0704-883-0675     |      dataprojectng@gmail.com

Investigation into the Impact of Cryptographic Algorithms on Secure Data Transmission in Federal University, Gashua, Yobe State

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for :
  • NGN 5000

Background of the Study
In the digital age, data transmission over networks has become a critical component of academic operations in universities, including Federal University Gashua in Yobe State. With increasing reliance on the internet for research, communication, and administration, the secure transmission of data is a priority. One of the primary techniques used to secure data transmission is cryptography, which ensures that sensitive information remains confidential and integral during transmission. Various cryptographic algorithms, such as RSA, AES, and ECC, have been developed to safeguard data from unauthorized access and tampering.

However, the effectiveness of cryptographic algorithms in securing data transmission depends on several factors, including the algorithm’s strength, computational efficiency, and resistance to evolving cyber-attacks. While many studies have examined the theoretical aspects of cryptography, there is limited research on its practical impact on data transmission security in Nigerian universities. This study aims to investigate the impact of cryptographic algorithms on secure data transmission at Federal University Gashua, assessing how different algorithms affect the security and efficiency of data transmission in the university’s network.

Statement of the Problem
Federal University Gashua, like many universities, relies on various cryptographic algorithms to secure sensitive academic and administrative data during transmission. However, the effectiveness of these algorithms in providing robust data security in the face of modern cyber threats has not been extensively evaluated. Some algorithms may provide strong security but at the cost of high computational overhead, affecting the efficiency of data transmission. Other algorithms may offer faster performance but weaker security. Therefore, there is a need to investigate the impact of different cryptographic algorithms on the security and efficiency of data transmission at Federal University Gashua.

Objectives of the Study

  1. To analyze the effectiveness of different cryptographic algorithms in securing data transmission at Federal University Gashua.

  2. To compare the performance of various cryptographic algorithms in terms of security strength and computational efficiency.

  3. To recommend the most suitable cryptographic algorithm for secure and efficient data transmission in the university’s network.

Research Questions

  1. What is the impact of cryptographic algorithms on the security of data transmission at Federal University Gashua?

  2. How do the computational efficiency and security strength of different cryptographic algorithms compare in the context of the university's data transmission needs?

  3. Which cryptographic algorithm is most suitable for secure and efficient data transmission at Federal University Gashua?

Significance of the Study
This study will provide insights into the practical application of cryptographic algorithms in securing data transmission in Nigerian universities. The findings will assist Federal University Gashua in selecting the most appropriate cryptographic algorithms to enhance data security while maintaining the efficiency of its network operations. This research could also benefit other universities in Yobe State and across Nigeria seeking to optimize their data transmission security.

Scope and Limitations of the Study
The study will focus on the impact of cryptographic algorithms on secure data transmission specifically at Federal University Gashua in Yobe State. The research will examine various cryptographic algorithms’ effectiveness and performance, considering both security and computational efficiency. The study will be limited to the university's network infrastructure and does not extend to other institutions or regions.

Definitions of Terms

  • Cryptographic Algorithms: Mathematical techniques used to secure data by converting it into an unreadable format and ensuring that only authorized parties can access it.

  • Data Transmission: The process of sending data from one location to another over a network.

  • Encryption: The process of converting data into a secure format to prevent unauthorized access.

  • Computational Efficiency: The measure of the computational resources required to perform a specific cryptographic operation, such as time or processing power.

 

 

 





Related Project Materials

An assessment of nurses' awareness and adherence to cervical cancer screening guidelines at Federal Teaching Hospital, Abakaliki

Background of the Study

Cervical cancer is a leading cause of cancer-related deaths among women worldwide, particularly...

Read more
An Evaluation of Digital Transformation Strategy Execution on Reducing Operational Redundancies in Banking: A Case Study of Co-operative Bank of Nigeria

Background of the Study
Digital transformation has become a strategic imperative for banks seeking to streamline operations...

Read more
Optimization of Quantum Algorithms for Traffic Signal Synchronization in Urban Areas: A Case Study of Kano Metropolitan Area, Kano State

Background of the Study
Urban traffic congestion is a major challenge in Kano Metropolitan Area. Traditional traffic signal...

Read more
ORGANIZATIONAL CLIMATE AND TEACHING EFFECTIVENESS IN PUBLIC SECONDARY SCHOOLS

ABSTRACT

The study investigated the relationship between organisational climate and teaching effectiveness in public sec...

Read more
An Evaluation of Work Ethics and Employee Commitment in Unity Bank, Adamawa State

Background of the Study

Work ethics play a critical role in shaping employee behavior, productivity, and organizational culture. Organiza...

Read more
The impact of leadership succession on organizational stability: A case study of multinational corporations in Port Harcourt City Local Government Area, Rivers State

Background of the study
Leadership succession is a critical factor influencing the stability and long-ter...

Read more
The Impact of Product Quality on Brand Loyalty in Nigerian Retail Markets: A Study of Electronics Retailers in Plateau State

Background of the Study

Product quality plays a pivotal role in shaping consumer prefe...

Read more
THE ROLE OF RADIO BROADCASTING IN THE RURAL DEVELOPMENT

ABSTRACT

Rural development of any kind in any place can only be meaningfully achieved through a well planned and execute...

Read more
An appraisal of maintenance charge policies on branch operational costs in banking: a case study of Stanbic IBTC Bank Nigeria

Background of the Study:
Maintenance charge policies are vital for covering the costs of service delivery in banking. Stanb...

Read more
Investigation into the Use of Bioinformatics in Studying Antimicrobial Resistance Genes: A Case Study of Federal University, Dutsin-Ma, Katsina State

Background of the Study
Antimicrobial resistance (AMR) poses a significant threat to global public health, with resistant...

Read more
Share this page with your friends




whatsapp