The app store already encrypts your application's executable file (or most of it) before sending it to a user's device. The iOS kernel decrypts the encrypted part of the file, in memory, when it launches your app.
Since Objective-C looks up classes by name when loading dynamic libraries (like UIKit and Foundation), and looks up method selectors by name at runtime, those class and selector strings must appear in your executable, but they are in the encrypted part of the file.
Jailbreakers can already defeat the iOS encryption system by examining your app's memory after the kernel has decrypted it.
Spending more time trying to hide these strings is almost certainly a waste of time.
UPDATE
If your target market is in a part of the world where jailbreaking is common, you might want to look for an application idea that uses a server back-end, and use in-app purchase to sell server access as a consumable item. Your server can verify that users have paid for server access, and you can ban accounts that try to steal access.