How to avoid differential cryptanalysis attacks when you are inventing new cipher?
Let's say you have a $16$-round $128$-bit cipher vulnerable on differential cryptanalysis attacks. Now let's say you will add between every round:
- bitwise NOT (optional you make it ot not - randomly),
- xor with $128$-bit subkey,
- moving bits by $0$ to $127$ places.
Now it looks like the attacker have to guess many variables first (we defined it by keys), to make differential cryptanalysis attack. Because he can do it easily only without this obstructing steps between rounds. Is it good idea to use it, if I would like to make cipher resistant on differential cryptanalysis?