Performance comparison analysis of aes-256 sha-256-hmac, aes-256 md5-hmac, 3des sha-256-hmac and 3des-md5-hmac on ipsec vpn using gns3 / Mohd Hilman Lukman
Encryption algorithm will take advantage of advance computer hardware in term of processing and memory capacity. Secure connection can be established between two points within public internet infrastructure. To not compromise the resources of end terminal, this encryption and decryption process is d...
Saved in:
Main Author: | Lukman, Mohd Hilman |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2016
|
Online Access: | https://ir.uitm.edu.my/id/eprint/80366/1/80366.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
SHA1 and SHA256 custom instruction design and characterization on Nios II processor
by: Shariffar, Hamed
Published: (2012) -
Secure communication in location based services (LBS) using advanced encryption standard 256(AES 256) / Nur Afiqah Mohd Noor
by: Mohd Noor, Nur Afiqah
Published: (2014) -
Verilog design of a 256-bit AES crypto processor core
by: Lai, Yit Pin
Published: (2007) -
Verilog design of bist on AES256 processor core with FPGA implementation
by: Hew, Kean Yung
Published: (2008) -
Enhancement of bluetooth security authentication using Hash-Based Message Authentication Code (HMAC) algorithm /
by: Saliou, Diallo Alhassane
Published: (2015)