Stego doesn’t work that way, sorry. The process is you take your plaintext and encrypt it, the reason is to whiten it (i.e. make it random in plain language). You treat that cyphertext as a bit/nybble sequence. You than take your transport target and (here is the big!!! requirement) take the LSB that should also be random and replace it with your cyphertext subsequences. A common payload is an image file. It really, really, really helps if the original file is not available to Mallet (other wise a simple diff will expose your subterfuge). Check out Bruce Schneier’s book Applied Cryptography 2ed (red cover) for a good intro, even if it is from the 90s. Neal Koblitz’s number theory books is also good but post-grad level. Just a suggestion from a Cypherpunk :)
Stego doesn’t work that way, sorry. The process is you take your plaintext and encrypt it, the reason is to whiten it (i.e. make it random in plain language). You treat that cyphertext as a bit/nybble sequence. You than take your transport target and (here is the big!!! requirement) take the LSB that should also be random and replace it with your cyphertext subsequences. A common payload is an image file. It really, really, really helps if the original file is not available to Mallet (other wise a simple diff will expose your subterfuge). Check out Bruce Schneier’s book Applied Cryptography 2ed (red cover) for a good intro, even if it is from the 90s. Neal Koblitz’s number theory books is also good but post-grad level. Just a suggestion from a Cypherpunk :)
Thanks for your reply! What is “Mallet” in this context?