Which three algorithms should be avoided due to security concerns? (Choose three.)