 pedit's pEncryptTool

Only the first password is necessary for the encryption.

If an optional second password is supplied, then a triple encryption process [DES3] is used which is a little slower than the single one [DES].

The passwords must be between 2 and 9 characters long, they are case-sensitive, and they can consist of any printable character.

The first letter of each password serves as a mnemonic to help to remember the password and they are not part of the encryption process itself.

The passwords themselves are not stored anywhere, except for their first letters [mnemonic].

HINT. If you entered the wrong key when decrypting your text, then you might want to encrypt it again with the same wrong key, and then try again with the correct key. This trick might work sometimes.

HINT. As long as you stay in EditView, you can restore the last original or last encrypted memo via the "Restore Memo" menu command.

HINT. You can exit magiPad and scriptPad without saving the text by using the ".C" button.

HINT. You can re-enable some helpful hints using the "Options" menu.

HINT. The upButtonSlided "H" button in EditView is a shortcut for invoking pEncryptTool which is also in EditView's "R2" menu.

 Navigational Help 

RETURN = 5-way select = activate pRotatorTool

up arrow = 5-way up = delete previous character

down arrow = 5-way down = insert new character

NOTE. A clear text memo can be encrypted if it has a title ending with a RETURN character, followed by a non-blank body. The title itself is allowed to be blank. Only the body gets encrypted.

NOTE. Once a memo has been encrypted, you can freely add new text and/or delete text before and after the encrypted text. pEncryptTool will recognize the encrypted portion and it will decrypt it when asked to do so.

NOTE. Although pEncryptTool tries hard, it can't accurately predict in advance if the encrypted text is going to be too long for the given text field so that it may abort during the encryption process.

NOTE. Encrypted text is appr. 25% longer than its unencrypted source.

NOTE. pEncryptTool has an extensive but not at all fool-proof user error detection mechanism built into it.

NOTE. pEncryptTool's encryption is based on the encryption mechanism supplied with the Palm OS. Google "EncDES", "DES", "DES3", and "3DES".

NOTE. If, in the future, the makers of the Palm OS decide to change the encryption function "EncDES()", then it will no longer be possible to decrypt text which originally was encrypted on Palms using the current "EncDES()".

WARNING. Although pCryptTool's encryption mechanism is not unbreakable, there is no way for you or for me to recover your text if you supply the wrong password[s] (unless you find a relentless encryption wizard).
