Dear Haider, privacy is luckily scalable by the key size and the block size of cryptosystems. For example, if the bijections of 128 bits long plaintext-ciphertext-pairs can be broken, it is not automatically possible for 256 bits long plaintext-ciphertext-pairs. The same applies to key size increasement. To answer your question, if you do not trust a certain cryptosystem (anymore), then you can go for nesting with other cryptosystems.
In addition to what Peter presents, my answer to the original question might be, "it depends." The best cipher today is generally accepted to be AES, by NIST anyway. A block cipher, which can also be used in "counter mode," to encrypt and decrypt continuous streams of data. Could be text or anything else.
The computationally somewhat more efficient ciphers may be symmetric key stream ciphers. Functionally, they work much like AES when used in counter mode, but depend only on good quality pseudo-random number generators (PRNG). You need a PRNG with seeds that consist of many bits, like 128-bit seeds or better, to achieve good results.
Not sure if this link still works, because the partial government shutdown won't let me use it at the moment, to see what updates may have been introduced lately:
Currently, the use of AES in the Output Feedback Mode (OFB) mode and the counter (CTR) mode are approved by NIST as block-cipher based stream ciphers. However, dedicated stream ciphers sometimes have performance advantages, especially for software applications with high throughput requirements, or for hardware applications with constrained resources (such as limited storage, gate count or power consumption). During FY2013, the performance of some of the well-understood stream ciphers (focusing on the eSTREAM finalists) will be studied and compared to the approved block-cipher based stream ciphers. A technical report is being finalized, and is expected to be published soon.