Encryption Using Different Sources