Performance comparison analysis of aes-256 sha-256-hmac, aes-256 md5-hmac, 3des sha-256-hmac and 3des-md5-hmac on ipsec vpn using gns3 / Mohd Hilman Lukman
Encryption algorithm will take advantage of advance computer hardware in term of processing and memory capacity. Secure connection can be established between two points within public internet infrastructure. To not compromise the resources of end terminal, this encryption and decryption process is d...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2016
|
Online Access: | https://ir.uitm.edu.my/id/eprint/80366/1/80366.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|