3.6 - Data Compression & Encryption Flashcards

(13 cards)

1
Q

Why are files compressed?

A

To reduce their size so they can be transferred faster between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is lossy compression?

A

Some information is lost in the process of reducing the file’s size -> reducing resolution if an image or lowering sample resolution of an audio file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is lossless compression?

A

Patterns in the data are spotted and summarised in a shorter format without permanently removing any information so it can be reduced without decreasing its quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is run length encoding (RLE)?

A

Method of lossless compression that reduces the file’s size size by removing repeated information and replacing it with one occurrence of the repeated information followed by the number of times it has to be repeated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is dictionary compression?

A

Another method of lossless compression where a dictionary containing repeated data is appended to the file. It results in a significant reduction in size but the dictionary does need to be present in the file for the image to be reproduced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is encryption?

A

The process of scrambling data so that it cannot be understood if intercepted in order to keep it secure during transmission
Easily cracked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is plaintext and ciphertext?

A

Plaintext = unencrypted information
Ciphertext = encrypted information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Caesar cipher?

A

Encrypts information by replacing characters, one character is always replaced by the same character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two different Caesar ciphers and how do they work?

A

Shift = all letters in the alphabet are shifted by the same amount, the amount by which characters are shifted form the key
Substitution = letters are randomly placed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When is a one-time pad considered to have perfect security?

A
  • the encryption key is equal to or longer than the plaintext message
  • the key is totally random
  • the key is used only one and then destroyed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a one time pad?

A

A random key that is used to encrypt a message once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the rough steps for a Vernam cipher?

A

XOR the ASCII binary version for the plaintext letters with the ASCII binary version of the one time pad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do other ciphers rely on computational security?

A

Every cipher other than Vernam is in theory crackable but not within a reasonable timeframe given current computing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly