Performance comparison analysis of aes-256 sha-256-hmac, aes-256 md5-hmac, 3des sha-256-hmac and 3des-md5-hmac on ipsec vpn using gns3 / Mohd Hilman Lukman

Encryption algorithm will take advantage of advance computer hardware in term of processing and memory capacity. Secure connection can be established between two points within public internet infrastructure. To not compromise the resources of end terminal, this encryption and decryption process is d...

Full description

Saved in:
Bibliographic Details
Main Author: Lukman, Mohd Hilman
Format: Thesis
Language:English
Published: 2016
Online Access:https://ir.uitm.edu.my/id/eprint/80366/1/80366.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items