Exchanging data Flashcards
run length encoding
Records the value of a pixel and the number of time it repeats, saving bytes and so memory
dictionary based compression
The compression algorithm searches through the text to find suitable entries in its own dictionary (or a known dictionary) and translates accordingly, reassembling perfectly. Dictionary must also be stored with text- but insignificant size compared with original.
encryption
Transformation of data from one form to another to prevent unauthorised third party from understanding it.
encryption: original data/message
plaintext
encryption: encrypted data
ciphertext
encryption method/algorithm
cipher
encryption: secret info to unlock the message
key
Caesar/shift cipher
Substitution cipher works by shifting letters of alphabet a given number of characters- the parameter being the key
Vernam cipher invented by
American scientist Gilbert Vernam in 1917
Vernam cipher is
unbreakable. others are breakable with enough comput. power, ciphertext and time as they are based on computational security
private key/symmetrical encryption
same key to encrypt and decrypt data. key has to be transferred (key exchange) to the same destination= security issues as it can be intercepted as easily as the ciphertext
one time pad
encryption key: must be the same length/longer than the number of char in plaintext, must only be used once, must be random (so distrib of char are random, and cryptanalysis results = meaningless)
one time pad exchange
used in pairs: sender and recipient are both party to key. meet in person, exchange securely, use once then destroy after encryption/decryption