1.3.1 Compression, Encryption and Hashing Flashcards
Why is it beneficial to compress files? (2)
To reduce storage space needed for files in physical storage (1) and on the internet to reduce buffering time/increase loading speed (1)
What type of compression removes unnecessary information? (1)
Lossy compression (1)
What type of compression retains all original information? (1)
Lossless compression (1)
Which media types are usually compressed using lossy compression? (3)
Audio (1) video (1) images (1)
Which media types are usually compressed using lossless compression? (2)
Text files (1) Program code (1)
What is meant by the word compression? (2)
(An algorithm that) makes a file storage size smaller (1) but information is lost in the process (1)
Why is asymmetric encryption more suited than symmetric to transmissions over the Internet? (4)
Any four from Symmetric encryption would require both parties to have copy of the key (1) this couldn’t be transmitted over the internet or an eavesdropper monitoring the message may see it (1) Asymmetric gets round thisrequirement as there are two different keys (1) One key encrypts the data (1) which can be publically distributed (1) and a different key to decrypt it (1) which is kept private (1)
Describe the pros and cons of encryption (5)
The strength and ease of use of encryption has made it widely used on the Internet. (1) E-Commerce would not be possible without it. (1) Governments are no longer able to easily crack encrypted messages they intercept. (1) This gives individuals unprecedented levels of privacy (1) But also means those communicating for nefarious purposes can do so undetected. (1)
Define Hashing and its uses (3)
A result gained by applying an algorithm to a value (1). Used for gererating predictable indexes for data (1). Used as a type of one way encryption (1).
Define Rehashing(2)
The process of resolving DATA COLLISIONS (1) by selecting where to put clashing data (1).
What are the 3 types of Rehashing? (3)
Linear moves to the next available space (1). Chaining uses a linked list (1). Overflow designates an area for rehashes (1).
What is Salt? (1)
It is data added to a hash to ensure each output is unique (1).
Why do we use salt? (3)
Most hashing algorithms are well known and hackers can use rainbow tables that store pre hashed values of a whole dictionary of possible passwords to look for a match (1). When a match is found the associated password is revealed (1). We use salt to make all password unique so that the hackers find no matches and can find out the passwords (1).