1.3.1 compression, encryption etc

    Cards (24)

    • compression
      dictionary coding
      Benefits of dictionary coding
      -it takes less bits to store a 2 digit binary number than we can a 10 letter word(takes up less memory to store)
      the code is loseless(no data is lost)
      -the encoder may not always build its own dictionary. A pre-existing dictionary may be used to encode the text
    • compression
      dictionary coding
      how does it work
      1)the coder scans through a body of text
      2)each word is replaced with a binary number of the word in a dictionary
      3)when it finds a word not in the dictionary, it will add it and give it a binary number
      4)the word in the actual text is replaced with the binary number
    • compression
      dictionary coding
      what is it
      this is used to store text in a loseless format
    • compression
      In Images
      -image compression algorithms often group these pixel together, and give them an average color
      what does Run Length Encoding(RLE) do
      this alogrithm can be run on the new images, this technique then becomes lossy
    • compression
      lossless compression
      what does it cause file size to do
      to reduce moderately
    • compression
      Run-Length-Encoding (RLE)
      what does this mean
      this is a form of lossless compression that replaces repeating sequences of 0's and 1's with more efficient representations
    • compression
      type of compression
      what is lossless compression
      none of the original data is lost
    • compression
      types of compression
      is data lost permanetly?
      some data is permanetly lost but enough remains so that file can be useful and there is barely any difference
    • compression
      types of compression
      there are 2 name them
      lossless compression
      lossy compression
    • compression
      types of compression
      what is lossy compression
      an algorithm is applied to remove unneccessary detail from the original file
    • compression
      what is it
      compression helps to reduce the size of these(secondary storage) files so that we can store more data
    • encryption
      Keys(shared secrets)
      what does this mean
      made up of a pair of large prime numbers example: 256 or 1024 bit long
    • Encryption
      symmetric and asymmetric encryption
      Asymmetric encryption( or public key)
      what does it use
      used both public and private key
    • Encryption
      symmetric and asymmetric encryption
      Asymmetric encryption( or public key)
      what does public key mean
      given to a person who you wish to send your encrypted data
    • Encryption
      symmetric and asymmetric encryption
      public and private key
      both are related through what?
      mathematical operations
      note: the private key you set can not be figured out from the public key
    • Encryption
      symmetric and asymmetric encryption
      Symmetric encryption( or private key)
      how does symmertric encryption work

      1)this cypher text and private key are then transferred to anohter location or person
      2)the key is then used to decrypt text back into plain text security
      3) using a single key to encrypt and decrypt text proposes a massive flaws in security, as anyone with the key can decrypt the cypher
    • Encryption
      symmetric and asymmetric encryption
      Symmetric encryption( or private key)
      what does private key mean
      is used to convert plain text into cypher text
    • Encryption
      symmetric and asymmetric encryption
      what can the private key do
      is used to decrypt the data and only you have this key
    • Encryption
      symmetric and asymmetric encryption
      what can the public key do
      can encrypt and decrypt data
    • Encryption
      what does this mean
      is the process of scrambling data according to a specific algorithm so that it cannot be read by third parties
    • Hashing
      is secure but why?
      because cannot reverse to get back to original data
    • Hashing
      the hash function has no what?
      no inverce
    • Hashing
      the uses of Hashes
      -password
      -digital signture- the hash output value can be encrypted with a private key and sent to someone else and they use the matching public key to decrypt
    • Hashing
      what does this mean
      is the process of taking an input, performing some form of calculation on the input that outputs a value of fixed size (output is known as hash)
    See similar decks