answersLogoWhite

0


Best Answer

· Compression allows a user to compress files and folders and increase available storage on a hard disk. Encryption makes sure that your documents stay confidential. They are mutually exclusive. You cannot encrypt a compressed file and vice versa.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How are compression and encryption similar?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What NTFS feature is incompatible with EFS encryption?

Compression


Is compression a form of encryption?

No, it's not but some compressed files can be encrypted.


Is it most encryption programs compress files?

No. Encryption is not compression. Compression occurs before (and possibly again after) encryption when outgoing, and reversed when incoming. In all probability, the encrypted file is likely to be a few byes larger than the original source data, but since compression is applied first, the overall transmission is likely to be smaller than the source.


When a folder's encryption attibute is configured which of the following cannot be configured at the same time?

D. Compression


What is the difference in data encryption and data compression?

Even though both data compression and encryption are methods that transform data in to a different format, the golas tried to achieve by them are different. Data compression is done with the intension of decreasing the size of data, while encryption is done to keep the data secret from third parties. Encrypted data cannot be decrypted easily. It requires the possession of a special piece of information called a key. Uncompressing compressed data do not require such special knowledge (such as a key), but it might require some special hardware depending on the data type.


What is encryption and its daily life example?

Encryption is the process of making information unreadable except to intended recipient by means of codes, cyphers, steganography, etc.DES - Data Encryption Standard128 bit encryption - used by browsers to communicate with secure serversRSS - Proprietary large prime number based encryptionPGP - Open source encryption similar to RSSWEP - Wired Equivalence Privacy, 40 or 128 bit encryption for secure Wi-Fietc.


Do checksums change during transmission?

If the checksum did change during transmission, wouldn't that mean a transmission error occurred? Any compression or encryption in the middle of transmission affects the data at that moment, but that's the wrong time to try to calculate a checksum for comparison purposes. (Unless it is yet another layer of error checking, used after compression/encryption but before transmission, and again after reception but before decompression/decryption.)


Why is there Loss of compression in car engines?

because somewhere you are "leaking compression" with bad piston rings, intake or exhaust valves or similar.


Is it compulsory that compression and encryption and translation functions will be used during communication?

The sixth OSI model layer is called the presentation layer. Protocols at this layer take care of manipulation tasks that transform data from one representation to another, such as translation, compression and encryption. In many cases, no such functions are required in a particular networking stack; if so, there may not be any protocol active at layer six.http://www.tcpipguide.com/free/t_PresentationLayerLayer6.htm


Which titleist balls having 80 compression?

Golf balls aren't classed by compression anymore. Probably a cheaper one like a DT SOLO or NXT would have a compression similar to this.


Which cryptographic algorithms is a symmetric encryption method?

Twofish, Advanced Encryption Standard, Blowfish, Serpent, CAST 5, RC4, TDES, and IDEA are all examples of symmetric encryption methods. In short, any algorithm that uses the same or similar cryptographic keys for encryption and decryption is a symmetric encryption method. Symmetric encryption methods are also divided into two different categories, stream ciphers and block ciphers. These two encryption methods are much like the difference between an interpreter and a compiler in programming. Stream encrypts individual bytes one at a time, while Block encrypts volumes as a whole.


What is Scrambling of messages at the sending end and unscrambling them at the receiveing end is called?

Encryption