0704-883-0675     |      dataprojectng@gmail.com

Evaluation of the Performance of Different Hashing Algorithms in Digital Security: A Case Study of Federal Polytechnic, Bauchi (Bauchi LGA, Bauchi State)

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for :
  • NGN 5000

Background of the Study
Digital security is an essential aspect of modern-day computing, and hashing algorithms play a critical role in securing sensitive information, such as passwords and personal data. These algorithms transform input data into fixed-size output, commonly known as hash values, which are difficult to reverse. Various hashing algorithms, such as MD5, SHA-1, and SHA-256, are commonly used to safeguard data, but their performance in terms of speed, security, and resistance to attacks varies. Federal Polytechnic, Bauchi, located in Bauchi LGA, Bauchi State, faces security challenges in its digital systems, particularly in protecting student and administrative data. This study will evaluate the performance of different hashing algorithms, focusing on their computational efficiency, resistance to collisions, and suitability for securing the polytechnic’s digital platforms.

Statement of the Problem
Federal Polytechnic, Bauchi’s digital systems rely on hashing algorithms for data security, but it is unclear whether the current algorithms in use offer the best balance between speed and security. Some of the older hashing algorithms, such as MD5 and SHA-1, have known vulnerabilities, including susceptibility to collision attacks. As the institution continues to handle large amounts of sensitive data, ensuring the robustness of hashing algorithms becomes critical. A thorough evaluation of various hashing algorithms is necessary to determine which offers the best security features for the polytechnic’s systems.

Objectives of the Study

  1. To evaluate the computational efficiency and security features of various hashing algorithms used in digital security at Federal Polytechnic, Bauchi.
  2. To compare the performance of older hashing algorithms (MD5, SHA-1) with newer algorithms (SHA-256, SHA-3) in terms of speed and collision resistance.
  3. To recommend the most suitable hashing algorithm for securing the polytechnic’s digital systems.

Research Questions

  1. How do different hashing algorithms compare in terms of computational efficiency at Federal Polytechnic, Bauchi?
  2. What is the level of resistance to collision attacks in various hashing algorithms?
  3. Which hashing algorithm is most suitable for securing the polytechnic’s digital systems based on performance and security?

Research Hypotheses

  1. Newer hashing algorithms (SHA-256, SHA-3) will outperform older ones (MD5, SHA-1) in terms of collision resistance.
  2. The performance of hashing algorithms will vary significantly in terms of computational efficiency for large datasets.
  3. The newer hashing algorithms will provide better overall security for digital systems than older algorithms.

Significance of the Study
This study will provide valuable insights into the strengths and weaknesses of different hashing algorithms in securing digital platforms. It will guide Federal Polytechnic, Bauchi in selecting the most appropriate hashing algorithm for protecting sensitive student and administrative data. The findings could also be beneficial to other institutions and organizations facing similar security challenges.

Scope and Limitations of the Study
The study will focus on evaluating the performance of various hashing algorithms at Federal Polytechnic, Bauchi, within Bauchi LGA, Bauchi State. It will not extend to other digital security measures outside of hashing algorithms.

Definitions of Terms
Hashing Algorithm: A mathematical function that converts input data into a fixed-size output (hash).
Collision Resistance: The ability of a hashing algorithm to avoid two different inputs producing the same hash value.
Digital Security: Measures taken to protect digital systems and data from unauthorized access, tampering, or theft.





Related Project Materials

The impact of artisanal blacksmithing on local economies in Ikirun, Ifelodun Local Government Area, Osun State

Background of the study:
Artisanal blacksmithing, a traditional craft passed down through generations, rem...

Read more
CONSTRAINTS TO THE DISTRIBUTION OF AGRICULTURAL PRODUCTS BY LOCAL PRODUCERS IN TARABA STATE

EXCERPT FROM THE STUDY

Problems in agricultural marketing include large number of middlemen who intervene between p...

Read more
ASSESSMENT OF AVAILABILITY AND UTILIZATION OF ELECTRONIC MEDIA RESOURCES IN TEACHING ENGLISH LANGUAGE IN SENIOR SECONDARY SCHOOLS IN NIGERIA

Background to the Study

Electronics media are considered as important instrument in modern world in facilitating quality...

Read more
THE IMPACT OF INVESTMENT IN EMERGING MARKETS ON PORTFOLIO GROWTH

ABSTRACT

THE IMPACT OF INVESTMENT IN EMERGING MARKETS ON PORTFOLIO GROWTH

This research explores the impact of investment in em...

Read more
PREVALENCE OF HIV/AIDS AMONG INTENDING DONORS

ABSTRACT

The Human Immune deficiency Virus(HIV) and the Acquired Immune Deficiency Syndrome (AIDS) situation in Nigeria has affected bloo...

Read more
LA MODULATION VUE A TRAVERS LA VERSION ANGLAISE DE LE REGARD DU ROI DE CAMARA LAYE

          ABSTRACT

  La traduction est et a toujours été » une...

Read more
An Evaluation of the Impact of Campaign Financing Laws on Electoral Competition in Rano Local Government Area, Kano State

Background of the Study

Campaign financing plays a critical role in the dynamics of electoral competiti...

Read more
The Influence of Digital Media on Religious Practices in Gashua Local Government Area, Yobe State

Chapter One: Introduction

1.1 Background of the Study

THE IMPACT OF MICRO FINANCIAL INSTITUTIONS ON THE GROWTH OF SMALL AND MEDIUM SCALE BUSINESS

ABSTRACT

This study discusses the impact of Microfinance Institution (MFIs) on the gro...

Read more
An Investigation of First Aid Training Effectiveness in Emergency Response at Construction Sites in Benue State

Background of the Study

Construction sites are high-risk environments where workers are exposed to inju...

Read more
Share this page with your friends




whatsapp