Compression N Security
Compression N Security
Compression N Security
The method can be more efficient if the data uses only 2 symbols
(0s and 1s) in bit patterns and 1 symbol is more frequent than
another.
Lossy Compression Methods
Used for compressing images and video files
(our eyes cannot distinguish minor changes, so
lossy data is acceptable).
These methods are cheaper, less time and
space.
Several methods:
JPEG: compress pictures and graphics
MPEG: compress video
MP3: compress audio
Computer Security
deals with the prevention and
detection of unauthorised actions
by users of a computer system.
6
Definitions
Network Security - measures to protect
data during their transmission
Note
Asymmetric key cryptography uses two separate keys: one
private and one public.
1.The key must be kept secret. 1.One of the two keys must be
2.It must be impossible or at least kept secret.
impractical to decipher a message 2.It must be impossible or at least
if no other information is impractical to decipher a message
available. if no other information is
3.Knowledge of the algorithm available.
plus samples of ciphertext must 3.Knowledge of the algorithm
be insufficient to determine the plus one of the keys plus samples
key. of ciphertext must be insufficient
to determine the other key.
RSA CRYPTOSYSTEM