1.3.1 Encryption and shi Flashcards
(9 cards)
Lossy
PERNAMENTLY removes data
Lossless
REWRITES in more efficient format
Compression
Reducing storage space required by file (helps transfer over internet)
Run Length Encoding
() Repeated values are replaced with ONE OCCURENCE followed by NUMBER OF TIMEs it should be repeated
- Relies on consecutive data being the same, otherwise doesnt reduce much
Dictionary Encoding
() Frequently occuring data replaced with INDEX
() Compressed data is stored alongside DICTIONARY which matches frequently occuring data to an index
Symmetric Encryption
() Sender and receiver share PRIVATE KEY
() KEY EXCHANGE: Private key distributed
() Both for encrypting and decrypting
() If key intercepted, all data intercepted
Asymmetric
KEY PAIR: PUBLIC KEY, PRIVATE KEY (Mathmatically related)
Public key: ENCRYPTION
Private key: DECRYPTION
Private Key Encryption: Verifies message was sent by you (signed)
Symmetric and assymetric eval:
+ Symmetric: Large databases, messages in bulk
Hashing
() KEY: Input, HASH: Fixed size value
() Uses a hash function
() Hashes cant be reversed
() Collision methods: Store items in a list under hash value, use a second hash to generate a new hash
Uses:
() Lookup data in constant time
() Constant time activities such as caches and databases
Good Hashes:
() Low chance of collision
() Quick to calculate
() Smaller than the input