Background of the Study
Digital security is an essential aspect of modern-day computing, and hashing algorithms play a critical role in securing sensitive information, such as passwords and personal data. These algorithms transform input data into fixed-size output, commonly known as hash values, which are difficult to reverse. Various hashing algorithms, such as MD5, SHA-1, and SHA-256, are commonly used to safeguard data, but their performance in terms of speed, security, and resistance to attacks varies. Federal Polytechnic, Bauchi, located in Bauchi LGA, Bauchi State, faces security challenges in its digital systems, particularly in protecting student and administrative data. This study will evaluate the performance of different hashing algorithms, focusing on their computational efficiency, resistance to collisions, and suitability for securing the polytechnic’s digital platforms.
Statement of the Problem
Federal Polytechnic, Bauchi’s digital systems rely on hashing algorithms for data security, but it is unclear whether the current algorithms in use offer the best balance between speed and security. Some of the older hashing algorithms, such as MD5 and SHA-1, have known vulnerabilities, including susceptibility to collision attacks. As the institution continues to handle large amounts of sensitive data, ensuring the robustness of hashing algorithms becomes critical. A thorough evaluation of various hashing algorithms is necessary to determine which offers the best security features for the polytechnic’s systems.
Objectives of the Study
Research Questions
Research Hypotheses
Significance of the Study
This study will provide valuable insights into the strengths and weaknesses of different hashing algorithms in securing digital platforms. It will guide Federal Polytechnic, Bauchi in selecting the most appropriate hashing algorithm for protecting sensitive student and administrative data. The findings could also be beneficial to other institutions and organizations facing similar security challenges.
Scope and Limitations of the Study
The study will focus on evaluating the performance of various hashing algorithms at Federal Polytechnic, Bauchi, within Bauchi LGA, Bauchi State. It will not extend to other digital security measures outside of hashing algorithms.
Definitions of Terms
Hashing Algorithm: A mathematical function that converts input data into a fixed-size output (hash).
Collision Resistance: The ability of a hashing algorithm to avoid two different inputs producing the same hash value.
Digital Security: Measures taken to protect digital systems and data from unauthorized access, tampering, or theft.
Background of the study:
Artisanal blacksmithing, a traditional craft passed down through generations, rem...
EXCERPT FROM THE STUDY
Problems in agricultural marketing include large number of middlemen who intervene between p...
Background to the Study
Electronics media are considered as important instrument in modern world in facilitating quality...
ABSTRACT
THE IMPACT OF INVESTMENT IN EMERGING MARKETS ON PORTFOLIO GROWTH
This research explores the impact of investment in em...
ABSTRACT
The Human Immune deficiency Virus(HIV) and the Acquired Immune Deficiency Syndrome (AIDS) situation in Nigeria has affected bloo...
ABSTRACT
La traduction est et a toujours été » une...
Background of the Study
Campaign financing plays a critical role in the dynamics of electoral competiti...
Chapter One: Introduction
ABSTRACT
This study discusses the impact of Microfinance Institution (MFIs) on the gro...
Background of the Study
Construction sites are high-risk environments where workers are exposed to inju...