Just to back up what Anonymous Monk said I will quote Professor Dan Boneh "Be careful when using crypto: A tremendous tool, but if incorrectly implemented products will work, but may be easily attacked. Make sure to have others review your designs and code. Don’t invent your own ciphers or modes." You are inventing your own mode here I think.
In reply to Re^2: Securing an API secret key
by Odud
in thread Securing an API secret key
by Anonymous Monk
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |