05 Data Representation Flashcards
Define encryption and its purpose.
Encryption is the process of converting a message from plain text into cipher text.
The purpose of encryption is to make sure that data cannot be understood if intercepted.
Explain why Caesar cipher is easy to crack.
The Caesar cipher is easily cracked because there are only 25 possible keys.
You can easily carry out a brute force attack and try each key in turn until you decipher the data.
Can also carry out frequency analysis - E is the most common character
Briefly outline Vernam ciphers and the one-time pad.
- Substitution cipher where each plain text character is encrypted using its own key. (prevents any useful information being revealed through a frequency analysis of the cipher text.)
- This key is randomly generated or is taken from a one-time pad, e.g. a page of a book, atmospheric noise, radioactive decay (truly random and generated from a physical, unpredictable formula)
- The key must be equal in length to the plain text message.
Compare Vernam cipher with ciphers that depend on computational security.
Vernam cipher reveals no fingerprint as each character is encrypted with its own key and key isn’t derived from computer algorithm (keys from algorithms can always be unpicked)
Define cipher, plaintext and ciphertext.
cipher = an algorithm for encrypting and decrypting data
plaintext = any readable data that can be understood without the use of a decryption key or device
cipher text = data that is unreadable because it has been encrypted with a cipher
Define what MIDI is.
Musical Instrument Digital Interface
a technical standard that includes hardware specifications and a protocol for the communication of electronic musical instruments to produce and manipulate music.
Outline how MIDI works.
A MIDI file consists of a list of instructions or event messages that explain what notes must be played, when they must played, and how long or loud each note should be. e.g. pitch, volume, tone
Describe the advantages of using MIDI files for representing music.
- A MIDI file uses far less storage space than an equivalent sampled recording as files only consist of event messages, not a series of precise measurements of amplitude
- Also, the performance data can be easily manipulated, for example, the pitch or duration of a note can be changed, or the note can be set to be played by a different instrument.
- Synthesised sound often doesn’t sound realistic
Outline ASCII
American Standard Code for Information Interchange
Uses 7 bits to represent characters, which allowed for a maximum of 128 characters to be represented
Only consisted of European characters
Outline Unicode and the need for this character set.
There are three standards of Unicode: UTF-8 is a variable-width encoding as it can expand to 16 or 32 when needed; UTF-16 can expand to 32 bits; UTF-32 is fixed-width encoding.
The widespread use of the World Wide Web made it more important to have a universal international coding system.
The range of platforms and programs has increased dramatically, with more developers from around the world using a much wider range of characters.
List the four error-detection methods.
- Parity bit
- Checksum
- Check digits
- Majority voting
Explain how parity bits work.
- Uses either odd parity or even parity
- When one byte is transmitted, one bit reps the parity bit
- If odd parity is used, the parity bit will be set to either 1 or 0 to make the number of ones in the byte odd
- The receiving device checks the number of 1’s against the type of parity (stored in packet header) and if they don’t align, we know there has been an error
- Packet is sent again
Explain how majority voting works.
- Each bit in the data being sent is replicated an odd number of times (usually three)
- The receiver assumes the correct bit is the majority out of the three that are sent
- The possibility of an error being missed can be reduced by choosing a large number of repetitions, but, this increases the amount of redundant information that needs to be transmitted across the channel.
Describe check digits.
- An extra digit that is placed at the beginning or end of a number and is used to identify a product (ISBN or a barcode) or verify a user
- The main purpose of check digits is to recognise and prevent human errors when entering or assigning identification numbers
- digits produced by algorithms that often use modulo arithmetic
- For ISBN-10, it is calculated so that if you take the sum of the multiplication of each digit with its position and perform mod 11, the result is 0.
What are checksums?
- Performs an arithmetic algorithm on the bytes of data that are being sent
- Sends the sum with the data
- Receiver device calculates the checksum using the same algorithm on the data received
- Verifies checksum received against the value calculated
- If they don’t match the data is resent