I agree entirely and personally think that the less we know about the OP context, the less we should condone "security by obscurity". ++ to Moritz and Corion and Perrin and those advocating already written, already tested algorithms and modules.
As to the idea that keeping your algorithm secret is as good as keeping your key secret, the Snake Oil FAQ from comp.security has a section to address this directly, and the folks at the American Cryptogram Association considers it great fun to crack ciphers of an unknown algorithm.
In reply to Re^2: Encryption using perl core functions only
by goibhniu
in thread Encryption using perl core functions only
by redhotpenguin
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |