0704-883-0675     |      dataprojectng@gmail.com

Design and Implementation of a Quantum-Based Authentication System for Exam Security at Federal University, Lafia, Nasarawa State

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for :
  • NGN 5000

Background of the Study
Academic integrity is one of the most pressing concerns in modern universities, with exam security being a focal point. Traditional methods of securing exam systems have often been prone to security breaches, including cheating, impersonation, and unauthorized access. Quantum computing, with its ability to process information using quantum bits (qubits), offers the potential to significantly enhance security protocols, particularly in areas such as authentication systems (Shor et al., 2024). Quantum-based authentication, which leverages the principles of quantum cryptography, promises unbreakable security due to the unique properties of quantum mechanics such as superposition and entanglement.

At Federal University, Lafia, Nasarawa State, the current authentication systems used for exams are primarily based on classical encryption techniques, which may be vulnerable to advanced hacking strategies. This study explores the design and implementation of a quantum-based authentication system aimed at enhancing exam security. The goal is to create a system that provides a higher level of security and reduces the potential for fraud, ensuring the integrity of the examination process.

Statement of the Problem
While existing authentication systems at Federal University, Lafia, offer a basic level of security, they are susceptible to attacks such as man-in-the-middle or denial-of-service attacks. Given the growing threats in digital security, there is an urgent need for more robust systems that can withstand these advanced threats. Quantum-based authentication systems, utilizing quantum cryptographic protocols like Quantum Key Distribution (QKD), could offer a solution, but their implementation remains underexplored in the context of university exam security.

Objectives of the Study

  1. To design a quantum-based authentication system for securing exams at Federal University, Lafia.

  2. To implement the designed quantum authentication system and assess its effectiveness in ensuring exam security.

  3. To compare the performance and security features of the quantum-based system with traditional authentication systems.

Research Questions

  1. How can a quantum-based authentication system be designed to enhance exam security at Federal University, Lafia?

  2. What are the effectiveness and security advantages of a quantum-based authentication system over traditional systems?

  3. What challenges are encountered during the implementation of quantum-based authentication for exam security?

Significance of the Study
The implementation of quantum-based authentication systems in university exam settings can greatly enhance the security of academic assessments. This study will not only contribute to the academic integrity of Federal University, Lafia but also serve as a model for other Nigerian universities interested in adopting quantum technologies for exam security. Additionally, the findings could have broader implications for the use of quantum cryptography in securing sensitive data across various sectors.

Scope and Limitations of the Study
This study will focus on the design, implementation, and evaluation of a quantum-based authentication system for exam security at Federal University, Lafia, Nasarawa State. The research will be limited to assessing the effectiveness of the system in the context of university exams, and will not address broader issues related to quantum technology infrastructure or national adoption policies.

Definitions of Terms

  1. Quantum-Based Authentication: A security method that utilizes the principles of quantum mechanics to verify identity and prevent unauthorized access.

  2. Quantum Key Distribution (QKD): A cryptographic method that uses quantum properties to securely exchange keys for encrypting data.

  3. Man-in-the-Middle Attack: A type of security breach where an attacker intercepts and potentially alters communications between two parties without their knowledge.





Related Project Materials

Development of AI-Based Smart University Transportation Scheduling Systems in Abubakar Tafawa Balewa University, Bauchi, Bauchi State

Background of the Study
Transportation systems within universities are crucial for ensuring that students and staff can acc...

Read more
An evaluation of the challenges of teaching moral education in multi-religious communities in Maiduguri LGA, Borno State

Background of the Study

The educational landscape in multi-religious communities is increasingly complex due to the interplay of diverse...

Read more
An examination of cause-related marketing on customer behavior: A case study of a retail bank in Abuja, Nigeria.

Background of the study:

Cause-related marketing (CRM) has become a strategic tool in the financial services sector, whe...

Read more
THE INFLUENCE OF EMPLOYEE BENEFITS ON MOTIVATION

Abstract: THE INFLUENCE OF EMPLOYEE BENEFITS ON MOTIVATION

Objective: This study aims...

Read more
The Impact of Financial Management on the Sustainability of Private Hospitals: A Study of Healthcare Facilities in Kaduna State

Background of the Study

Effective financial management is critical for the sustainability of private hospitals, as it ensures efficient a...

Read more
AN EXAMINATION OF PROBLEMS AND PROSPECTS OF REAL PROPERTY TAXATION IN NIGERIA

EXCERPT FROM THE STUDY

1. The problems of property taxation in Nigeria is  undervaluation,incomplete registers and policy inadequacy...

Read more
An Analysis of the Effect of Policy Simulation Models on Fiscal Planning in Nigeria

Background of the Study
Policy simulation models are increasingly employed as decision-support tools in fiscal planning to...

Read more
An appraisal of religious education’s role in shaping students’ social skills in Bauchi LGA, Bauchi State

Background of the Study

Religious education is widely regarded not only as a means of spiritual instruction but also as an important cont...

Read more
Enhancing Classroom Interactivity with AI-Based Augmented Reality Learning in Kogi State Polytechnic, Lokoja, Kogi State

Background of the Study

Classroom interactivity plays a vital role in student engagement and learning outcomes. Traditional teaching meth...

Read more
ASSESSMENT OF ALMAJIRI SYSTEM OF EDUCATION; IT’S IMPLICATION FOR CHILD, FAMILY AND NATIONAL DEVELOPMENT IN ZARIA LOCAL GOVERNMENT AREA OF KADUNA STATE.

ABSTRACT

This study was undertaken to find out the implications of Almajiri system of education in Zaria local gove...

Read more
Share this page with your friends




whatsapp