# Do you speak geek: Tales from the cryptographer

## Test your knowledge of encryption algorithms with this quiz.

This Content Component encountered an error

Keeping the various encryption algorithms straight and knowing what to use when isn't easy. Take this quiz to find out how fluent you are in the language of encryption algorithms, and let us know how you did. Click on the link to find the answer within the term's definition.

1. What is the term for a procedure or formula for solving a problem? Hint: It derives from the name of the mathematician Mohammed ibn-Musa al-Khwarizmi.

2. What is the most commonly used encryption and authentication algorithm and is included as part of the Web browsers from Microsoft and Netscape?

3. What standard originated at IBM in 1977 and applies a 56-bit key to each 64-bit block of data?

4. What did the National Institute of Standards and Technology choose Rijndael for? Hint: This is a replacement for DES.

5. What algorithm uses a single key of any length up to 256 bits and is said to be efficient both for software that runs in smaller processors such as those in smart cards and for embedding in hardware?

6. What encryption method involves the application of three keys in succession?

7. What encryption algorithm uses a variable-length key from 32 bits to 448 bits, making it useful for both domestic and exportable use?

8. What encryption algorithm uses a block cipher with a 128-bit key and is considered to be among the best publicly known algorithms. Hint: It was developed in Switzerland.

9. What algorithm was selected by the U.S. National Institute of Standards and Technology as the candidate for the Advanced Encryption Standard?

10. Who offered a \$10,000 reward in 1997 to anyone who could break a message secured with the DES? Hint: These three individuals are the brain-children of their own encryption algorithm.

How'd you do?
9-10 correct: Encryption erudition
6-8 correct: Encryption excellence
3-5 correct: Encryption encyclopedia needed
0-2 correct: Have to decrypt your brain

Further test your knowledge of cryptography with this quiz.

• Our columnist explains the basics of cryptography, including the inner-workings of algorithms.
• Here is a lesson on the two basic types of encryption algorithms.
• Learn how encryption secures e-mail.

• This was last published in February 2005

## Content

Find more PRO+ content and other member only offers, here.

#### Start the conversation

Send me notifications when other members comment.

## SearchCloudSecurity

• ### SQL injection attacks: How to defend your enterprise

SQL injection attacks threaten enterprise database security, but the use of cloud services can reduce the risk. Here's a look at ...

• ### Cloud security lessons to learn from the Uber data breach

Any organization that uses cloud services can learn something from the 2016 Uber data breach. Expert Ed Moyle explains the main ...

• ### Challenges in cloud data security lead to a lack of confidence

A new study on cloud data security provides insights into the shaken confidence in the cloud. Despite its increased use, payment ...

## SearchNetworking

• ### Cisco revenue turns positive, as software, security sales up

Cisco revenue grew last quarter for the first time in more than two years, due, in part, to rising software sales. But analysts ...

• ### Making the most of incident detection and response

This week, bloggers look into incident detection strategies, a new anomaly detection tool from ExtraHop and how Ethernet VPN ...

• ### Latest Juniper switches up throughput for cloud applications

The latest Juniper switches target companies that want a network infrastructure with the throughput and management software to ...

## SearchCIO

• ### IBM Watson CTO: A range of conversational technologies can coexist

IBM Watson VP and CTO Rob High explains why there's space for both conversational agents and chatbots in the enterprise, each ...

• ### IT priorities 2018: Regs, big data, cloud loom large for GRC pros

Regulatory initiatives remain at the top of GRC pros' lists of tech projects, according to TechTarget's annual IT Priorities 2018...

• ### How to prep for the GDPR breach notification rule

As companies prep for GDPR compliance, its breach notification rule is making waves. Csaba Krasznay, security evangelist at ...

## SearchEnterpriseDesktop

• ### VMware Workspace One helps Western Digital organize 3,000 apps

The application portal in VMware Workspace One allowed IT to streamline app delivery, and the product's cloud-based model proved ...

• ### Three PC lifecycle management options IT should consider

IT pros can use PCs and laptops until they stop working, or they can set up a lifecycle management plan that retires them after a...

• ### Microsoft Office 2019 release will force IT to migrate to Windows 10

If you're not yet on Windows 10, news about the upcoming Microsoft Office 2019 release may force your hand. Plus, the company ...

## SearchCloudComputing

• ### How to blend the advantages of cloud computing with containers

Containers and cloud sound like a perfect match. But how well does containerization help boost application portability? And will ...

• ### Prepare for hybrid cloud implementation with these key steps

As enterprises mix public and private IT resources, they grapple with app workflows, network connections and more. Here are four ...

• ### Containerized applications and the portability dream

To make containers work within a cloud strategy, you're going to need to carefully consider the complexities of porting an ...

## ComputerWeekly.com

• ### Botnets shift focus to credential abuse

Cyber criminals are increasingly using automated attacks that make use of stolen credentials, a security threat report warns

• ### ASEAN IT Priorities 2018

Every year, Computer Weekly conducts a global survey of our readers to find out their IT spending priorities for the year ahead. ...

• ### Prepare for Y2K style Meltdown strategy

The days of fixing the date bug in legacy systems may be long gone, but IT now has as much of an effort mitigating the Spectre/...

Close