Compression, Encryption and Hashing

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/13

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

why is compression used?

  • reduce storage space of files on disk

  • enable web pages to load quicker

  • reduce buffering on video/audio streaming

  • obey bandwidth restrictions by ISPs, mobile phone networks, email providers

2
New cards

what is lossy compression?

  • removes non-essential data from the original file

  • the resulting file can have lower quality as a result

  • used in phone calls and in sound and video (eg. MP3 files remove frequencies higher than human hearing and quieter sounds)

3
New cards

what is lossless compression?

  • no data is lost from the original file

  • lossless compression records patterns in data and a set of instructions on how to use them

  • computer can reverse procedure and reassemble the original file with exact accuracy

  • useful for compression of program files, text files where lost characters would result in an error

  • results in a larger file than lossy compression, but still smaller than original file

4
New cards

what is run length encoding?

  • instead of recording every pixel in a sequence, it records the pixel’s value and the number of times it repeats

  • reduces file size because 1 byte used to store colour (etc.) of pixel and 1 byte used to store number of times repeated

  • unsuitable for text files without repeated strings

5
New cards

what are dictionary-based compression techniques?

  • a dictionary is maintained containing each word in the text along with a code representing that word

  • in the text, each word is replaced with its dictionary code which reduces the amount of bytes used to store that word

  • however, the dictionary must be stored with the text

  • in larger texts when certain words are repeated a lot, the dictionary is insignificant in size compared to the original

6
New cards

what is encryption?

  • when data is transformed from one form to another to prevent unauthorised third parties understanding it

  • plaintext=original text

  • ciphertext=encrypted text

  • algorithm used to scramble data=cipher

  • secret information used to unscramble data=key

7
New cards

what is the vernam cipher?

  • the encryption key is a one-time pad, which must be greater than or equal to in length than the plaintext, fully random and used only once

  • the one time pad must be shared in person and then destroyed

  • as the key is random, the distribution of characters will be random so cryptanalysis won’t produce meaningful results

  • XOR is carried out between the ASCII values of each plaintext character and each one time pad character, to determine the ciphertext (the XOR is reversible)

8
New cards

what are truly random numbers?

  • they are not computer generated random keys because mathematically generated random numbers are not actually random

  • real random numbers come from physical, unpredictable phenomena such as white noise, radioactive decay

9
New cards

what is symmetric encryption?

  • same key used for encryption and decryption

  • key must be transferred across the network, which isnt safe because it could be intercepted

10
New cards

what is asymmetric encryption?

  • if person A wants to send a message to person B

  • person A finds B’s public key on the public domain

  • A uses B’s public key to encrypt data

  • A sends message to B

  • B uses B’s private key to decrypt data

  • as the private key cannot be deduced from the public key, asymmetric encryption is more secure

11
New cards

what is hashing?

  • provides mapping between arbitrary length input and smaller length output

  • one way, original text cannnot be determined from hash

  • encrypted pins and passwords can be stored using hashing so if they are discovered, the original cannot be determined by hackers

  • the software applies the hashing algorithm to the user’s input and compares it with the hash stored

12
New cards

what is a hash total/checksum/digest?

  • a mathematical value calculated from unencrypted message data

  • irreversible and impossible to crack

  • a slight change in the message will produce a different total

  • useful when checking that the message hasnt been corrupted or changed during transmission

13
New cards

what is a digital signature or hash value?

  • the sender encrypts the hash total with their private key

  • the encrypted hash total is the digital signature

  • the recipient decrypts the hash total using the sender’s public key

  • if the hash total= the actual calculated hash total of the message, then the message is exactly the same as it was when it was sent out

14
New cards

what is a digital certificate?

  • verifies the trustworthiness of a message sender or website

  • allows the website to use public keys

  • prevents people creating hoax digital signatures claiming to be a trusted individual