WireGuard [...] IPsec , / TLS, OpenVPN, , [].
It is worth noting that WireGuard is cryptographically self-confident. He intentionally lacks the flexibility of ciphers and protocols. If serious holes are found in the underlying primitives, all endpoints will need to be updated. As you can see from the ongoing stream of SLL / TLS vulnerabilities, encryption flexibility has now increased tremendously.
WireGuard uses Curve25519 for key exchange, ChaCha20 for encryption, and Poly1305 for data authentication. It also works with SipHash for hash keys and BLAKE2 for hashing.