Background of the Study
In the digital age, data transmission over networks has become a critical component of academic operations in universities, including Federal University Gashua in Yobe State. With increasing reliance on the internet for research, communication, and administration, the secure transmission of data is a priority. One of the primary techniques used to secure data transmission is cryptography, which ensures that sensitive information remains confidential and integral during transmission. Various cryptographic algorithms, such as RSA, AES, and ECC, have been developed to safeguard data from unauthorized access and tampering.
However, the effectiveness of cryptographic algorithms in securing data transmission depends on several factors, including the algorithm’s strength, computational efficiency, and resistance to evolving cyber-attacks. While many studies have examined the theoretical aspects of cryptography, there is limited research on its practical impact on data transmission security in Nigerian universities. This study aims to investigate the impact of cryptographic algorithms on secure data transmission at Federal University Gashua, assessing how different algorithms affect the security and efficiency of data transmission in the university’s network.
Statement of the Problem
Federal University Gashua, like many universities, relies on various cryptographic algorithms to secure sensitive academic and administrative data during transmission. However, the effectiveness of these algorithms in providing robust data security in the face of modern cyber threats has not been extensively evaluated. Some algorithms may provide strong security but at the cost of high computational overhead, affecting the efficiency of data transmission. Other algorithms may offer faster performance but weaker security. Therefore, there is a need to investigate the impact of different cryptographic algorithms on the security and efficiency of data transmission at Federal University Gashua.
Objectives of the Study
To analyze the effectiveness of different cryptographic algorithms in securing data transmission at Federal University Gashua.
To compare the performance of various cryptographic algorithms in terms of security strength and computational efficiency.
To recommend the most suitable cryptographic algorithm for secure and efficient data transmission in the university’s network.
Research Questions
What is the impact of cryptographic algorithms on the security of data transmission at Federal University Gashua?
How do the computational efficiency and security strength of different cryptographic algorithms compare in the context of the university's data transmission needs?
Which cryptographic algorithm is most suitable for secure and efficient data transmission at Federal University Gashua?
Significance of the Study
This study will provide insights into the practical application of cryptographic algorithms in securing data transmission in Nigerian universities. The findings will assist Federal University Gashua in selecting the most appropriate cryptographic algorithms to enhance data security while maintaining the efficiency of its network operations. This research could also benefit other universities in Yobe State and across Nigeria seeking to optimize their data transmission security.
Scope and Limitations of the Study
The study will focus on the impact of cryptographic algorithms on secure data transmission specifically at Federal University Gashua in Yobe State. The research will examine various cryptographic algorithms’ effectiveness and performance, considering both security and computational efficiency. The study will be limited to the university's network infrastructure and does not extend to other institutions or regions.
Definitions of Terms
Cryptographic Algorithms: Mathematical techniques used to secure data by converting it into an unreadable format and ensuring that only authorized parties can access it.
Data Transmission: The process of sending data from one location to another over a network.
Encryption: The process of converting data into a secure format to prevent unauthorized access.
Computational Efficiency: The measure of the computational resources required to perform a specific cryptographic operation, such as time or processing power.
Background of the Study
The rapid emergence of novel viral strains has become a global health concern, with the COVID-19 pa...
ABSTRACT
The study investigate the causes of examination malpractice among secondary school students, Konshisha local go...
Background of the Study
Stroke is a leading cause of disability worldwide, with mobility impairments being among the most common sequelae...
Background of the study
Instagram meme culture has become a vibrant engine of linguistic innovation in Nigeria. Memes on In...
ABSTRACT
This contains the impact of social responsibilities of Oil Companies in the host communities of the Niger Delta...
Background of the Study
Chemotherapy is a cornerstone in cancer treatment, but it often comes with a range of side effects that can signi...
Background of the Study
Political dynasties have long been a feature of many democratic systems, often leading to the conc...
Background Of The Study
Apparently, the global financial system is embracing the present technolog...
Background of the Study
The retail industry has undergone significant transformations in recent years, with the rise of e-c...
Background of the study
Navigating large campus environments presents significant challenges for visually impaired individ...