1.3.1) Compression, Encryption and Hashing Flashcards

1
Q

Why do we use compression?

A
  • Cheaper
  • Quicker transmission
  • Faster loading times
  • Reduces buffering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Lossy Compression do?

A
  • Removes non-essential data
  • reduces quality
  • most effective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What happens in Lossless Compression?

A
  • Reduce file size without loss of data
  • Records patters in data to reassemble the data
  • Used when all data in file is essential
  • Results in a larger file than lossy compression.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Run Length encoding?

A
  • A type of lossless compression
  • Replaces sequences of repeated characters with a flag character, the character the number of times it is repeated.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is dictionary based compression?

A
  • A type of lossless compression
  • A dictionary of common words/characters is created
  • sequences in the text are replaced with pointers
  • References are shorter than the sequence so file size is reduced.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is encryption?

A

Encryption transforms data from one form to another to prevent an unauthorized third party from understanding it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the caeser cipher?

A

A cipher in which the alphabet is coordinated with other letters, being shifted by a certain amount, defined by the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the vernam cipher?

A
  • The only cipher with perfect security
  • A “true random” key of equal or greater lengtht than the plaintext is generated.
  • An XOR is applied to generate the cipher text.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vernam Cipher: Pros

A
  • The only cipher with perfect security
  • There is a very very low chance that the key can be randomly discovered.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vernam Cipher: Cons

A
  • Perfect random is hard to achieve.
  • Its hard to enforce a secure key
  • If key discovered can be easily deciphered.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two types of encryption?

A

Symmetric and Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Symmetric Encryption?

A
  • The same key is used to encrypt and decrypt data
  • The key is transferred with the ciphertext
  • Poor security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Asymmetric Encryption?

A
  • Uses two seperate but related keys (public and private)
  • Possible for a malicious third party to use public key and impersonate a legitimate sender
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a public key?

A

A public key so others can encrypt data to be sent to reciever.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a private key?

A

Known only to the reciever and used to decrypt a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Governments sometimes demand copies of encryption keys in order to decrypt messages if necessary. What reasons are there for governments doing this?

A
  • Illegal activities can legally be intercepted and used towards evidence
  • It can improve counterterrorism
  • Data protection- in case of loss or corruption of data encryption keys help to retrieve this.
  • Illegal transactions such as fraudulent money exchange can be monitored and deterred
17
Q

Governments sometimes demand copies of encryption keys in order to decrypt messages if necessary. What reasons are there against governments doing this?

A
  • International law can create controversy (eg is the receiver of the message from a different country)
  • Loss of trust for the government
  • People will find illegal ways to communicate without encryption.
  • Abuse of power- use of keys for own personal gain
  • If theres a mass database, if breached leaves large scale vulnerabilities
  • Risk of bias
18
Q

What is hashing?

A

A hashing algorithm distorts data, making it completely unreadable

19
Q

Why do we need hashing algorithms to store data?

A

Any external access doesn’t comprimise the data’s integrity

20
Q

Benefits of Hashing?

A
  • Secure
  • Cannot get to the original value
  • Small changes produces a completely different value
21
Q

What is a digital signature?

A

An electronic, encrypted stamp of authentication on digital information such as email messages.

22
Q

How do they help keep encryted data secure?

A

Verifies the identity of a message sender or website, issued by an official certificate authority.

23
Q

What does a digital signature include?

A

Serial number, expiry date, name and public key.

24
Q

Uses of hashing:

A
  • Prevents passwords and pins being read by a hacker
  • Quick searching, insertion and deletion of data structures.
25
Q

How does hashing prevent passwords from being read?

A
  • hashed value is stored
  • if accessed it cannot be reversed
  • a user input will be hashed using the same algortihm and it will be compared to the hashed value.
26
Q

How can hashing be used to search quickly?

A
  • Instead of assigning each value a random address, the hashed value can be used
  • when searching the value can be hashed to find the location.