1.3.1 Compression, Encryption, Hashing Flashcards

1
Q

Compression

A
  • Process used to Reduce file size to take up less storage space or for faster transfer over a network
  • increases the number of files that can be transferred in a given time
  • allows faster download
  • downloading a compressed file is faster than downloading the full version
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Lossy compression

A
  • reduces file size while also removing some information
  • slightly reduces quality but significantly reduced file size [1] e.g images can tolerate some reduction in quality
  • reduces image quality e.g more pixelated images or less clear audio recording
  • suitable for image audio and video
  • not suitable for text documents as important info may be lost and text may become unreadable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Lossless compression

A
  • reduces file size without losing any information maintaining the original data [1]
  • the original file can be recovered/recreated when it is uncompressed
  • suitable for executable files and documents or vector style images, cartoons and logos
  • maintains data integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Lossless compression types

A
  • run length encoding
  • dictionary encoding
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Run length encoding

A
  • a method of lossless compression
  • Condenses identical elements to a single occurrence with its count next to it
  • used in bitmap images to condense sequences of the same colour
  • relies on consecutive pieces of data being the same so more effective when data has a lot of repetition
  • doesn’t offer a great reduction in file size if there is little repetition
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dictionary encoding

A
  • a method of lossless compression
  • that replaces frequently occurring pieces of data with a shorter, unique code/index
  • compressed data is stored alongside a dictionary
  • the dictionary matches frequently occurring data to an index/code
  • original data can be restored using the dictionary
  • this method is effective for both text binary data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption

A
  • is used to keep data secure from unauthorised access when it’s being transmitted
  • is used to convert readable data into an unreadable format
  • uses keys which are specialised programs designed to scramble and unscramble data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric encryption

A
  • is a method of encryption where the same key is used for both encryption and decryption of data [1]
  • requires both parties to have a copy of the key [1]
  • the sender encrypts information using a private key before transmission
  • the receiver uses the same key to decrypt the data
  • if the key is intercepted, any communications can also be intercepted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric encryption advantages / sutability

A
  • usually faster making it ideal for encrypting large amounts of data/ faster and efficient for bulk data
  • easier to implement as it uses a single key for both encryption and decryption/ same person encrypts and decrypts e.g when backing up
  • less resource incentive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Symmetric encryptions CONS

A
  • loss/interception of the key means the data encrypted with it can be compromised and intercepted
  • so requires key to be shared securely with the other party
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asymmetric encryption

A
  • uses 2 keys, a public key for encryption and a private key for decryption [1]
  • public keys are shared openly allowing anyone to encrypt data [1]
  • the private key is kept securely/locally on the receivers side and is kept private [1]
  • use case: used when exchanging confidential data /secret communications .eg. Credit card details over the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Asymmetric encryption pros

A
  • use of a separate private private key makes it more secure
  • if the public key is lost or stolen data won’t be compromised
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hashing

A
  • the process in which an input (e.g string of characters) is turned into a fixed sized value (called a hash) using a hash function
  • even a slight change in the input message produces a totally different hash value
  • unlike encryption the hash function can’t be reversed to form the input message.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Advantage of storing password/data as a hash

A
  • hashing is useful for storing
    passwords
  • a password entered by a user can be hashed and checked against the stored hash value to see if it’s correct
  • only the hash values are stored, not the actual passwords itself so a successful hacker would only gain access to hash values which cant be reversed to gain the passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hash tables

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hash table : data insertion

A
17
Q

Characteristic of good hash function

A
  • low chance of collisions [1]
  • quick to calculate (as lots of data needs to hashed) [1]
  • provides an output that is smaller than its input, so quicker to compare hashes than original data [1]
18
Q

Collision

A

When two keys/inputs produce the same hash

19
Q

Collision resolution

A
  • Chaining: items are stored together in a linked list under the hash value/index
  • linear probing :
20
Q

Asymmetric encryption cons

A
  • it is slower than symmetric encryption
  • uses more reasources
  • if the private key is lost, there is no way to decrypt the info