1.3.1 Encryption and shi Flashcards

(9 cards)

1
Q

Lossy

A

PERNAMENTLY removes data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Lossless

A

REWRITES in more efficient format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Compression

A

Reducing storage space required by file (helps transfer over internet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Run Length Encoding

A

() Repeated values are replaced with ONE OCCURENCE followed by NUMBER OF TIMEs it should be repeated

  • Relies on consecutive data being the same, otherwise doesnt reduce much
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dictionary Encoding

A

() Frequently occuring data replaced with INDEX
() Compressed data is stored alongside DICTIONARY which matches frequently occuring data to an index

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Symmetric Encryption

A

() Sender and receiver share PRIVATE KEY
() KEY EXCHANGE: Private key distributed
() Both for encrypting and decrypting
() If key intercepted, all data intercepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetric

A

KEY PAIR: PUBLIC KEY, PRIVATE KEY (Mathmatically related)
Public key: ENCRYPTION
Private key: DECRYPTION

Private Key Encryption: Verifies message was sent by you (signed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric and assymetric eval:

A

+ Symmetric: Large databases, messages in bulk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hashing

A

() KEY: Input, HASH: Fixed size value
() Uses a hash function
() Hashes cant be reversed
() Collision methods: Store items in a list under hash value, use a second hash to generate a new hash

Uses:
() Lookup data in constant time
() Constant time activities such as caches and databases

Good Hashes:
() Low chance of collision
() Quick to calculate
() Smaller than the input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly