Performance analysis of IPSec protocol: encryption and authentication

نویسندگان

  • Omar S. Elkeelany
  • Mustafa M. Matalgah
  • Khurram Sheikh
  • M. Thaker
  • Ghulam M. Chaudhry
  • Deep Medhi
  • Jihad Qaddour
چکیده

IPSec provides two types of security algorithms, symmetric encryption algorithms (e.g. Data Encryption Standard DES) for encryption, and one-way hash functions (e.g., Message Digest MD5 and Secured Hash Algorithm SHAl) for authentication. This paper presents performance analysis and comparisons between these algorithms in terms of time complexity and space complexity. Parameters considered are processing power and input size. The analysis results revealed that HMAC-MD5 can he sufficient for the authentication purposes rather than using the more complicated HMAC-SHAl algorithm. In encryption applications, authentication should he combined with DES.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Analysis of IP Security VPN

Internet Protocol Security (IPSec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a data stream. . IPSec architecture requires the host to provide confidentiality using Encapsulating Security Payload and data integrity using either Authentication Header or Encapsulating Security Payload and anti-replay protection. IPSec ...

متن کامل

Performance Impact of Data Compression on Virtual Private Network Transactions

Virtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security services such as confidentiality, host authentication and data integrity. The computation required to provide adequate security, however, can significantly degrade performance. In this paper, we characterize the extent to wh...

متن کامل

Simplified IPSec Protocol Stack for Micro Server

In this paper, we propose a simple IPSec protocol stack for Micro Server. We proposed an implementation of IPSec protocol stack which is constructed by Encapsulating Security Payload (ESP) protocol with Advanced Encryption Security (AES) encryption scheme, whereas authentication using MD5 algorithm is optional. Researchers have focused on creating a small system composed of sensors and a Micro ...

متن کامل

IPSec overhead in wireline and wireless networks for Web and email applications

This research focuses on developing a set of secure communication network testbeds and using them to measure the overhead of IP Security (IPSec) for email and web applications. The network testbeds are implemented using both wireline and wireless technologies. The testing involves a combination of authentication algorithms such as Hashed Message Authentication Code-Message Digest 5 (HMAC-MD5) a...

متن کامل

Performance Evaluation of 802.11g Architecture Using Security Protocols Based on Index Policy Method

Data security has a major role in the development of communication system as wireless local area networks (WLANs) are beginning to play a much larger role in corporate network environments. Wireless local area networks are very popular for home networking applications, therefore this increase in accessibility has created problems for data security.To deal with these problems stronger security m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002