Compression, Encryption, and Hashing Techniques

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Purpose of compression

To reduce the storage space required by a file, making it quicker to transfer and easier to store.

2
New cards

Difference between lossy and lossless compression

Lossy removes some data and cannot be reversed; lossless retains all data and allows full recovery of the original file.

3
New cards

Example of lossy compression usage

Compressing audio files by removing inaudible frequencies.

4
New cards

Run-length encoding (RLE)

A lossless compression method that replaces sequences of the same data with one value and a count (e.g., A6B5C3).

5
New cards

Effectiveness of run-length encoding

When data has many repeated, consecutive values.

6
New cards

Dictionary encoding

A method of lossless compression where frequently used data is replaced with shorter representations via a dictionary.

7
New cards

Need for dictionary transfer in dictionary encoding

Because it's needed to decode and restore the original data.

8
New cards

Purpose of encryption

To keep data secure during transmission.

9
New cards

Symmetric encryption

Encryption where the same private key is used for both encrypting and decrypting data.

10
New cards

Key exchange in symmetric encryption

The process of securely sharing the private key between sender and receiver.

11
New cards

Asymmetric encryption

A method using a public-private key pair, where data encrypted with the public key can only be decrypted with the private key.

12
New cards

Advantage of asymmetric over symmetric encryption

It avoids the need to share a private key, reducing the risk of interception.

13
New cards

Using asymmetric encryption to verify sender's identity

By encrypting with the sender's private key—anyone with the public key can decrypt and verify authenticity.

14
New cards

Hashing

A process that converts input data (a key) into a fixed-size value (hash) using a hash function.

15
New cards

Difference between hashing and encryption

Hashing is one-way and cannot be reversed to retrieve the original data.

16
New cards

Usefulness of hashing for passwords

Because stored hashes can't be reversed, so even if leaked, original passwords stay hidden.

17
New cards

Hash table

A data structure that stores key-value pairs and allows fast lookup using hashes.

18
New cards

Collision in hashing

When two different inputs produce the same hash value.

19
New cards

Ways to handle collisions in hash tables

Using lists to store multiple items at the same hash or using a secondary hash function.

20
New cards

Qualities of a good hash function

Low collision rate, fast computation, and output smaller than the input.