Comment by TobTobXX
3 years ago
> Would require knowledge of the encryption sequence...
This is security by obscurity. Reputable encryptions work under the assumption that you have full knowledge about the encryption/decryption process.
You could however argue that the sequence then becomes part of the key. However, this key [ie. the sequence of encryptions] would then be at most as strong as the strongest encryption in this sequence, which kindof defeats the purpose.
No comments yet
Contribute on Hacker News ↗