Section 3 Chapter 18 - Data Compression and Encryption Flashcards

1
Q

Why compression is used

A

To reduce the size of data so that it takes up less storage space or less bandwith

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The two types of compression

A

Lossy and lossless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Lossy compression

A

Unnecessary information is removed from the original file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Lossless compression

A

All information required to exactly replicate the file is retained in a more space efficient way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How mp3 uses compression

A

Lossy compression. Removes sounds at too high frequencies for humans to ear and removes quiet sounds that occur at the same time as loud sounds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How lossless compression works

A

By recording patterns in the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Where lossy and lossless compression are used

A

Lossy - Images, sounds, videos

Lossless - Program files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Run length encoding

A

Rather than recording every value in a sequence it records the value and how many times it continuosly repeats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dictionary based compression

A

A “Dictionary” is sent alongside the data and instead of the actual data being sent the indexes of the dictionary are sent. (lossless)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encryption

A

The transformation of data from one form to another so that an unauthorised third party cannot understand it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Plaintext

A

The original unencrypted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ciphertext

A

The encrypted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cipher

A

A method or algorithm for encrypting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Caeser Cipher

A

Each character is shifted along by a certain number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Vernam Cipher

A

A one time pad of equal or longer length to the plaintext is used and the ciphertext is found by using XOR on the one time pad and the plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why the vernam cipher is special

A

It is the only method of encryption which is unbreakable

17
Q

Cryptanalysis

A

The study of ciphers and with a view of finding a weakness that will allow the plaintext to be retrieved from the ciphertext without possessing the key

18
Q

Key

A

The data which can be used to convert ciphertext to plaintext and vice-versa

19
Q

Why the caesar cipher is easily broken

A

There very few (26) different possibilities for the key. This means it can be easily brute forced. Also, since it is a type of substitution cipher, the frequencies of characters could be analysed

20
Q

Why the vernam cipher has perfect security

A

Since the key is chosen uniformly at random, the ciphertext is distributed randomly and therefore there is no way to determine patterns or glean any information from the ciphertext. It cannot be brute forced since a ciphertext of length n could literally be any string with that length making a brute force meaningless

21
Q

Vernam ciphers vs the rest

A

Vernam is the only cipher proven to be completely secure. The worth of all other ciphers is based on computational security and theoretically all other ciphers could be broken given enough ciphertext and time.