1.3.1 Compression, Encryption, Hashing Flashcards
(34 cards)
What is compression
Reducing the size of a file by identifying repetitions of data
What are the attributes of Lossy Compression
Reduces File size,
Permanently deletes some data,
Useful for compressing image files
What are the attributes of Lossless Compression
Reduces File size,
Patterns in data are summarised in a shorter file format,
No data deleted,
Useful for compressing text documents
What’s dictionary compression
Splits files up into repeated data patterns,
Stores these in a dictionary
What’s a dictionary
A data structure that allow you to store key-value pairs. Each word can be stored as an ASCII-code of 8 bits
What’s encryption
The process of converting a message from plain text to cipher text,
Requires a key
Prevents data from being understood if intercepted..
What’s decryption
Process of converting cipher text back into plain text requires a key
What’s a message
Data that will be communicated between 2 parties
What’s plaintext
A message in an easily human readable form
What’s cipher text
An encrypted message
What’s a cipher
A set of instructions (algorithm) for encrypting plain text
What’s authentication
Proving the identity of the sender
What’s symmetric encryption
The same private key is used to encrypt and decrypt,
The key must be shared between the sender and receiver,
Key can be easily intercepted when sharing
What’s Asymmetric Encryption
Two different ( yet mathematically linked) keys are used to encrypt and decrypt,
Keys don’t need to be shared
Public key used to encrypt
Private key used to decrypt
Why do most systems use asymmetric encryption
To generate a symmetric key, securing limited communication sessions
What type of key exchange is used to generate a symmetric key
Diffie Hellman key exchange is used to generate it over transport layer security
What is Transport Layer Security
An encryption that’s used to secure TCP/IP protocols
What’s Caesar cypher encryption
Encryption that shifts each letter of plain text by an amount in a cyclical manner,
The amount is specified by the key
Advantages of Caesar cypher
Quick to reveal message
Cons of Caesar cypher
Easily crackable - only 25 possible keys
What’s the one time pad
A substitution cipher, in which each character is encrypted using its own key,
It’s theoretically impossible to crack and used by the vernam cipher
Define computational security
When a scheme cannot be cracked in reasonable time
What are the prerequisites of computational security
Key must be at least the same length as the plain text,
Characters in the key must be truly random,
The key must only be used ONCE,
Must only be two copies of the key, and it must be kept secret,
Key must be destroyed after use
What’s a hash table
A data structure that implements an associative array