Topsecret (Linux version)

This is the home page mirror for the program "TOPSECRET".

The Dos version of this program is also widely available on the net.

Down load the latest version (includes source code):  Down load Topsecret (for Linux)
Note: This program has been tested with Ubuntu 14 .

This program is freely distributable.


"TOPSECRET", a share ware program to encrypt your sensitive files.
This program does not use RSA type algorithms which may be restricted for export.
 This program can use the aid of a "Catalyst" file (which can be any file)
to encrypt another file (any file). (Using a fairly random and changing
Catalyst gives you the most protection). The Catalyst acts as a
key to code and decode your sensitive files. Of course you can even make
your own catalyst by encrypting one file with another. A periodically
changing Catalyst can be made by combining 1- Registered mail file
2- Courier file 3- Last message file; This would ensure high security for
the transmission of your sensitive files. I am sure you will come up
with your own methods. You will find the program SIMPLE to operate, try it!

This version is a LINUX shell (bash)  based program, so you need to be familiar with
shell commands. To get permission to execute you may have to use command
"chmod +x ./tops" .You may have to transmit encrypted e-mail with a *.gzip
or other extensions so  that your browser does not try to display the encoded junk.

For programmers:

This Linux program is data compatible with  the original DOS releases.

             1        2              3  4               5              6
myterm: ./tops onefile.dat 1 twofile.enc catfile.dat mycodegoeshere
                       |                |               |    |              |
                       input file    1=encrypt |   catalyst    personal key
                                        2=decode |
                                                         new output file

In this example, "onefile.dat" is encrypted (option-1) with the aid of a catalyst file "catfile.dat"
and the output is named "twofile.enc". "mycodegoeshere" is the personal key.

- A "2" in field 3 would decode a program when all other data is valid.

If all of the six parameters are not present, the program runs in default
mode where all the data is taken manually.

If you have obtained the executable program from questionable sources,
then it would be a good idea to compare program by using the "cmp" command
with more reliable sources. For example: If "cmp /util/tops /download/tops"
returns only a prompt and no errors, then the compare operation was

The encrypted data is the same size as the input data.
This means that there is less chance of compromising clues being left
in the data. Since users can vary how they use the program, there is
no "standard" encryption. That would mean that there is  no standard
way to attack the encrypted data.

Since command line input script programs may contain sensitive information,
the script and the associated files/data should not be compromised.

History files such as;


may also store sensitive information. In this case one thing you
could try is the  following commands for EVERY session ;

myterm: HISTSIZE=1
myterm: set   ----(shows current values for bash variables)

The command line input is ideal for time critical operations. It can be used
in conjunction with RAM drives and scripts for real time network data encryption.

"The business of security, is the business of paranoia."