...[cut]... not all multipliers are good, and a lot of effort has gone into finding good ones.
In a cryptography setting, this means a reduction in the number of possibilities that have to be tested in a brute-force attack.
In my algorithm, the LCG parameters can be almost any odd number, which helps to make a brute-force attack much more difficult.
This is not true. If the odd number is weak, e.g. a multiplication where the number of divisors other than 1 > 2 the odd number is weak and based on simple math means that when one divider is found, the other divisors can be trivially retrieved. e.g in 27 where 3 can be found by probing, exposing 9 which in turn is 3 * 3. 3 is enough to break it. 9 is also enough to break it etc.
This can be simply found by prime factorization. That is the reason that in cryptography the use of a multiplication of 2 sufficiently large prime numbers is a core technique, where 1, p1, p2 are the only divisors which makes factorization very hard. That is to a certain extend also related to state: the more state is held, the harder it is to break the prng. Most lcg's have not enough state.
I already explained that your lcg does not have enough state in my opinion.
That's why I also said that if you use the same algorithm multiple times, albeit with different parameters, you make the final values likely weaker, not stronger. Your algorithm is merely a a very simple multiplier, addition by a constant and taking the modulo. That is not enough, even if you hold six states.
There is another problem: your over-use of modulo will amplify modulo bias and that is a real problem.
Investigate the theory of modulo bias. A good introduction that is not too mathematically involved is in this post:
https://stackoverflow.com/questions/10984974/why-do-people-say-there-is-modulo-bias-when-using-a-random-number-generator