1.3.1 Compression, Encryption, Hashing

studied byStudied by 3 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 26

flashcard set

Earn XP

27 Terms

1

loseless compression

reduces the file size that when it is decompresses all the data is retrieved. does this by recording patterns in the data rather than the actual data.

New cards
2

use of lossless

code, text, architercural plans

New cards
3

lossy compression

removes all non-essential data. reduces a file size such that when decompressed some data is lost

New cards
4

use of lossy

colour depth reduction, resolution reduction

New cards
5

example of lossy compression

MP3 format file is 10% smaller than original, quiet sounds and high frequencies are cut out

New cards
6

2 examples of lossy compression

voice transmission, mp3

New cards
7

run length encoding and dictionary encoding are 2 types of …

lossless compression

New cards
8

run length encoding

compression where data is stored as frequency data pairs.

New cards
9

what is compression?

the process of reducing space needed to store a file

New cards
10

what is a frequency data pair?

single instance of a pattern and how many repetitions of the pattern

New cards
11

con of dictionary encoding

not useful for smaller bodies of text as it requires text in dictionary to be stored.

New cards
12

con of RLE

doesn’t work well for Digital images because the repetitions aren’t frequent.

New cards
13

plaintext

the original data

New cards
14

ciphertext

encrypted data

New cards
15

cipher

encryption method

New cards
16

key

information needed to lock or unlock the data

New cards
17

encryption

transformation of data from plaintext to cipher text to protect sensitive data

encryption is two-ways meaning that data can be resorted into its original form, still requires and encryption key.

New cards
18

symmetric encryption

private key

New cards
19

conditions of symmetric encryption

same key used to encrypt and decrypt text

New cards
20

cons of symmetric encryption

less secure key exchange means that high likelihood that any interception leads to cipher text being decrypted.

New cards
21

conditions for asymmetric encryption

uses two separate and indistinguishable keys; public key for encryption; private key to decrypt.

New cards
22

What is the purpose of compression

Reduce size, download time and storage requirements. Make best use of the bandwidth.

New cards
23

what is a hashing algorithm?

a mathematical function that garbles data and makes it unreadable. used in data storage and security for protecting sensitive information.

New cards
24

what are 2 key properties of hashing algorithms ?

consistency-same input produces the same hash. sensitivity - minor changes produce completely different hash

New cards
25

Name three common hashing algorithms

MD5 SHA-1 SHA-256

New cards
26

What are the characteristics of a good hash?

Easy to calculate, few collisions and provides an output smaller than the input.

New cards
27

what is hashing?

hashing is a one-way non-reversible mathematical process that produced an value from the input value

New cards
robot