Abstract
Abstract . Information security has many aspects such as authentication, privacy, integrity and non-repudiation. This paper studies implementation of information security through cryptography and steganography. Cryptography can be loosely defined as the scramblingof data so that only an intended authorized user can unscramble it. Cryptography allows secure transfer of information over space (transmission over a communication channel) or over time (storage within a computer memory). Steganography is the related concept of hiding some piece of information within another piece of information (possibly of another type), such that the hidden information would be accessibly only to some intended authorized users. This paper offers a tutorial overview of cryptography and steganography from the perspective of a multi-key multi-stage software package (named EDSP forEncryption Decryption Software Package). This package serves as a pedagogical aid accompanying this current tutorial, though it is, admittedly, neither highly advanced nor particularly novel. It employs a one-time pad technique, wherein a key is used only once. The EDSPcombines a multitude of strong cryptographic algorithms, secret (symmetric) key ones together with public (asymmetric) key ones including the well-known RSA and El-Gamal algorithms, whose cryptanalyses show their relative unbreakability in front of strong attacks. Depending on the number of algorithms used, low, medium and high levels of security are achieved. Several random keys are generated and used only once through any encryption or decryption process. Depending on the size of message being encrypted, these keys are used through several schemes which are determined by the user. The package supports Arabic and English texts and can be enhanced toinclude more languages. It can be used with a variety of platforms with no specific hardware required. The package has a built-in capability of converting images into text and vice -verse, a key step in utilizing its cryptographic features for steganographic purposes. The steganography method is basically applied in the EDSP through converting any image into a text file or vice versa. However, hiding a secret image into another image is also performed and provided in the package. The paper briefly overviews the mathematics of pertinent operations, describes the capabilities of the developed package, and demonstrates its usefulness via illustrative examples. As an offshoot, the paper highlights contributions of the Arabs (during the glorious Islamic era) tocryptography, in general, and to cryptanalysis, in particular.