1.3.1 Compression, Encryption and Hashing Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Define lossy compression?

A

Lossy compression reduces the file size by disregarding some of the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name a advantage lossy compression?

A

Lossy compression reduces the size of the file by a large amount

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name a disadvantage lossy compression?

A

Some of the data is lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define lossless compression?

A

Lossless compression reduces the file size but original file can be recovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name a advantage lossless compression?

A

Reduces the size of the file, the original data can be recovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name a disadvantage lossy compression?

A

Larger files than if you were to use lossy compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name 2 examples of lossless compression?

A

Run Length Encoding
Dictionary Encoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define RLE ( Run Length Encoding)?

A

Repeated data is removed and replaced with the value and the number of occurrences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dictionary EncodingDefine RLE ( Run Length Encoding)?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where is lossy compression typically used?

A

Videos
Audio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define symmetric encryption?

A

The sender and the receiver share the same private key
The key is shared in a key exchange, this key is both used for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name a disadvantage of symmetric encryption?

A

If the private key is intercepted all of the communications can be intercepted and decrypted using the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Caesar shift encryption?

A

Caesar cipher shifts the letters in the alphabet to the right by a given number of characters. (Parameter being the Key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name an advantage of Caesar shift?

A

The cipher is simple and easy to understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name a disadvantage of Caesar shift?

A

There are only 26 possibilities meaning it is very easy to crack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define XOR encryption?

A

An XOR encryption is carried out between the binary value of the first character of the plain text and the key (one-time pad)

17
Q

Name an advantage of XOR shift?

A

It is theoretically un-hackable as long as the one-time pad isn’t used more than once.

18
Q

Name a disadvantage of XOR shift?

A

If the one-time pad is compromised then the message can be reversed

19
Q

Define asymmetric encryption?

A

Two keys are used public key and a private key
The public key can be published anywhere, the private key is kept secret
These form a key pair and are mathematically related to each other
A single key cannot be used to encrypt and decrypt it can be encrypted with the recipient’s public key and decrypted with its private key
The message can only be decrypted by you

20
Q

Name an advantage of asymmetric encryption ?

A

It is one of the most secure methods of encryption

21
Q

Name a disadvantage of asymmetric encryption ?

A

It is a slow process

22
Q

Define hashing?

A

A hashing function is when an input is turned into a fixed size value, it can’t be reversed

23
Q

What 3 things are needed for a hashing algorithm to be good?

A

low chance of collision
be quick to calculate
and provide a smaller output then input

24
Q

Dictionary Encoding

A