CRYPT(1)                                                 CRYPT(1)

     NAME
          crypt, encrypt, decrypt - encode/decode

     SYNOPSIS
          crypt [ password ]

          encrypt [ password ]
          decrypt [ password ]

     DESCRIPTION
          These commands read from the standard input and write on the
          standard output.  The password is an enciphering key.  If no
          password is given, one is demanded from the terminal; echo-
          ing is turned off while it is being typed in.  Crypt uses a
          relatively simple, fast method (rotor machine) for both
          enciphering and deciphering.  Encrypt and decrypt use a more
          robust, slower method (Data Encryption Standard).  Files
          enciphered by crypt are compatible with those treated by the
          editor ed in encryption mode.  Files enciphered by crypt are
          not intelligible to decrypt, and vice versa.

          It is prudent to supply the key from the terminal, not from
          the command line, and to pick a reasonably long (6 letters)
          and unobvious key.  Remember, too, that encipherment cannot
          frustrate adversaries with super-user privileges.

     FILES
          /dev/tty for typed key

     SEE ALSO
          ed(1), makekey(8)

     BUGS
          There is no warranty of merchantability nor any warranty of
          fitness for a particular purpose nor any other warranty,
          either express or implied, as to the accuracy of the
          enclosed materials or as to their suitability for any par-
          ticular purpose.  Accordingly, Bell Telephone Laboratories
          assumes no responsibility for their use by the recipient.
          Further, Bell Laboratories assumes no obligation to furnish
          any assistance of any kind whatsoever, or to furnish any
          additional information or documentation.