3.1 Compression, Encryption and Hashing

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/37

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

38 Terms

1
New cards

Why is compression useful?

  • Compression is crucial for reducing file size to facilitate efficient data transfer over the Internet

2
New cards

What is the benefit of files being smaller?

  • Smaller files have faster transmission times and require less bandwidth consumption

3
New cards

What are the two kinds of compression?

Lossy and lossless compression

4
New cards

What is lossy compression?

Compression where some of the data is lost

5
New cards

What is lossless compression?

Compression where all the data is kept

6
New cards

What are the benefits of lossy compression?

  • Greatly reduced file sizes

  • Suitable for media streaming where some data loss is acceptable

7
New cards

What are the drawbacks of lossy compression?

  • Irreversible loss of data quality

  • Not suitable for text or archival storage

8
New cards

What are the benefits of lossless compression?

  • Maintains original data

  • Best for text and data that require integrity

9
New cards

What are the drawbacks of lossless compression?

  • Larger file sizes than lossy

  • Requires high bandwidth when streaming

10
New cards

What is run length encoding?

a form of data compression that condenses identical elements into a single value with a count.

11
New cards

What is dictionary coding?

A form of compression that replaces recurring sequences with shorter, unique codes

12
New cards

Where is run length encoding used?

Bitmap images to compress sequences of the same colour

13
New cards

Where is dictionary coding used?

Text and binary data

14
New cards

What is the main aim of encryption?

to secure data from unauthorised access

15
New cards

How is encrypted unscrambled for use?

  • Encryption methods use 'keys', which are specialised programs designed to scramble or unscramble data

16
New cards

What is an example of encryption?

HTTPS protocol uses encryption to provide secure data transfers across the internet

17
New cards

How does symmetric encryption work?

  • The sender uses a key to encrypt the data before transmission

  • The receiver uses the same key to decrypt the data

  • It's usually faster, making it ideal for encrypting large amounts of data

18
New cards

What are the disadvantages of symmetric encryption?

  • The significant downside is the challenge of securely sharing this key between the sender and receiver

  • If a bad actor captures the key, they can decrypt all messages intercepted in transmission

19
New cards

How many keys does asymmetric encryption use?

  • Asymmetric encryption uses two keys:

    • a public key for encryption

    • and a private key for decryption

20
New cards

How does asymmetric encryption work?

  • Receivers openly share their public key

  • Senders use this public key to encrypt the data

  • The receiver's private key is the only key that can decrypt the data and is kept locally on their side

  • The public and private keys are created at the same time and are designed to work together in this way

21
New cards

What are the drawbacks of asymmetric encryption?

  • It is typically slower than symmetric encryption

  • It is generally used for more secure and smaller data transactions, e.g. passwords, bank details

22
New cards

What kind of data is symmetric encryption used on?

Large files, databases

23
New cards

What are reasons for choosing symmetric encryption?

  • Fast and efficient for bulk data.

  • The same person encrypts and decrypts, e.g. when backing up data.

24
New cards

What kind of data is asymmetric data suited for?

Confidential/secret communications

25
New cards

What are the reasons for choosing asymmetric encryption?

  • Sharing highly secure data, e.g. passwords, government communications

26
New cards

What is Hashing?

hashing is a method to convert any data into a fixed-size string of characters

27
New cards

What are the benefits of hash?

  • Same input will always produce the same hash, providing consistency

  • Even a minor change in input produces a radically different hash, giving it sensitivity to data changes

28
New cards

What are examples of common hashing algorithms?

MD5 (Message Direct 5)

SHA-1(Secure Hash Algorithm 1)

SHA-256(Part of the SHA-2 family)

SHA-3

29
New cards

What are the features of MD5 (Message Digest 5)

  • Widely used but considered weak due to vulnerabilities to collision attacks

30
New cards

What are the features of SHA-1(Secure Hash Algorithm 1)

  • Previously used in SSL certificates and software repositories, now considered weak due to vulnerabilities

31
New cards

What are the features of SHA-256(Part of the SHA-2 family)

  • Commonly used in cryptographic applications and data integrity checks. Considered secure for most practical purposes

32
New cards

What are the features of SHA-3(Part of the SHA-2 family)

  • The most recent member of the Secure Hash Algorithm family, designed to provide higher levels of security

33
New cards

What method does storing passwords use?

Hashing

34
New cards

How is hashing used to store passwords?

  • When the user first signs up, the password they provide is hashed

  • The hashed password is stored in the database, rather than as plaintext

  • When users try to log in, they enter their username and password

  • The system hashes the password entered by the user during the login attempt

  • The hashed password is compared against the stored hash in the database

  • If the hashes match, the user is authenticated and granted access

  • If they don't match, access is denied

35
New cards

What is the benefit of hashing when used to store passwords?

  • Hashing passwords adds an extra layer of security

  • Even if the database is compromised, the attacker can't use the hashed passwords directly

  • In case of a data breach, not storing passwords in plaintext minimises the risk and potential legal repercussions

  • Users' raw passwords are not exposed, reducing the impact of a data breach

  • Since the hash function always produces the same output for the same input, verifying a user's password is quick

36
New cards

What does a goof hash function do?

  • A good hash function uniformly distributes keys across the hash table, allowing for a more balanced and efficient data retrieval

37
New cards

What is an additional benefit of hashing?

  • Another benefit of hashing data is being able to verify its integrity

38
New cards

How can hashing be used to verify data integrity?

  • When data is being transferred over a network, it is susceptible to loss of packets or malicious interference, so if two hashes are compared and are identical, it allows a system to verify the integrity of data

  • This is because the same data hashed by the same hashing function will produce the same digest

  • Comparing two fixed-size hashes is computationally less intensive than string comparison