1.3.1 COMPRESSION , ENCRYPTION & HASHING Flashcards
what name is given to the public and private keys used in asymmetric encryption?
key pair
name the two categories of compression
lossy and lossless
in which type of compression is the quality of a file not degraded?
lossless
what is the purpose of encryption?
to keep data secure during transmission
name one type of lossless compression
- run length encoding
- dictionary encoding
in which form of encryption do the sender and receiver share the same private key?
symmetric encryption
how many keys are used in asymmetric encryption?
two (one public and one private)
If person A wants to send a message to person B
using asymmetric encryption, which key should
they use to encrypt the message?
A: A’s public key
B: A’s private key
C: B’s public key
D: B’s private key
C: B’s public key
A message encrypted with B’s public key can only be
decrypted with B’s private key, which only B has access to
What is said to have occured when two keys map to
the same hash?
a collision
In which kind of lossless compression are repeated
characters replaced by one occurrence and the
number of times to repeat the character?
run length encoding
What name is given to the process of
turning an input into a fixed size value?
hashing
Which data structure uses hashing to store
information with constant lookup time?
hash table
what is meant by compression?
The process of reducing the space
required to store a file
name two properties that a hashing algorithm should have?
● Low chance of collision
● Quick to calculate
● Output smaller than input