Compression and Encryption Flashcards

(25 cards)

1
Q

What are the main benefits of compression?

A
  • Amount of data required to store data is reduced so more files can be stored on a computer system or on external storage
  • Amount of data required to transmit data is reduced so less bandwidth is required, reduced congestion on the network, increased transmission speeds
  • **improves playback **of video and audio with less buffering due to reduced size
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the other benefits of compressions?

A
  • Using compressed images in web pages reduces loading times
  • Improves playback of media streams with less buffering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is lossy compressions?

A

Form of compression where unnecessary detail is removed permanently from the original data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the +ive and -ive of lossy compression?

A

+Greatest reduction in file size
-Permanent loss of quality
Ideal for image and audio

ideal for compressing images and audio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is lossless compression?

A

Form of compression that uses algorithms to efficiently represent repeating patterns within the original data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the properties of lossless compression?

A

+No original data is lost so can be perfectly reconstructed
-Less reduction in file size
This is the only option where data cannot be lost such as text and program files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the JPEG image file?

A
  • Form of lossy compression that averages similar colours across adjacent pixels (permanently removes details)
  • Suitable for photographs which do not have sharp edges
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a PNG image file?

A
  • Lossless compression that efficiently encodes repeating patterns
  • Higher quality images with sharp edges such as logos, icons and texts.
  • Larger file sizes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an MP3 file?

A
  • Uses lossy compression to remove detail from audio recordings that we cannot perceive then other algorithms are used
  • Results in files that are around 10 times smaller
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is text compressed?

A

Text can only be compressed using lossless compression. Otherwise text files such as source code could fail to be interpreted/compiled otherwise.

Therefore we use Dictionary Compression or Huffman Tree Encoding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Run Length Encoding?

A

Simple form of lossless compression that represents repeating patterns of data more efficiently. E.g. 6 white pixels in a row could be encoded into 6w

not all data suitable if no repeating patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Dictionary Based Compression?

A

A form of lossless compression where frequently occurring pieces of data are replaced by an index of a dictionary.

  • Words are stored in a dictionary, each with an index number pointing to it
  • The text is then encoded using the dictionary index values to represent each word
  • Dictionary must also be sent with the original file
  • Works best for long documents with many common words (not short texts with little repetition)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does Dictionary Based Compression work?

A
  1. Each word in a piece of text is stored in a dictionary along with an index number
  2. Message is then encoded using the dictionary index values in place of the original data
  3. The resultant message will be significantly smaller, although the dictionary must also be sent/stored with the file.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is encryption?

A

The process of making information unreadable to unauthorised parties through the use of an encryption algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does encryption work?

A

A cipher is applied to plaintext using a key to transform it into ciphertext so that it is not understandable if intercepted during transmission without the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is computational security?

A

A cipher is considered computationally secure if it cannot be broken using current technologies within a reasonable timeframe.

17
Q

What are methods for cracking ciphers?

A
  • Frequency analysis
  • Looking for other patterns
  • Dictionary attacks
18
Q

What is frequency analysis?

A

It involves looking for frequent symbols within the cipher text and mapping them to common letters in the language of the original message.

19
Q

What is a dictionary attack?

A

A list of common words or phrases that can be compared to the cipher text to see if any patterns arise

20
Q

What is a Caesar cipher and how does it work?

A

A basic substitution cipher where each letter is substituted for another. A numeric key is used to determine the distance that each letter should be shifted by.

21
Q

Why is a Caesar cipher not computationally secure?

A
  • It can be cracked almost instantly using basic brute force attacks as there are only 25 possible keys
  • Frequency analysis is very effective (common letters)
  • Each character is always converted to the same cipher text letter
  • As it is only a shift cipher you only need to map one of the letters between plaintext and cipher text to deduce mapping for all letters
22
Q

When is a Vernam cipher perfectly secure?

A
  • key used is truly random (e.g. using atmospheric radiation)
  • key is at least as long as the plaintext
  • key used only once and then discarded
  • key itself must be transferred securely
23
Q

How do you use a Vernam cipher?

A

To encrypt a message, each character in the plaintext and key are encoded into their binary representations in a given character set
- bitwise XOR binary representations of plaintext and key together
- convert binary result back to characters

24
Q

Why is a Vernam cipher perfectly secure?

A
  • Brute force would not work as key is randomly generated, -there are too many possible keys (not possible) to try all of them (and multiple plaintexts can be derived)
  • Different plain text letters can map onto the same plaintext letter, so frequency analysis does not happen as cipher text letters have uniform probability
25
Define plaintext, ciphertext and cipher.
Plaintext: unencrypted information Ciphertext: encrypted information Cipher: encryption algorithm used