The Efficiency of Encryption Algorithms in EAX Moder of Operation in IPSEC-based Virtual Private Networks for Streaming Rich Multimedia Data
نویسنده
چکیده
The characteristics of encryption/decryption algorithms (ciphers) and modes of their operation (modes) have significant influence on security and performance of computer networks. The common modes of cipher operation such as ECB, CBC, OFB, CFB, CTR and XTS provide various levels of data confidentiality; however, those modes do not provide integrity and authenticity of encrypted data, and, therefore, do not efficiently protect data against non-authorized access and/or malicious modification/tampering. The newest generation of cipher modes – authenticated encryption with associated data (AEAD) modes – provides confidentiality, integrity and authenticity of data in a single cryptographic scheme. This paper presents the outcomes of research project on ciphers’ efficiency in one of the most promising AEAD cryptographic schemes – the EAX mode in IPsecbased mobile virtual private networks for streaming rich multimedia data.
منابع مشابه
Performance of Multimedia Applications with IPSec Tunneling
The concept of Virtual Private Networks offers a simple and cheap alternative to dedicated secure networks in corporate networks and Internet environments. The choice, however, of authentication and encryption techniques and protocols affect issues such as data throughput and performance throughout the network. This paper looks into the effects of video and audio streaming on performances, whil...
متن کاملAdvanced Encryption Standard Analysis with Multimedia Data on Intel® AES-NI Architecture
The Intel® Advanced Encryption Standard (AES) New Instructions (AES-NI) were designed to implement some of the complex and performance intensive steps of the AES encryption/decryption algorithm (cipher) using hardware acceleration. This paper presents the outcomes of a research project aimed at encryption/decryption analysis of the AES cipher in ECB, CBC, OFB, CFB, and CTR modes of operation on...
متن کاملImplementation of an FPGA based accelerator for virtual private networks
Virtual Private Networks (VPN) are becoming increasingly popular network architectures for corporate networks. As VPNs are built on the Internet infrastructure, the data exchange among different local area networks will be passed through the Internet and thus can be easily eavesdropped, masqueraded, etc. Therefore, certain security measures must be used to deal with these privacy issues. The In...
متن کاملPerformance Impact of Data Compression on Virtual Private Network Transactions
Virtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security services such as confidentiality, host authentication and data integrity. The computation required to provide adequate security, however, can significantly degrade performance. In this paper, we characterize the extent to wh...
متن کاملPerformance Analysis of IP Security VPN
Internet Protocol Security (IPSec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a data stream. . IPSec architecture requires the host to provide confidentiality using Encapsulating Security Payload and data integrity using either Authentication Header or Encapsulating Security Payload and anti-replay protection. IPSec ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJCSA
دوره 11 شماره
صفحات -
تاریخ انتشار 2014