Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333)
DOI: 10.1109/icc.2002.997033
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of IPSec protocol: encryption and authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0
1

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 72 publications
(26 citation statements)
references
References 8 publications
0
25
0
1
Order By: Relevance
“…Recently there have been some efforts devoted to the development of real-time applications on Grids [9]. Realtime applications depend not only on results of computation, but also on time instants at which these results become available [13].…”
Section: Introductionmentioning
confidence: 99%
“…Recently there have been some efforts devoted to the development of real-time applications on Grids [9]. Realtime applications depend not only on results of computation, but also on time instants at which these results become available [13].…”
Section: Introductionmentioning
confidence: 99%
“…Change in various processing times with changes in MIPS capability of a processor has been modeled [14]. Some symmetric and asymmetric key algorithms have been evaluated on higher end microprocessors on the basis of power consumption [7].…”
Section: Related Workmentioning
confidence: 99%
“…RC4 [2] is used in IEEE 802.11 WEP [13], IDEA [2] and MD5 [2], [3] are part of PGP [11], SHA-1 [4] and MD5 [2][3] are included in the security architecture for Internet Protocol (IPSEC) [14], [10], and RC5 [1] has been suggested as a good algorithm for sensor networks [12]. These algorithms offer variety in the mode in which they operate and encompass different mathematical and data manipulation operations.…”
Section: Algorithmsmentioning
confidence: 99%
“…Suppose the 3DES encryption algorithm is applied to a real-time cluster consisting of 100 MIPS machines. The time complexity of 3DES indicates an 800 bps (bit per second) encryption rate on a 100 MIPS machine [11]. Further, computation overhead caused by encryption is a linear function of the amount of data (input file size) to be protected [11].…”
Section: Encryption Overheadmentioning
confidence: 99%
“…The time complexity of 3DES indicates an 800 bps (bit per second) encryption rate on a 100 MIPS machine [11]. Further, computation overhead caused by encryption is a linear function of the amount of data (input file size) to be protected [11]. As mentioned in Section 3.2, l i (measured in KB) denotes the amount of data in task T i needed to be protected.…”
Section: Encryption Overheadmentioning
confidence: 99%