Realistically, though, it's been proven time and time again that the most robust encryption algorithms don't rely on the process being secret, but well known, well read and examined, but irreversible without the key regardless of this. "I'm not telling you how I made this string" tends to be the hallmark of an obscure, but weak encryption method.