1.3.1 Compression, Encryption and Hashing

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/15

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

16 Terms

1
New cards

what is compression?

the process used to reduce the amount of storage space required by a file

2
New cards

why is compression useful?

  • can store more files with less space

  • can transfer more files over the Internet in a shorter amount of time

3
New cards

what is lossy compression?

  • reduces file size by removing some of its information

  • can result in a more pixelated image or less clear audio recording

  • not possible to recover original file

4
New cards

what is lossless compression?

  • reduces file size without removing any information

  • possible to recover original file

5
New cards

what is Run Length Encoding (RLE)?

  • a method of lossless encryption in which repeated values are removed and replaced with one occurrence of the data followed by how many times it should be repeated e.g. AAAAAABBBBBCCC becomes A6B5C3

  • doesn’t offer great size reduction in files with little repetition

6
New cards

what is Dictionary Encoding?

  • a method of lossless compression

  • frequently occurring pieces of data are replaced with an index

  • compressed data is stored alongside a dictionary which matches the frequently occurring data to an index

  • original data can then be restored using the dictionary

7
New cards

what is the purpose of encryption?

keeping data secure when it’s being transmitted

8
New cards

what is the process of symmetric encryption?

  • both the sender and receiver share the same private key that they distribute to each other in a key exchange (used for encrypting and decrypting data)

  • key must be kept secret as if it is intercepted then any communications sent can be intercepted and decrypted using it

9
New cards

what is the process of asymmetric encryption?

  • two keys are used - one public and one private (they are mathematically related to each other)

  • public key can be published anywhere for anyone to use, private key must be kept secret

  • messages encrypted with the public key can only be decrypted by the private key (private key should only be in possession of recipient)

  • to prove a message has been sent by you, you can do the inverse - encrypt with private key so that anyone can decrypt it with the public key (proves it was you because only you have the private key)

  • the basis of digital signatures

10
New cards

what is hashing?

  • a process in which a key (input) is turned into a fixed size value called a hash

  • done by hash functions

11
New cards

why is hashing different to encryption?

the output of a hash function can’t be reversed to form the key (makes hashing useful for storing passwords)

12
New cards

what are hash tables?

  • a data structure that holds data pairs

  • formed from a bucket array and a hash function

13
New cards

what are hash tables used for?

  • looking up data in an array in constant time

  • caches

  • databases

14
New cards

what is a collision?

when two pieces of data produce the same hash

15
New cards

how are collisions overcome?

  • storing items together in a list under the hash value

  • using a second hash function to generate a new hash

16
New cards

what are qualities of a good hash function?

  • low chance of collision to prevent two pieces of data having the same value

  • quick to calculate to get through more data in less time

  • should produce output that is smaller than input provided, otherwise searching for the hash could take longer than searching for the key

Explore top flashcards

SS100 Spring Exam 23
Updated 988d ago
flashcards Flashcards (234)
APUSH Unit 2
Updated 862d ago
flashcards Flashcards (135)
kafli 6 og 7
Updated 1005d ago
flashcards Flashcards (88)
root examples 2
Updated 1021d ago
flashcards Flashcards (31)
Troika - Chapter 8
Updated 1205d ago
flashcards Flashcards (88)
Spanish Vocab 1.1
Updated 864d ago
flashcards Flashcards (30)
Reproductive Systems
Updated 984d ago
flashcards Flashcards (55)
SS100 Spring Exam 23
Updated 988d ago
flashcards Flashcards (234)
APUSH Unit 2
Updated 862d ago
flashcards Flashcards (135)
kafli 6 og 7
Updated 1005d ago
flashcards Flashcards (88)
root examples 2
Updated 1021d ago
flashcards Flashcards (31)
Troika - Chapter 8
Updated 1205d ago
flashcards Flashcards (88)
Spanish Vocab 1.1
Updated 864d ago
flashcards Flashcards (30)
Reproductive Systems
Updated 984d ago
flashcards Flashcards (55)