1.3.1 - Compression, Encryption, Hashing Flashcards

1
Q

Compression advantages

A
  • Reduces download time
  • Uses less bandwidth
  • Takes up less storage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Compression disadvantages

A
  • Takes time to compress

- Uses processor time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Lossy compression

A

Where compression removes non-essential data. Compresses to a smaller size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

JPG

A

Compresses pixels in an image by removing colours the human eye cannot distinguish between

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MP3

A

Removes audio frequencies the human ear can’t detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MP4

A

Only records changes in differences between picture frames of video rather than each entire frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Lossless compression

A

Patterns of data are summarised and recorded in a shorter format without removing any data
The original file can be recovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Run Length Encoding

A

Summarises data by saying the data and how many times repeated data is repeated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dictionary compression

A

Spots patterns of data that are repeated and stores them in a dictionary, stores in the main file
Any occurence of the repeated data will be replaced by its index

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ZIP

A

Identifies repeated file content and replaces every occurence with a repeated code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

End-to end encryption

A

The ciphertext is only decoded when it reaches the device of the recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Encryption

A

A way of making sure data cannot be understood if you don’t possess the means to decrypt it.
The message is encrypted using a cipher algorithm and key and decrypted when received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ciphertext

A

The text produced by the cipher algorithm and key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Plaintext

A

The text produced when the ciphertext is decoded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Caesar cipher

A

A cipher in which each letter of the alphabet is shifted by the same amount

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vernam cipher

A

A random sequence equal than or greater in length than the plaintext is used once.
Works by using a XOR between the ASCII codes of the encrypted characters and the characters of the one-time pad.

17
Q

Vernam cipher one-time pad

A

The encryption key (one-time pad) is shared with the recipient by hand and is destroyed immediately.
The one-time pad is generated from physical and unpredictable phenomena.

18
Q

Symmetric encryption

A

Also known as private key encryption

The same key is used to encrypt and decrypt data so it must be shared with the recipient

19
Q

Asymmetric encryption

A

The recipient’s public key is used to send data securely

Only the recipient’s private key can be used to decrypt the ciphertext

20
Q

Hashing

A

Uses a hashing algorithm to map an input to a shorter length of hex characters
You cannot convert the encrypted message back to the original

21
Q

Hashing uses

A

Storing PINS/passwords securely

22
Q

Hashing salt

A

Adding random data to the input to change the hashing output

23
Q

Compression

A

The process to reduce the storage space required by a file