OCTADE
@octade@soc.octade.net
chacha20 and some other ciphers are not susceptible to the meet-in-the-middle attack and choosing 2 or 3 of those ciphers to multicipher with different keys does increase the security of the ciphertext. I have a method in which I use chacha20 exclusively, but for each new encipherment in the cascade I generate a new, random salt, encrypt the salt with a unique stream key, generate a new hash-derived passphrase, and the salt is not prepended to the ciphertext. Breaking that is like putting scrambled eggs back in the shell and uncooking them.