# Do you speak geek: Tales from the cryptographer

## Email Security Guidelines, Encryption and Appliances

### Looking for something else?

Keeping the various encryption algorithms straight and knowing what to use when isn't easy. Take this quiz to find out how fluent you are in the language of encryption algorithms, and let us know how you did. Click on the link to find the answer within the term's definition.

1. What is the term for a procedure or formula for solving a problem? Hint: It derives from the name of the mathematician Mohammed ibn-Musa al-Khwarizmi.

2. What is the most commonly used encryption and authentication algorithm and is included as part of the Web browsers from Microsoft and Netscape?

3. What standard originated at IBM in 1977 and applies a 56-bit key to each 64-bit block of data?

4. What did the National Institute of Standards and Technology choose Rijndael for? Hint: This is a replacement for DES.

5. What algorithm uses a single key of any length up to 256 bits and is said to be efficient both for software that runs in smaller processors such as those in smart cards and for embedding in hardware?

6. What encryption method involves the application of three keys in succession?

7. What encryption algorithm uses a variable-length key from 32 bits to 448 bits, making it useful for both domestic and exportable use?

8. What encryption algorithm uses a block cipher with a 128-bit key and is considered to be among the best publicly known algorithms. Hint: It was developed in Switzerland.

9. What algorithm was selected by the U.S. National Institute of Standards and Technology as the candidate for the Advanced Encryption Standard?

10. Who offered a \$10,000 reward in 1997 to anyone who could break a message secured with the DES? Hint: These three individuals are the brain-children of their own encryption algorithm.

How'd you do?
9-10 correct: Encryption erudition
6-8 correct: Encryption excellence
3-5 correct: Encryption encyclopedia needed
0-2 correct: Have to decrypt your brain

Further test your knowledge of cryptography with this quiz.

• Our columnist explains the basics of cryptography, including the inner-workings of algorithms.
• Here is a lesson on the two basic types of encryption algorithms.
• Learn how encryption secures e-mail.

• This was last published in February 2005

## Content

Find more PRO+ content and other member only offers, here.

#### Start the conversation

Send me notifications when other members comment.

## SearchCloudSecurity

• ### How the Flip Feng Shui technique undermines cloud security

The Flip Feng Shui attack against hypervisors could have both short and long-term effects on enterprises. Expert Ed Moyle ...

• ### How cloud endpoint protection products benefit enterprises

Cloud endpoint protection products are outpacing standard endpoint protections. Expert Frank Siemons discusses the evolution of ...

• ### How Microsoft's Secure Data Exchange bolsters cloud data security

Microsoft's new service, Secure Data Exchange, can help protect cloud data while in transit and at rest. Expert Rob Shapland ...

## SearchNetworking

• ### Dell's new multigig campus switches built for wired, wireless LAN

Dell is pitching the open networking features of its new campus switches. The hardware's ability to run any of several network ...

• ### API growth forcing vendors to take notice or risk losing out

The API is fast becoming a must-have in modern networking. But API growth is forcing vendors to rethink how they want their ...

• ### How to smooth the cloud-based networking path

Cloud-based networking is the norm now. Learn which technologies allow companies to reap the benefits of the cloud for their ...

## SearchCIO

• ### PrivacyCon: Tech's assault on (obliteration of?) consumer privacy

The attack on consumer privacy by new tech is huge and growing, enabled by consumers and greased by profit; in other words, a ...

• ### Five analytics priorities for 2017

The International Institute for Analytics recommends embracing AI, clearly defining roles, and finding a balance between ...

• ### International Institute for Analytics' five analytics predictions

AI classification systems will be created, predictive models will be scrutinized and analytics teams will be decentralized. ...

## SearchConsumerization

• ### Android, Windows tablets from HP take aim at business users

HP released a new line of tablets targeting business users. The HP Pro Slate 8 and Pro Slate 12 run Android and cost \$449 and ...

• ### Microsoft to lay off 18,000, Nokia X moves to Windows Phone

Microsoft will lay off 18,000 people over the next year while the Nokia X line of Android smartphones, which was unveiled earlier...

• ### Microsoft Surface Pro 3 vs. Microsoft Surface Pro 2

Surface Pro 2 and Surface Pro 3 are different enough that Microsoft is keeping both on the market as competing products. Which ...

## SearchEnterpriseDesktop

• ### Windows 10 how-to guide

It's important to know how to work with Windows 10, including what to do about taskbar clutter and how to change the default save...

• ### MacBook Pro issues have bad timing, as Surface surges

Shortfalls of the new MacBook Pro are evident, as Apple pays more attention to other areas of its business. The lack of ...

• ### New VMware EUC lead: Shadow IT is the biggest cybersecurity threat

IT pros work to defend against breaches and hacks, but it's their own users that continue to be a threat. This issue could drive ...

## SearchCloudComputing

• ### Evaluate hybrid cloud management tools for your enterprise needs

Selecting hybrid cloud management tools is a complex task. Buyers must consider a long list of criteria such as costs, APIs, ...

• ### Google key management keeps pace with AWS, Azure

A new Google Cloud Key Management Service attempts to keep pace with AWS and Azure with an important feature for highly regulated...

• ### Cloud partnerships, acquisitions to shake up market in 2017

With rising competition between cloud vendors, more will pursue partnerships or acquire other companies to boost their own ...

## ComputerWeekly

• ### Demand for datacentres in "edge" countries tipped to fuel next wave of colocation M&A

451 Research predicts developing countries will be the source of increased colocation market revenue in the years to come, and ...

• ### Security Think Tank: Use DNS proxy services to bolster security

What are the main security risks associated with DNS, and how are these best mitigated?

• ### Facebook under fire for WhatsApp security backdoor

A security researcher has discovered a vulnerability in the way WhatsApp implements encryption, raising concerns that it will be ...

Close