Background of the Study
In the digital age, data transmission over networks has become a critical component of academic operations in universities, including Federal University Gashua in Yobe State. With increasing reliance on the internet for research, communication, and administration, the secure transmission of data is a priority. One of the primary techniques used to secure data transmission is cryptography, which ensures that sensitive information remains confidential and integral during transmission. Various cryptographic algorithms, such as RSA, AES, and ECC, have been developed to safeguard data from unauthorized access and tampering.
However, the effectiveness of cryptographic algorithms in securing data transmission depends on several factors, including the algorithm’s strength, computational efficiency, and resistance to evolving cyber-attacks. While many studies have examined the theoretical aspects of cryptography, there is limited research on its practical impact on data transmission security in Nigerian universities. This study aims to investigate the impact of cryptographic algorithms on secure data transmission at Federal University Gashua, assessing how different algorithms affect the security and efficiency of data transmission in the university’s network.
Statement of the Problem
Federal University Gashua, like many universities, relies on various cryptographic algorithms to secure sensitive academic and administrative data during transmission. However, the effectiveness of these algorithms in providing robust data security in the face of modern cyber threats has not been extensively evaluated. Some algorithms may provide strong security but at the cost of high computational overhead, affecting the efficiency of data transmission. Other algorithms may offer faster performance but weaker security. Therefore, there is a need to investigate the impact of different cryptographic algorithms on the security and efficiency of data transmission at Federal University Gashua.
Objectives of the Study
To analyze the effectiveness of different cryptographic algorithms in securing data transmission at Federal University Gashua.
To compare the performance of various cryptographic algorithms in terms of security strength and computational efficiency.
To recommend the most suitable cryptographic algorithm for secure and efficient data transmission in the university’s network.
Research Questions
What is the impact of cryptographic algorithms on the security of data transmission at Federal University Gashua?
How do the computational efficiency and security strength of different cryptographic algorithms compare in the context of the university's data transmission needs?
Which cryptographic algorithm is most suitable for secure and efficient data transmission at Federal University Gashua?
Significance of the Study
This study will provide insights into the practical application of cryptographic algorithms in securing data transmission in Nigerian universities. The findings will assist Federal University Gashua in selecting the most appropriate cryptographic algorithms to enhance data security while maintaining the efficiency of its network operations. This research could also benefit other universities in Yobe State and across Nigeria seeking to optimize their data transmission security.
Scope and Limitations of the Study
The study will focus on the impact of cryptographic algorithms on secure data transmission specifically at Federal University Gashua in Yobe State. The research will examine various cryptographic algorithms’ effectiveness and performance, considering both security and computational efficiency. The study will be limited to the university's network infrastructure and does not extend to other institutions or regions.
Definitions of Terms
Cryptographic Algorithms: Mathematical techniques used to secure data by converting it into an unreadable format and ensuring that only authorized parties can access it.
Data Transmission: The process of sending data from one location to another over a network.
Encryption: The process of converting data into a secure format to prevent unauthorized access.
Computational Efficiency: The measure of the computational resources required to perform a specific cryptographic operation, such as time or processing power.
Background of the Study
Cervical cancer is a leading cause of cancer-related deaths among women worldwide, particularly...
Background of the Study
Digital transformation has become a strategic imperative for banks seeking to streamline operations...
Background of the Study
Urban traffic congestion is a major challenge in Kano Metropolitan Area. Traditional traffic signal...
ABSTRACT
The study investigated the relationship between organisational climate and teaching effectiveness in public sec...
Background of the Study
Work ethics play a critical role in shaping employee behavior, productivity, and organizational culture. Organiza...
Background of the study
Leadership succession is a critical factor influencing the stability and long-ter...
Background of the Study
Product quality plays a pivotal role in shaping consumer prefe...
ABSTRACT
Rural development of any kind in any place can only be meaningfully achieved through a well planned and execute...
Background of the Study:
Maintenance charge policies are vital for covering the costs of service delivery in banking. Stanb...
Background of the Study
Antimicrobial resistance (AMR) poses a significant threat to global public health, with resistant...