Section 3 Chapter 18 - Data Compression and Encryption Flashcards
Why compression is used
To reduce the size of data so that it takes up less storage space or less bandwith
The two types of compression
Lossy and lossless
Lossy compression
Unnecessary information is removed from the original file
Lossless compression
All information required to exactly replicate the file is retained in a more space efficient way
How mp3 uses compression
Lossy compression. Removes sounds at too high frequencies for humans to ear and removes quiet sounds that occur at the same time as loud sounds
How lossless compression works
By recording patterns in the data
Where lossy and lossless compression are used
Lossy - Images, sounds, videos
Lossless - Program files
Run length encoding
Rather than recording every value in a sequence it records the value and how many times it continuosly repeats
Dictionary based compression
A “Dictionary” is sent alongside the data and instead of the actual data being sent the indexes of the dictionary are sent. (lossless)
Encryption
The transformation of data from one form to another so that an unauthorised third party cannot understand it
Plaintext
The original unencrypted data
Ciphertext
The encrypted data
Cipher
A method or algorithm for encrypting data
Caeser Cipher
Each character is shifted along by a certain number
Vernam Cipher
A one time pad of equal or longer length to the plaintext is used and the ciphertext is found by using XOR on the one time pad and the plaintext.
Why the vernam cipher is special
It is the only method of encryption which is unbreakable
Cryptanalysis
The study of ciphers and with a view of finding a weakness that will allow the plaintext to be retrieved from the ciphertext without possessing the key
Key
The data which can be used to convert ciphertext to plaintext and vice-versa
Why the caesar cipher is easily broken
There very few (26) different possibilities for the key. This means it can be easily brute forced. Also, since it is a type of substitution cipher, the frequencies of characters could be analysed
Why the vernam cipher has perfect security
Since the key is chosen uniformly at random, the ciphertext is distributed randomly and therefore there is no way to determine patterns or glean any information from the ciphertext. It cannot be brute forced since a ciphertext of length n could literally be any string with that length making a brute force meaningless
Vernam ciphers vs the rest
Vernam is the only cipher proven to be completely secure. The worth of all other ciphers is based on computational security and theoretically all other ciphers could be broken given enough ciphertext and time.