The security of an algorithm rests in the key. If you aue using a cryptographically weak proccess to generate keys, then your whole system is weak.
[Bruce Schneier - Applied Cryptography. Protocols, Algorithms and Source Code in C]
Security is a process, not a product.
[Bruce Schneier]