1.3.1 Compression, Encryption, Hashing Flashcards
1
Q
Compression
A
- Process used to Reduce file size to take up less storage space or for faster transfer over a network
- increases the number of files that can be transferred in a given time
- allows faster download
- downloading a compressed file is faster than downloading the full version
2
Q
Lossy compression
A
- reduces file size while also removing some information
- slightly reduces quality but significantly reduced file size [1] e.g images can tolerate some reduction in quality
- reduces image quality e.g more pixelated images or less clear audio recording
- suitable for image audio and video
- not suitable for text documents as important info may be lost and text may become unreadable
3
Q
Lossless compression
A
- reduces file size without losing any information maintaining the original data [1]
- the original file can be recovered/recreated when it is uncompressed
- suitable for executable files and documents or vector style images, cartoons and logos
- maintains data integrity
4
Q
Lossless compression types
A
- run length encoding
- dictionary encoding
5
Q
Run length encoding
A
- a method of lossless compression
- Condenses identical elements to a single occurrence with its count next to it
- used in bitmap images to condense sequences of the same colour
- relies on consecutive pieces of data being the same so more effective when data has a lot of repetition
- doesn’t offer a great reduction in file size if there is little repetition
6
Q
Dictionary encoding
A
- a method of lossless compression
- that replaces frequently occurring pieces of data with a shorter, unique code/index
- compressed data is stored alongside a dictionary
- the dictionary matches frequently occurring data to an index/code
- original data can be restored using the dictionary
- this method is effective for both text binary data
7
Q
Encryption
A
- is used to keep data secure from unauthorised access when it’s being transmitted
- is used to convert readable data into an unreadable format
- uses keys which are specialised programs designed to scramble and unscramble data
8
Q
Symmetric encryption
A
- is a method of encryption where the same key is used for both encryption and decryption of data [1]
- requires both parties to have a copy of the key [1]
- the sender encrypts information using a private key before transmission
- the receiver uses the same key to decrypt the data
- if the key is intercepted, any communications can also be intercepted
9
Q
Symmetric encryption advantages / sutability
A
- usually faster making it ideal for encrypting large amounts of data/ faster and efficient for bulk data
- easier to implement as it uses a single key for both encryption and decryption/ same person encrypts and decrypts e.g when backing up
- less resource incentive
10
Q
Symmetric encryptions CONS
A
- loss/interception of the key means the data encrypted with it can be compromised and intercepted
- so requires key to be shared securely with the other party
11
Q
Asymmetric encryption
A
- uses 2 keys, a public key for encryption and a private key for decryption [1]
- public keys are shared openly allowing anyone to encrypt data [1]
- the private key is kept securely/locally on the receivers side and is kept private [1]
- use case: used when exchanging confidential data /secret communications .eg. Credit card details over the internet
12
Q
Asymmetric encryption pros
A
- use of a separate private private key makes it more secure
- if the public key is lost or stolen data won’t be compromised
13
Q
Hashing
A
- the process in which an input (e.g string of characters) is turned into a fixed sized value (called a hash) using a hash function
- even a slight change in the input message produces a totally different hash value
- unlike encryption the hash function can’t be reversed to form the input message.
14
Q
Advantage of storing password/data as a hash
A
- hashing is useful for storing
passwords - a password entered by a user can be hashed and checked against the stored hash value to see if it’s correct
- only the hash values are stored, not the actual passwords itself so a successful hacker would only gain access to hash values which cant be reversed to gain the passwords
15
Q
Hash tables
A