Systems and methods are described which utilize a recursive security
protocol for the protection of digital data. These may include encrypting
a bit stream with a first encryption algorithm and associating a first
decryption algorithm with the encrypted bit stream. The resulting bit
stream may then be encrypted with a second encryption algorithm to yield
a second bit stream. This second bit stream is then associated with a
second decryption algorithm. This second bit stream can then be decrypted
by an intended recipient using associated keys.