Decryption aside, reverse-engineering anything is extremely difficult - I've seen projects like this take much, much longer than 3 days even when no encryption is involved. But as for the encryption itself, the author says himself: "the 'encryption' method was laughably simple." That may be "good" encryption from a hacker perspective, in that it's easy to work around, but it's not "strong" encryption in any book.