If a strong hashing algorithm is being used to hash the user's input down to a cryptographic key - okay, I'm going to have you explain that.
But if you stick to these half-dozen well-known, strong algorithms, chances are they are strong because so many people are attacking them and trying to break them.
A stronger FIPS 140-1 compliant algorithm such as 3DES can be used.
So we know we have both a really strong algorithm and a really strong implementation of the algorithm.
Remember that when you're doing a digital signature you take a document, and you hash it using a cryptographically strong hashing algorithm.
Hamachi is stated to use strong, industry-standard algorithms to secure and authenticate the data and its security architecture is open.
There are several strong algorithms around and computers are plenty fast to run them.
As a consequence of rock-paper-scissors programming contests, many strong algorithms have emerged.
Alternate encryption ID tag allows extension to stronger algorithms.
Third generation systems (1980s) were transistorized and based on integrated circuits and likely used stronger algorithms.