An introduction is presented in which the editor discusses articles in the issue on topics including stream encryption algorithm; hiding persistent and stealthy data in files; and using Genetic Algorithm to generate keys for the fully homomorphic encryption scheme.