1.3.1 Compression, encryption and hashing

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/18

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

19 Terms

1
New cards

What are the two types of data compression?

Lossy and Lossless compression.

2
New cards

What is lossy compression?

A method that permanently removes non-essential data to reduce file size.

3
New cards

Give an example of lossy compression.

JPG for images and MP3 for audio.

4
New cards

What is lossless compression?

A method that summarizes patterns in data without permanently removing any information.

5
New cards

What is Run Length Encoding (RLE)?

A basic method of compression that summarizes consecutive patterns of the same data.

6
New cards

How does dictionary compression work?

It spots regularly occurring data and stores it separately in a dictionary, reducing the original data size.

7
New cards

What is the advantage of using a dictionary in compression?

It reduces the amount of data stored while producing some overhead.

8
New cards

What is encryption?

A way of making data unreadable without the means to decrypt it.

9
New cards

What is the Caesar cipher?

A basic type of encryption where letters of the alphabet are shifted by a consistent amount.

10
New cards

What is a brute force attack?

An attempt to apply every possible key to decrypt ciphertext until one works.

11
New cards

What is the Vernam cipher?

An unbreakable encryption method using a truly random sequence as a key.

12
New cards

What is the requirement for the one-time pad in the Vernam cipher?

The key must be truly random, longer or equal to the plaintext, used only once, and destroyed after use.

13
New cards

What is symmetric encryption?

A method where the same key is used for both encryption and decryption.

14
New cards

What is the main security issue with symmetric encryption?

The key must be transferred to the recipient, which can be intercepted.

15
New cards

What is asymmetric encryption?

A method using two related keys: a public key for encryption and a private key for decryption.

16
New cards

What is a hashing function?

a process in which an input (called a key) is turned into a random string of values that are a fixed size

17
New cards

What are the rules of hashing?

  • the output of a hash function can’t be reversed to form the key.

  • This quality makes hashing useful for storing passwords

  • A password entered by a user can be hashed and checked against the key to see if it is correct, but a successful hacker would only gain access to the keys,

  • which can’t be reversed to gain the passwords.

18
New cards

What does collision resistance mean in hashing?

Two different inputs should not produce the same output.

19
New cards

What is the avalanche effect in hashing?

Changing a single part of the input should result in a completely different hash.

Explore top flashcards

SS100 Spring Exam 23
Updated 988d ago
flashcards Flashcards (234)
APUSH Unit 2
Updated 862d ago
flashcards Flashcards (135)
kafli 6 og 7
Updated 1005d ago
flashcards Flashcards (88)
root examples 2
Updated 1021d ago
flashcards Flashcards (31)
Troika - Chapter 8
Updated 1205d ago
flashcards Flashcards (88)
Spanish Vocab 1.1
Updated 864d ago
flashcards Flashcards (30)
Reproductive Systems
Updated 984d ago
flashcards Flashcards (55)
SS100 Spring Exam 23
Updated 988d ago
flashcards Flashcards (234)
APUSH Unit 2
Updated 862d ago
flashcards Flashcards (135)
kafli 6 og 7
Updated 1005d ago
flashcards Flashcards (88)
root examples 2
Updated 1021d ago
flashcards Flashcards (31)
Troika - Chapter 8
Updated 1205d ago
flashcards Flashcards (88)
Spanish Vocab 1.1
Updated 864d ago
flashcards Flashcards (30)
Reproductive Systems
Updated 984d ago
flashcards Flashcards (55)