Copyright Digital Equipment Corp. All rights reserved.

ENCRYPT

   There are four ENCRYPT commands:

   ENCRYPT                   Encrypts files. Before you enter
                             this command, create a key with the
                             ENCRYPT /CREATE_KEY command.

   ENCRYPT /AUTHENTICATE     Checks for changes to either plain
                             text or cipher text files (see
                             /AUTHENTICATE).

   ENCRYPT /CREATE_KEY       Defines a key to be used during
                             encryption (see /CREATE_KEY).

   ENCRYPT /REMOVE_KEY       Deletes a key definition from a key
                             storage table (see /REMOVE_KEY).

   Format for the ENCRYPT Command

     ENCRYPT  input-file key-name [qualifiers]



Additional information available:

Parameters      Qualifiers
/BACKUP         /BEFORE         /BY_OWNER       /COMPRESS       /CONFIRM
/DATA_ALGORITHM /DELETE         /ERASE          /EXCLUDE        /EXPIRED
/KEY_ALGORITHM  /MODIFIED       /OUTPUT         /SHOW           /SINCE
/STATISTICS     /VERSION
Examples        /AUTHENTICATE   /CREATE_KEY     /REMOVE_KEY