Compression, Encryption And Hashing Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Why is file compression used?

A

To reduce the storage of files on disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Though disk storage is becoming larger and cheaper, why is reducing file size important?

A

Its important in the sharing and transmission of data as ISPs impose limits and charges on bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do images on a website need to be compressed?

A

To enable the web pages to load quickly and for streaming to reduce buffering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two compression techniques that I need to know?

A

Lossy and lossless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between lossy and lossless?

A

With lossy unnecessary information is removed from the original file while when lossless compresses it retains all information required to replicate the original file exactly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What compression technique does MP3 use?

A

Lossy, removing frequencies that are too high for most of us to hear and remove quieter sounds that are played at the same time as louder sounds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How much of an MP3 file is compressed under compression?

A

Around 10% of the original size, meaning that 1 minute of MP3 audio equates to roughly 1MB in size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is voice compressed over the internet or mobile telephone networks?

A

Using lossy compression, which shows us the apparent difference between lossy and lossless, that lossy loses data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does lossless compression work in terms of compression?

A

Records patterns in data rather than the actual data, giving the computer the ability to reverse the procedure and get the file back to its exact accuracy with no data lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What would use lossless compression?

A

Program files, as a lose of a character would result in an error in the program code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the disadvantage of lossless compression?

A

That it results in a larger file than lossy, but one that is significantly smaller than the original

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Run Length Encoding (RLE)?

A

Rather than recording every pixel in a sequence, it records its value and the number of times it repeats it, so if there is BBBDDAACCCC that would become 3B2D2A4C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does dictionary compression work?

A

The compression algorithm searches through the text to find suitable entries in its own dictionary and translates the messages accordingly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does dictionary compression also have to be stored with?

A

With the text dictionary, so that it can compare the symbols and translate them to what they were, making the original message can still be reassembled perfectly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is encryption?

A

The transformation of data from one from to another to prevent an unauthorised third party from being able to understand it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the original data or message before encryption called?

A

Plaintext

16
Q

What is encrypted data known as?

A

Ciphertext

17
Q

What is the encryption method or algorithm known as?

A

Cipher

18
Q

What us the secret information to lock or unlock the message known as?

A

Key

19
Q

What is the difference between the Caesar cipher and the Vernam cipher?

A

They are polar opposites, the Vernam offers perfect security, while the Caesar cipher is very easy to break with little or no computational power

20
Q

What is the Caesar cipher also known as?

A

The shift cipher

21
Q

what is the Caesar cipher?

A

A type of substitution cipher and works by shifting the letters if the alphabet along by a given number of characters

22
Q

How many different possibilities are there for the Caesar cipher?

A

There are only 26 different possibilities

23
Q

What is the Vernam cipher?

A

Invented in 1917 by American scientist Gilbert Vernam, is the only cipher proven to be unbreakable, all others are based on computational security and are theocratically discoverable given enough time, cipher text and computational power

24
Q

What are the requirements for the encryption key or one time pad?

A

It must be equal to or longer in character than the plaintext, truly random and be used only once

25
Q

How are one-time pads used?

A

They are used in pairs where the sender and recipient are both party to the key

26
Q

How must a truly random sequence be collected?

A

From a physical and unpredictable phenomenon, such as white noise, the timing of a hard disk read/write head or radioactive decay

27
Q

What is symmetric encryption, also known as private key encryption?

A

Encryption that uses the same key to encrypt and decrypt data, this means that the key must also be transferred to the same destination as the ciphertext, which causes obvious security problems

28
Q

What is the problem with symmetric encryption?

A

The key can be intercepted as easily as the ciphertext message to decrypt the data

29
Q

What is Asymmetric encryption?

A

Encryption that use two separate, but related keys, with one key, known as the public key, is made public so other wishing to send you data can use this to encrypt the data, the public key cannot decrypt data, another private key is known only by you and only this can be used to decrypt the data

30
Q

What is done to authorise the sender, in case of a malicious third party encrypting a message using your own public key?

A

A message can be digitally ‘signed’ to authenticate the sender

31
Q

What does a hashing function provide?

A

A mapping between an arbitrary length input and a usually fixed length or smaller output and is one way; you cannot get back to the original,

32
Q

What is a hash total?

A

Is a mathematical value calculated from unencrypted message date

33
Q

What is a hash total also referred to?

A

A checksum or digest

34
Q

What is a digital signature, also known as a hash value?

A

When the sender of the message use their own private key to encrypt the hash total, the encrypted total become the digital signature since only the holder of the private key could have encrypted it, when the receipt decrypts the message using their private key and decrypts the digital signature using the senders public key

35
Q

Who issues a digital certificate issued by?

A

Issued by the official Certificate Authorities (CAs) such as Symantec or Verisign

36
Q

What does a digital certificate verify?

A

The trustworthiness of a message sender or website