SLR 9/ Compression, Encryption and Hashing Flashcards

1
Q

Define Lossy Compression

A

Algorithm used to strip out least important data. Typically used for multimedia files. Original file cannot be restored. Examples: JPEG, MP3, MPEG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Lossless Compression

A

Typically less effective at reducing file size. Essential for some file types such as computer programs. Original file can be restored. Examples: ZIP, PNG, GIF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Generic Compression

A

Reduces download times. Reduces requirements on file storage. Makes best use of bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Symmetric Encryption

A

The data has an encryption key and a decryption key is used to decrypt the data. there are only 1 key for encryption and 1 for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Asymmetric Encryption

A

The data has a public key and a senders private key. Combine them to make combined key used for the encryption. then once encrypted it uses again the public key and the recipients private key to get the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

“Hashing and encryption are essentially the same thing, as they turn plain text into an unreadable format.” Explain what is wrong with this statement.

A

A hash is a string or number generated from a string of text. Hashing algorithms are designed to be one way, so it should be impossible to turn a hashed value back into the original text. Hashing is different from encryption in that an encrypted message can be reversed back into the original message if you posses the correct key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Provide a good example of what hashing is used for and justify your answer.

A

Storing passwords because hashes are one-way. If a password is stored in a hashed format, it should be very difficult to regenerate the original password.It is good in any situation where you need to compare a value with a stored value but you can’t store the plain text version for security and privacy reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is salt and how is it used with hashing algorithms?

A

A random data item often used as an additional input to hashing algorithms. It helps generate extra secure hashed values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly