Comment by TobTobXX

3 years ago

> Would require knowledge of the encryption sequence...

This is security by obscurity. Reputable encryptions work under the assumption that you have full knowledge about the encryption/decryption process.

You could however argue that the sequence then becomes part of the key. However, this key [ie. the sequence of encryptions] would then be at most as strong as the strongest encryption in this sequence, which kindof defeats the purpose.