The Efficiency of Block Ciphers in Galois/Counter Mode in IPsec-Based Virtual Private Networks

被引:0
|
作者
Uskov, Alexander [1 ]
Avagyan, Hayk [1 ]
机构
[1] Bradley Univ, Dept Comp Sci & Informat Syst, Peoria, IL 61625 USA
关键词
ciphers; GCM mode; IPsec-based VPN; efficiency;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Encryption algorithms (ciphers) and modes of their operation (or, modes) have significant influence on efficiency (i.e. security and performance) of IP-based networks. The recently introduced newest modes of cipher operation - authenticated encryption with associated data (AEAD) modes - provide confidentiality, integrity and authenticity of transferred data in a single 2-phase cryptographic scheme. One of the most promising AEAD cryptographic schemes - the Galois/Counter Mode (GCM) - provides encryption and message authentication using universal hashing based on multiplication in a binary finite field. This paper presents obtained research results about the efficiency of popular ciphers in GCM mode for a transfer of rich multimedia data in IPsec-based virtual private networks.
引用
收藏
页码:173 / 178
页数:6
相关论文
共 50 条
  • [21] Implementation of an FPGA based accelerator for Virtual Private Networks
    Cheung, OYH
    Leong, PHW
    [J]. 2002 IEEE INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (FPT), PROCEEDINGS, 2002, : 34 - 41
  • [22] Name-Based Address Mapping for Virtual Private Networks
    Suranyi, Peter
    Shinjo, Yasushi
    Kato, Kazuhiko
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2009, E92B (01) : 200 - 208
  • [23] Virtual private network issues using satellite based networks
    Olechna, E
    Feighery, P
    Hryckiewicz, S
    [J]. 2001 MILCOM, VOLS 1 AND 2, PROCEEDINGS: COMMUNICATIONS FOR NETWORK-CENTRIC OPERATIONS: CREATING THE INFORMATION FORCE, 2001, : 785 - 789
  • [24] Traffic engineering for MPLS-based virtual private networks
    Chou, CT
    [J]. COMPUTER NETWORKS, 2004, 44 (03) : 319 - 333
  • [25] Traffic engineering for MPLS-based Virtual Private Networks
    Chou, CT
    [J]. ELEVENTH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2002, : 110 - 115
  • [26] Block-HRG: Block-based differentially private IoT networks release
    Hou, Lihe
    Ni, Weiwei
    Zhang, Sen
    Fu, Nan
    Zhang, Dongyue
    [J]. AD HOC NETWORKS, 2023, 140
  • [27] New mechanisms for end-to-end security using IPSec in NAT-based private networks
    Kim, SY
    Shin, JW
    Sim, SY
    Park, DS
    [J]. WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET-RELATED SOCIAL ISSUES - HSI 2003, 2003, 2713 : 548 - 557
  • [28] Scalability testing of legacy MPLS-based Virtual Private Networks
    Lopez, Gustavo
    Grampin, Eduardo
    [J]. 2017 IEEE URUCON, 2017,
  • [29] Authentication in virtual private networks based on quantum key distribution methods
    Marcin Niemiec
    Petr Machnik
    [J]. Multimedia Tools and Applications, 2016, 75 : 10691 - 10707
  • [30] A programmable network based approach for managing dynamic virtual private networks
    State, R
    Festor, O
    Nataf, E
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 393 - 399