The project will use only ciphers and hashes which are known to be secure. The definition of secure used includes: that the algorithm has sustained a reasonable length of analysis, that it can not be brute forced with current technology in less than a decade, and that there are no covert channels.