Encryption algorithms have been used since a long time to keep secret data safe from intruders. These algorithms are generally improved based on drawbacks of earlier algorithms. But each encryption algorithm has a drawback that is exploited very well by the intruders. These algorithms are so well published that their mechanism gets known to everyone and thus the loopholes are easily exploited. In order to overcome these drawbacks and in a bid to take out the best aspects from the famous algorithms and covering their flaws, in this paper, a technique of using multiple algorithms in a predefined order on the same set of data is suggested.