SLR 9 - COMPRESSION, ENCRYPTION AND HASHING Flashcards

1
Q

What is the purpose of compression?

A
  • to reduce the size of the files
  • to reduce download time
  • to reduce storage requirements
  • to make best use of bandwidth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 2 types of compression?

A
  • lossy
  • lossless
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is lossy compression?

A
  • a compression algorithm that removes non-essential data from a file leading to a noticeable decrease in accuracy of the data
  • data lost is non-recoverable.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is lossless compression?

A
  • a compression algorithm that retains all the data in the file by only storing the instructions needed to reconstruct the original file
  • no data is lost
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are 2 different methods of lossless compression?

A
  • run-length encoding (RLE)
  • dictionary coding
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is run-length encoding?

A

a type of lossless compression where repeated occurrences of the same data (like several pixels of the same colour in an image) are stored as single data values with their counts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is dictionary coding?

A
  • a type of lossless compression where text is searched for entries that match the entries in a dictionary
  • entries are substituted by a unique code which can then be translated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is encryption?

A

the process of encoding a message so it can only be read by the sender and the intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Caesar cipher?

A

letters in the alphabet are replaced by a new letter a fixed distance away from the original letter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an issue with Caesar cipher?

A
  • easily decrypted
  • susceptible to brute force attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is symmetric encryption?

A
  • an encryption technique where the same key is used to encrypt and decrypt data
  • a copy of the key must be transferred between both parties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the danger with symmetric encryption?

A

a message can be cracked by either:
- interception of the key
- duplication of the key production process to acquire a copy of the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is asymmetric encryption?

A
  • an encryption technique where a public key available to everyone is used to encrypt the data, and the data is decrypted by the paired private key known only by the recipient
  • the keys are generated so anything encrypted with 1 key can be decrypted with the other key (together these keys form key pairs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is asymmetric encryption much more secure than symmetric encryption?

A

its impossible to derive 1 key from the other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Vernam cipher?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is hashing?

A
  • a one-way transformation of data into an abbreviated form called a hash value
  • the hash value is used to validate login credentials like passwords or PINs without revealing the original data to hackers
17
Q

What is hashing used for?

A

storing PINs and passwords