HP 3000 Manuals

Ch 7. Encryption Programs [ HP DeskManager Customization ] MPE/iX 5.0 Documentation


HP DeskManager Customization

Chapter 7  Encryption Programs 

HP Desk implements a method of encrypting (encoding) data items for added
security.  An encryptor is supplied with HP Desk to allow users to
encrypt items to keep them secure from unauthorized access.

An encrypted item may then be, for example, mailed to another HP Desk
user who may only read that item if they can supply the correct keyword.
As the encryption is based on a user-supplied keyword, the keyword should
not be sent in the same package as the encrypted item - otherwise an
unauthorized user may be able to decrypt the item by accessing the
message.

Communications between users as to a common password should be by means
other than HP Desk to maintain security.  For details of how to use the
ENCRYPT command see HP DeskManager User Reference Guide.

The HP Desk encryption algorithm does not adhere to any particular
standards.  Therefore, you may install your own encryption programs if
you wish, by using the INSTALL command in a similar way to installing
other items in HP Desk.  In order to do this the user must have System
Administrator capabilities.  Such programs have to adhere to a simple
protocol for communicating within HP Desk, which is discussed in
"Encryption Program Communications Protocol"  later in this section.

You can write encryptors to either replace the standard encryptor, or
work alongside it.  As a general rule, the more secure the encryptor,
then the slower the encryption algorithm.  Therefore, you might want to
give users the choice of one encryptor for the quick coding of normal
mail and one for occasional use on mail requiring particular security.
In networks, you must ensure that if encrypted mail can be sent from one
computer, it can be decrypted at another.  That is, the encryption
program is available on all computers in the network where it may be
required, and is installed on each with the same identifier.



MPE/iX 5.0 Documentation