Provides an encrypted storage. The keys are hashed with a secret, so
their existence cannot be verified without the knowledge of the secret.
The values are encrypted using the key, a salt, and the secret, so
stream cipher initialization varies for each stored value.