Which type of algorithm provides the highest level of protection against brute-force attacks?