Cryptography: Signing, Hashing
Public key cryptography is solid, mature, and well-documented. (Hash codes have been around forever.) This project uses standard open-source implementations and formats.
The public key is shared openly, like a username.
The private key is kept secret, like a password.
The key holder can "sign" data using his private key.
The signature can be verified by anyone with the signer’s public key, ensuring:
the data was genuinely signed by the holder of the corresponding private key and has not been modified.
No usernames or passwords are required.
Strong cryptography is hard to defeat (that's why Bitcoin works).
(The Internet liberated spam and pornography; Cryptography can Liberate Trust. When I'm feelin' melodramatic ;)