want KOH on the hard disk, you can boot from your newly created floppy disk. KOH will load itself into memory and ask you for a pass phrase. Enter the pass phrase, and your disk will proceed to boot. If you do a directory on it, you'll see everything there just like you would expect, with no jibberish. KOH is resident in memory, decrypting the information on that disk as it is loaded into your computer's memory. You can turn your computer off at any time, and your
disk will be completely safe from prying eyes.
8
When KOH is resident in memory (loaded by booting off a disk on which it is installed), you can encrypt new disks with no trouble at all. All you have to do is do a directory on a disk, and KOH will automatically encrypt it with the same password you entered when you started up, and put the decryption routines on it. For example, if you put a diskette in your B: drive and type DIR B: you won't get the directory immediately, like you usually do. KOH will sense an unencrypted disk in that drive, and encrypt it before anything else happens. When KOH is done encrypting, you'll get the directory display just like you usually do, but now that disk is encrypted. Thus, once you have your first encrypted disk, making more is very easy. If you need to access a diskette WITHOUT automatically encrypting it (perhaps you are copying a few files from a friend, and you want to give his disk back), you can easily turn the auto-migrate feature off by using the hot-key Ctrl-Alt-O (letter o). When you press this three-key combination (just like you use Ctrl-Alt-Del to reboot), your computer will beep and a minus sign "-" will be displayed on the screen to tell you that auto-migrate is off. Then you can access floppy disks, and KOH will not attempt to encrypt them. To turn the auto-migrate feature back on, press Ctrl-Alt-O again. Your computer will beep and a plus sign "+" will be displayed to indicate that auto-migrate is on. You can read more about this feature in the section on Hotkeys. B. Hard Disk Installation ------------------------To install KOH on your hard disk, the first thing you must do is install it on a floppy disk. Use the instructions above to do that before proceeding with installation on your hard disk. Backing Up ---------Once you have made a bootable floppy disk with KOH on it, then you are ready to install it on your hard disk. BEFORE YOU INSTALL ON YOUR HARD DISK, YOU MUST BACK UP YOUR COMPUTER!!! Encrypting your disk is a sensitive process. If the power were to fail, or if something went wrong half-way through the process, you could conceivably lose everything you have
stored on your computer. Thus, before you proceed, you must back up your computer. DO IT NOW. Don't take the chance that everything will go fine, because you just never can tell.
9
However, obviously, if you make a backup of your computer now, that backup won't be encrypted. This is a potential security breach. There are a couple ways to deal with it, depending on how your computer is configured. I'm going to assume you haven't been backing up your data regularly, because most people don't. So first a few instructions on making a proper backup when using KOH. The only way to back up your computer and allow KOH to encrypt the backup for you is to back up onto floppy disks using a program that does not use a non-standard disk format. The standard DOS BACKUP utility works fine, as do compression programs like PKZIP and ARJ, which allow for multi-volume processing. Get a bunch of floppies, and back up now, before anything is encrypted. You can encrypt this backup later, if you want to. For more information about backing up with KOH in your computer, see the section System Backup in this manual. Putting KOH on your Hard Disk ----------------------------Once backup is complete, you are ready to move KOH to your hard disk. To install KOH, first put the floppy which has KOH on it in the A: drive and reboot your computer. The computer will access the A: drive first, and load KOH into memory. At this point, KOH will ask you: KOH-Migrate to hard drive on this computer (please backup)? At first, answer "N" for no. This is a preliminary test. First you want to see if your KOH-ed floppy will work. Then you will be asked for a pass phrase. Enter the pass phrase you chose for the disk when you made it. Next, the disk should boot, and you should have an A: prompt. You should be able to do a directory of the hard disk, etc., without problems. If, rather than booting up, you get an error to the effect of "Non-system disk" then you may have entered the wrong pass phrase, so press Ctrl-Alt-Delete and try again. After successfully booting your floppy under KOH, you can do a directory of it, and you will see everything that was on it just like it was before you encrypted. Now we're ready to install on the hard disk. Press Ctrl-Alt-Delete and allow the computer to boot from the floppy again. Now, when it asks you about migrating to the hard drive, answer "Y" for yes. Again, you will be asked for a password. You don't really need to enter it, because once it's asked, KOH is already on your hard disk. So you can just press Ctrl-Alt-Delete again, and take the floppy out of the A: drive so your system will boot from the hard disk.
10
When KOH loads from the hard drive, it will ask if you want to encrypt your data now. Again, it's probably a good idea to test your disk out and answer this question "N" for no. Your computer should then proceed to boot and operate normally. The Secret Key -------------After you've seen that your computer is still working, it is time to encrypt. Press Ctrl-Alt-Delete once more, and when you're asked if you want to encrypt, answer "Y" for yes. KOH will then ask you to start pressing keys. This is a critical part of generating a good encryption key, and it's important not to slacken up here and try to rush the process. You'll have to press about 128 keys to get through this part. To do it right will take a few minutes. CHOOSE KEYS ON YOUR KEYBOARD COMPLETELY AT RANDOM AND PRESS THEM SLOWLY. Use all of the keys on your keyboard too. If you try to rush this, you're only compromising the security of the random key which is being generated, and it is your own loss. Once the computer has enough keystrokes, it will beep and ask you to press the ESC key to continue. After you press ESC, you will be asked for two pass phrases. One is for the hard disk and one is for your floppy disks. The Hard Disk Pass Phrase ------------------------Chose a hard disk pass phrase carefully. It needs to be something that cannot be easily guessed, yet something you can remember, and it can be any combination of keystrokes up to 128 characters. This pass phrase is what you will enter into the computer every time you turn it on from now on. See IDEA-Based Cryptography for more information on picking a good pass phrase. The Floppy Disk Pass Phrase --------------------------The pass phrase for the floppy disk will be completely invisible after you enter it. It is stored (encrypted) on your hard disk in a special area, and you will not normally need to enter it. However, since you are liable not to use it for long periods of time, make sure it is something you will remember--or save it somewhere on your *encrypted* hard disk. You will need it if you boot off of an encrypted floppy, or wish to access that floppy from another machine. After you have entered both pass phrases, KOH will proceed to encrypt your hard disk. This is where you have to just kick
back and wait, as the process can take anywhere from 20 minutes to several hours, depending on how big your hard disk
11
is, and how fast your computer is. Allocate plenty of time to encrypt, and do not turn the computer off before it finishes the job and tells you so. If you do, chances are a major portion of the data on your hard disk will be lost forever! That's why you want to back up, too. You never know when the electric company might shut down your computer for you. You have been warned!! Note: You can change both the hard disk and floppy disk pass phrases at a moment's notice by pressing Ctrl-Alt-K, preferably from the DOS prompt. Then you will be asked to enter new pass phrases. See Hotkeys for more information. Note that KOH only encrypts the presently-active partition on your physical hard disk. Thus, if you have your computer set up with two logical drives, C: and D:, only the C: drive will be encrypted. The D: drive will not get encrypted. If you want everything encrypted, then you must set your hard disk up with a single partition if it is not already. (Use the FDISK program, supplied with DOS, to determine how many partitions you have if you do not know.) At this point KOH is completely installed on your hard disk. The next time you start your computer, you will be prompted for a pass phrase. Enter it right, and your computer will start right up. Enter it wrong, and you cannot get in! NOTE: If you are installing on a SCSI drive, read the section in "What To Do If You Have Problems" concerning SCSI's before you install. That will help you to avoid surprises with SCSI's, which can be a bit more complex than ordinary drives.
12
4. SPEED CONSIDERATIONS ======================= KOH requires a considerable amount of overhead to do encryption and decryption on the fly. You are bound to notice a slow-down in disk accesses after you install KOH. That is always something that's hard to get used to. These are the breaks of using on the fly encryption, and the better your encryption algorithm, the more overhead it takes. To minimize the impact of the slowdown, I recommend two things: (1) Install a disk cache in memory--as big as you can afford. A caching controller will not do the job, because that cache lives on the other side of KOH. You need just an ordinary cache that resides in system memory, preferably one that caches reads and writes. (The standard MS-DOS cache works just fine.) This will keep data cached in an unencrypted state so that accessing it does not require calling IDEA. You may want to install some more memory so you can make your disk cache bigger. (2) Upgrade your processor, if you can afford it. The speedup from the new processor will offset the slowdown from KOH, and you'll be happier. For example, if you upgrade from a 386SX16 to a 486SX-25, you probably won't even notice the slowdown, and it's not THAT expensive. If you cannot afford the above solutions and you still can't live with a slower system, there is one other possibility, though it is not as secure. You can partition your disk with a logical drive. For example, if you have an 80 megabyte drive, create a 20 megabyte partition, and make it your C: drive, and create a 60 megabyte partition and make it your D: drive. Now, put all of your programs, and data that is not sensitive on your D: drive, and put all of your sensitive data on the C: drive. Then install KOH. KOH will encrypt the C: drive, but leave the D: drive alone. This means that your D: drive will be as fast as it was before, and your C: drive will be slowed down by the encryption routines. All your programs, etc., will load real fast. The problem here is that you need to make sure you don't put sensitive data on your D: drive. Don't ever put it there. Remember that erasing files doesn't really erase the information. And don't let your programs create temporary files on your D: drive with sensitive information in them either. (And that's easier said than done!!) As I said, this is not really a very good option, but it can be done.
13
5. IDEA-BASED CRYPTOGRAPHY ========================== IDEA stands for International Data Encryption Algorithm. It was developed in the 1980's in europe as an alternative to the US government developed DES (Data Encryption Standard) algorithm. Most good commercial encryption programs use DES at present. DES has been proven to be a pretty good algorithm by the academic crypto community, however quite a few people are suspicious about it because it was developed by the US government and the National Security Agency. Although perhaps quite suitable for civilian use 99.99% of the time, there is always that lurking suspicion that the NSA knows how to crack it. Additionally, DES uses a 56 bit key (7 byte). As computers become more and more powerful, it is possible that a brute-force attack against DES would be possible at a reasonable cost. By a brute-force attack, I mean you just set up a computer to try every possible 7 byte key until you get the right one. That could be only a few years away, as computer technology is improving so rapidly. IDEA offers an alternative. Developed by the academic community, it does not carry with it the suspicions of an algorithm developed by a super-secret government agency. It has proved to be a good algorithm without inherent weaknesses. However, IDEA is still rather young--much younger than DES. Thus, it is possible that someone could find a weakness and prove it's not so good after all. That has not happened to date, and it's a calculated risk you have to take. Also, the IDEA employs a 128 bit key (16 byte). This larger key makes a brute-force attach MUCH more difficult, and removes it from the realm of possibility for a long time to come. The development team felt the IDEA offered the best security at present of any known algorithm, for the purposes we have in mind for KOH, and that includes keeping your private computer data away from prying government eyes. Since government has the one-up on everyone else with DES, we felt IDEA offered a better chance of keeping the playing field level. The IDEA algorithm can be operated in several modes. We use the Cipher Block Chaining mode, because this is the most secure, and it makes sure that, even if two blocks of data on your disk contain the same unencrypted data, they'll look completely different when encrypted. As with all cryptography, even a strong algorithm can be
broken easily if you aren't careful about your password. I know hackers who can get into all kinds of computer systems
14
with the greatest of ease, simply because people choose passwords that are easy to guess. The famous Internet Worm had a list of passwords in it--about a hundred words--which are used by at least one user on over 90% of all computer systems. Now just about anybody can sit down and try 100 different words that you're likely to use for a password! I recommend you don't use a word at all. KOH gives you up to 128 characters for the pass phrase. They can be any combination of (case sensitive) letters, numbers and punctuation. USE THEM. If you just use one word, I can write a computer program in about ten minutes that will test every word in the dictionary against your passphrase. And it can find your "secret" word in about ten minutes. At least use a phrase. Definitely use punctuation. Maybe use unusual capitalization rules. Probably you should include at least one nonsense word. By all means don't quote your favorite book. What ever you do, remember that if somebody wants to crack your pass phrase, it's not just some guy sitting there trying to dream up good guesses. It's a guy with a computer that can make a million guesses an hour. Make sure that even if you could make a million guesses an hour, it would take forever to get the right one. That may sound intimidating, but it's not really. Chosing 5 random words from a dictionary of 100,000 means you have about 10,000,000,000,000,000,000,000,000 possibilities and even at 1,000,000 an hour, the universe will collapse before you get done. Adding an unnecessary exclamation point at the end makes the job all that more difficult. You should be getting the point: Give some thought to your pass phrase. The next point is that you need to watch your floppy disks. Some people are careful to encrypt some of their data, but not all of it. Then if they are attacked, the unencryted data is enough to cause trouble. KOH tries to make encryption as easy as possible with the auto-migrate feature. It is recommended that you leave this feature ON at all times, unless you have a specific task at hand that requires it to be off. Then turn it off, complete that task, and turn it back on. That way, everything that touches your computer will stay encrypted, day in and day out. Make sure you go back to any old floppies you had before you installed KOH and encrypt too (just sit down and do directories on them and they'll get encrypted). Note that the IDEA algorithm is patented by a group in Switzerland. There is no license fee required for non-
commercial use. For commercial use, you'll have to contact the patent holder. Since this program is freeware, we don't
15
handle license fees. Contact Dieter Profos, Ascom-Tech AG, Solothurn Lab, Postfach 151, 4502 Solothurn, Switzerland for information. References: Xuejia Lai, "On the Design and Security of Block Ciphers", Institute for Signal and Information Processing, ETH-Zentrum, Zurich, Switzerland, 1992 Xuejia Lai, James Massey, Sean Murphy, "Markov Ciphers and Differential Cryptanalysis", Advances in Cryptology, Eurocrypt 1991.
16
6. HOTKEYS ========== KOH has three basic hotkeys which you can use to perform special functions with KOH while it is active in your computer. These hotkeys are designed to be easy to remember. They are called up by holding down the Ctrl and Alt keys, and pressing K, O or H. Let's see what they do: Ctrl-Alt-K ---------This hotkey allows you to change your system pass phrases. As you will recall, if you booted from a hard disk, there is a hard disk pass phrase and a floppy disk pass phrase. If you booted from a floppy disk, there is only a floppy disk pass phrase. KOH will allow you to change whatever pass phrases are appropriate. Changing the hard disk pass phrase is permanent, and allows you to access that hard disk only by entering the new pass phrase when you start the computer. It takes only a few seconds to change this pass phrase, as KOH does not need to decrypt and encrypt the whole disk to make it effective. You will want to change the hard disk pass phrase any time you believe the security of your old pass phrase has been compromised. Changing the floppy disk pass phrase does not change the pass phrase with which you access a given floppy disk. Once a floppy has been encrypted using a given pass phrase, it will always require that pass phrase to be accessed. A new floppy pass phrase will only take effect on any new floppies you put in your computer. For example, suppose your floppy pass phrase is "PHYSICS TEST = 90" and a friend brings a disk over encrypted with the pass phrase "for MY Friend". You can change to this floppy pass phrase to read this disk. However, your usual disks will not be accessible while this pass phrase is in effect. When you're done with your friend, you'll want to change back to your original pass phrase so you can read your own disks again. Ctrl-Alt-O (Remember O = On/Off) ---------This hotkey turns KOH's auto-migrate feature on and off. Auto-migrate is the feature that causes KOH to automatically encrypt floppy disks that are put in your computer. The hotkey acts as a toggle. If auto-migrate is on, the hotkey turns it off, and vice-versa. To tell you what just
happened when you press this key combination, KOH makes your computer beep and displays a "+" or a "-". The plus sign
17
tells you that auto-migrate is now on, and the minus tells you it is off. If you load KOH from a floppy disk, the change in the status of auto-migrate is temporary, and effective only as long as your computer is on. When you reboot, or turn your computer off and on, KOH will load itself into memory with automigrate on. If you load KOH from your hard disk, the change in status of auto-migrate is saved to disk, so that you can turn your computer off and on again, and if you had auto-migrate off to start with, it will still be off. Ctrl-Alt-H ----------
(Remember H = Hard disk uninstall)
This hotkey un-installs KOH from your hard disk. It will ask you if you are sure you want to uninstall, and if you answer "Y", KOH will proceed to uninstall itself. You can uninstall KOH from a hard drive whether that drive is encrypted or not. If the drive is encrypted, it may take several hours to complete the uninstall--as long as it took to install. So make sure you have enough time to allow KOH to uninstall itself! When uninstalling, the same considerations apply as when installing. In other words, make sure you back your system up. If you lose power during the uninstall process, you could lose everything on your hard disk. To uninstall, you must have booted your system with KOH installed on the hard disk. If you can't remember the pass phrase, this will NOT help you out. You cannot un-install KOH on a floppy disk. If you want to get the encryption off of a floppy, the only way to do it is to copy it all to an unencrypted disk (with auto-migrate off, if KOH is active in your computer).
18
7. SYSTEM BACKUP ================ Here I want to explain how to do a proper backup when KOH is installed on your hard disk, and keep your data private in the process. I am going to discuss two things: (1) Making a master backup disk, and (2) backing up all of your data to floppy disks. Now, a lot of people have way too much data to use floppies to back up, and they use tape drives. KOH will not encrypt the data on your tape, so you have two options: (1) is to buy a tape backup program that will encrypt your data. There are a number on the market that use some form of DES, but none that I know of which use IDEA. Some use weak forms of DES too, so beware. The alternative is (2) not to encrypt the data on your tape. That is, of course, a potential security hole, unless you hide the tape where no one will ever, ever find it. Probably getting an air-tight capsule and burying it somewhere, or keeping it in a safe-deposit box at some foreign bank would work best. We fully intend to build modules to allow you to back up to tapes using IDEA, and working off your KOH key, but these are not available yet. The Master Disk --------------A master disk is a bootable disk with enough software to get your computer up and running again in the event of a disk crash. At the very least, you should have a bootable disk with FDISK, FORMAT and SYS, as well as the program you need to restore your backup from the backup floppies, or the tape drive. You can encrypt this master disk with KOH. It will not affect anything you do if you ever have to restore your hard disk. Alternatively, you may just want to put the KOH.COM program on the master disk, and maybe this file as well. There is one other thing you will want to put on your master disk. KOH makes your computer system somewhat more susceptible to damage by computer viruses, because viruses don't usually know how to handle the encryption routines. For example, the Stoned virus is fairly benign on most computer systems. It just displays the message "Your PC is stoned." now and then. However, if it infects your encrypted computer, it can totally trash everything in your computer. A small program VPROTECT has been included with the KOH distribution package. This creates a special file on your master disk that is an image of the KOH system areas. You should run it from your master disk as follows:
VPROTECT
19
It will create a file VPROTECT.DAT on your master disk. In the event your computer is attacked by a virus, or the system areas are damaged for any other reason, you should run VPROTECT /write from your master disk to restore the system areas on your hard disk. Once this is done, KOH will have the decryption keys restored and everything necessary to hand over control to DOS. Obviously, if a virus trashes more data on your computer than just this system area, you'll have to deal with that in other ways. Backup to Floppy ---------------KOH will allow you to backup your hard disk to floppy disks without compromising security. It can encrypt your backup floppies just as it encrypts any other floppy. The key to using KOH effectively in a floppy backup is to use a program that uses a standard DOS disk format. A fine way to back up without using an excessive number of disks is using the PKZIP/PKUNZIP programs or the ARJ program. I'll describe this process in case you want to use it. Also, the considerations discussed in using ARJ with KOH will apply to other backup programs as well. Typically, you cannot get a backup file onto the disk without KOH going there first when auto-migrate is on. Thus, the process of backing up will be completely transparent, even if you use disks that have never been encrypted. The one thing you have to remember is that KOH takes up a small amount of disk space, so if you have to tell the backup program how big your diskette is, you should reduce it by about 6 kilobytes. For example, using ARJ to backup to 1.44 megabyte diskettes in the B: drive, you would specify arj a -r -v1430000 b:backup c:\*.* This tells ARJ to create the archive BACKUP on the B: drive and use a volume size of 1.43 megabytes, and to recurse subdirectories (so your whole disk is backed up). Just execute this and everything will work fine. One thing to be aware of is that some backup programs will allow you to optionally format the floppy disks as you go through the backup. Turn this option off, because it will invariably confuse KOH. Format your floppies before you do the backup.
Note: You can still use a backup program that uses non-
20
standard disk formats (like some versions of Fastback and PC Tools) with KOH, you just can't encrypt with KOH. To use these kinds of programs without confusing KOH, turn automigrate off before backing up using the hotkey Ctrl-Alt-O.
21 8. HOW DO I . . . ? =================== Here I'd just like to answer a few common questions. Format floppy disks? -------------------Formatting floppy disks is one process that wipes out the boot sector on a disk, obliterates data, and re-organizes the FAT table. Furthermore, there are many different ways this can be done. KOH cannot possibly anticipate all the possible ways this happens. As such, a little more care must be taken when formatting floppy disks when KOH is resident. First of all, if you use DOS 5 or greater, the FORMAT program doesn't always really format. This fake-format is a sure way to confuse KOH--but that is just as well, because it is also a great way to compromise your valuable data. When KOH is installed, it is recommended that you only use a REAL format. For DOS 5 and up, this is accomplished by using the /u switch. For example, to format the disk in A:, type "FORMAT A: /U". If you use something other than the standard DOS format, you should experiment first to see what it does. As a safety, to make sure you get a clean, unformatted disk when formatting, KOH disables encryption to floppy disks as soon as it sees formatting take place. To remind you that encryption was turned off by formatting, every time you access a floppy disk, you will hear a series of beeps. The only way to start encryption back up after a format is to reboot. Share an encrypted disk with a friend? -------------------------------------If your friend has KOH on his computer, you can temporarily change the pass phrase on a floppy disk to an agreed upon phrase, and then give it to him. He can then temporarily change to that password to get at the data. I do not recommend you make your standard floppy pass phrase public. That defeats its purpose. If your friend does not have KOH on his computer, you can still give him an encrypted disk. He will just have to boot off of it to access it as discussed next . . . Access data from a machine that doesn't have KOH installed? ----------------------------------------------------------Suppose you go somewhere and you have encrypted disks. You
want to access them, but the machine you are at doesn't even have KOH installed. How can you get to the data?
22
Since KOH usually copies itself to disks that it encrypts, you can boot off of those disks to load KOH into memory. If your floppy disk is a boot disk, fine, that is all you need to do. But what if it isn't? You should still boot off of that disk, and tell KOH to migrate to the hard disk. KOH will then ask for a pass phrase. Instead of entering it, just reboot. When you reboot, boot off of the hard disk (don't encrypt it unless you really want to do all that) and enter the pass phrase that your floppy is encrypted with. Now you should be able to access that floppy disk. When you're done, just uninstall KOH using the hotkey Ctrl-Alt-H. The uninstall will only take a second since the hard disk is not encrypted. Re-Partition a drive? --------------------Changing the partition information on a drive is such a drastic change that you should completely uninstall KOH before changing the partitions, and then re-install when you are done. Install Windows or a disk compression utility? ---------------------------------------------You can install Windows or a disk compression utility like DOS' own, or Stacker, just as you ordinarily would. KOH is fully compatible with both. If you have the Windows 32-bit extensions, you may find that the disk driver will not load, and suggest that you may have a virus. Simply ignore this. Our experience is that this driver has so many problems that you are better off not using it to begin with, and when it doesn't load, it just allows the disk to be accessed in the normal way, so you'll never know it's not there. Install OS/2 (or Unix)? ----------------------At present, KOH is not compatible with advanced operating systems which do not go through the system BIOS to access the disk, and it is not compatible with IBM's boot manager. We intend to create drivers to make it work seamlessly with these operating systems eventually. Also, we are going to make a boot manager that will work with KOH available very soon. If you are interested, please contact American Eagle Publications at the address below.
23
9. IF YOU HAVE PROBLEMS ======================= There are a number of known problems that you may encounter when you use KOH. Some of these have nothing to do with KOH and can't be fixed at our end. I'll explain what I know about. If you run into a bug that you don't know how to fix, write to American Eagle Publications at the address below. No Room for KOH --------------If you have used non-standard partitioning software, your hard disk may not be able to hold KOH properly in its reserved area. In this event, KOH will tell you there is no room on the hard disk for it, and it will not install itself. To make your disk accept KOH, you must re-partition your drive with the standard DOS FDISK program, and then reinstall. Realize that running FDISK will certainly wipe out all the data on your computer, so you'd better have backed up. Keyboard BIOS Bugs -----------------Some AMI (and probably other manufacturers) keyboard BIOS's don't seem to work very well in real mode. Now, typically you never notice this, because you load HIMEM.SYS, or some other memory manager into your computer's memory when you boot, and the processor goes almost immediately into protected mode. Since KOH takes control before any device drivers, it always operates in real mode. Thus this bug could manifest on you now even though you've never seen it before. What you'll experience is a difficulty in entering your pass phrases properly, and there is practically nothing you can do about it. You'll never get through to anyone at the manufacturer who will believe you. Personally, I recommend you replace you keyboard BIOS with a Phoenix chip if you run into this problem. (The keyboard BIOS and the BIOS are NOT the same thing. The keyboard BIOS is implemented in an 8042 chip.) Some XT hard disks time out loading DOS 6 ----------------------------------------Anyone who wants to use KOH on an XT based machine CAN do so. There is nothing in the software to prevent it from working. However, it's incredibly SLOOOOOW. You may find out that your operating system will time-out when loading. I know for a fact that MS-DOS 6.2 will time out on some XTs. And I know you can get MS-DOS 3.3 to load properly. I'd really recommend you upgrade your motherboard--it's so inexpensive. But if you
must run this on an XT, then you may have to experiment with which version of DOS to run. If it doesn't load, try a different version.
24 Password Doesn't Seem to Work ----------------------------If your password doesn't appear to work the first time you try to use your computer after encrypting, you may have entered it wrong. Remember your password is case sensitive. Could the CAPS LOCK or NUM LOCK key have been active when you originally entered your password. Could you have capitalized a word? Try the different possibilities. If all else fails, start over from scratch. SCSI Drives ----------Some SCSI drives use installable device drivers in addition to the ROM BIOS on the SCSI card. Sometimes these drivers can cause problems because they are vendor specific and they can manipulate the ROM BIOS in unfriendly ways. Specifically, they may replace it entirely, and bypass the KOH decryption algorithms. Then your disk may look like trash as soon as the driver loads. Alternatively, they may hook it in some funny way, so, for example the hot keys won't work properly when they are installed. To avoid such problems when installing KOH, it is recommended that you first remove all such drivers (from CONFIG.SYS) and then install KOH with your SCSI drive relying purely on the ROM BIOS. Next, put your drivers back in, one at a time, and make sure KOH is still working.
25
10. ORDERING INFORMATION ======================== The executable files and the KOH.DOC files are freeware and may be distributed freely. You may order a disk with these files on them directly from American Eagle Publications. If you are in a country other than the US, the price is different, and the software will be sent to you directly from an overseas affiliate, because we will obey the law here in the US about not exporting this program. You may also order a diskette with complete source code on it, if you prefer. The source IS NOT freeware and MAY NOT be distributed freely. You must purchase it from American Eagle and you may not copy it. Prices ------
US Non-US
KOH Distribution Disk --------------------$10 $20
Source Disk ----------$20 $30
Please send check, cash or money order, or your VISA or MC number and expiration date. Overseas customers may send US $ or the equivalent in your currency. All prices are postpaid. Where to Order -------------Order from: American Eagle Publications, Inc. P.O. Box 41401 Tucson, AZ 85717 (602)888-4957