In principle you are creating a key stream based on a secret key and a public, hopefully non-repeating piece of information: the date. This can be secure, it is how stream ciphers work after all.
However, that's the theory, let's look into the practical issues with your scheme:
- Do you have a way to store or restore the current date? If you need to store it then you have increased the data size.
- The date here acts as a nonce, otherwise the security is as low as for a many-time-pad.
As for 2: How do you know for sure that you do not repeat the date? Can you be 100% sure for the encryption method to be only called once with one particular date? I'm presuming that you are using a date format that cannot repeat by itself, but clock differences and such are still a problem.
The type of cipher that you may be looking for is called FPS, Format Preserving Encryption. It has a bit of a different security proposition as a stream cipher: it is secure except for the fact that it will create the same ciphertext for the same input.
However, it is possible to combine the ciphers with a so called "tweak" which may be public:
In addition to the formatted data for which the modes provide confidentiality, each mode also takes an additional input called the “tweak,” which is not necessarily secret. The tweak can be regarded as a changeable part of the key, because together they determine the encryption and
decryption functions. Tweaks that vary can be especially important for implementations of FPE modes, because the number of possible values for the confidential data is often relatively small, as discussed in Appendix A and Appendix C.
Your "date" may be a perfect tweak, or at least component of a tweak, assuming that the date doesn't require additional storage (which would of course defeat the purpose of a FPS scheme). In principle an ever changing input that is common for each plaintext (like the current date) is not the best input for a tweak. A hash over a non-changing data element that is related to the plaintext would be better, like a user ID + column name, for instance.
One practical disadvantage of FPE is that it is often missing from mainstream crypto libraries. It also has had some breaks and near breaks of cryptographic security related to it, especially for small domains - so please remain vigilant and don't use just any FPE scheme or implementation.