2006
DOI: 10.1016/j.comnet.2005.12.005
|View full text |Cite
|
Sign up to set email alerts
|

A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
53
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 56 publications
(54 citation statements)
references
References 12 publications
1
53
0
Order By: Relevance
“…The mathematical analysis performed in [33] and [34] proved that the encryption/decryption delay of AES depends on the message size (S d ) and the number of million instructions per second (MIPS) of the processor (C p ). The encryption delay of AES was derived in [34] and found to be equal to: Int.…”
Section: System Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The mathematical analysis performed in [33] and [34] proved that the encryption/decryption delay of AES depends on the message size (S d ) and the number of million instructions per second (MIPS) of the processor (C p ). The encryption delay of AES was derived in [34] and found to be equal to: Int.…”
Section: System Analysismentioning
confidence: 99%
“…On the other hand, T AES−Enc is the number of processing cycles required to encrypt one block of data, which is equal to 6168 processing cycles for a 128 bit key (which is the size of the AES session key that we will use in the simulations). In a similar way, the authors in [34] calculate the number of processing cycles needed to decrypt one block of data (T AES−Dec ) and use it to calculate the total decryption delay of a packet, which Int. J.…”
Section: System Analysismentioning
confidence: 99%
“…One of them (Cremers, 2011) identifies the following vulnerabilities: Reflection attack on IKEv1 Main Mode with digital signatures or pre-shared keys, Reflection attack on IKEv1 Quick Mode, Reflection attack on IKEv1 Main Mode with public key encryption, Authentication failure on IKEv1 Aggressive Mode with digital signatures, Authentication failure on IKEv1 Main Mode with digital signatures that does not require selfcommunication, Reflection attack on IKEv2 phase 2 exchange. Another important aspect of the IPsec protocol is the computational overhead, described in detail in (Xenakis, 2006). The factors taken into account are the encryption type and the authentication mechanism, and the resultants reflect in the system throughput, total delay and rate increase of the protected data.…”
Section: Authentication and Identificationmentioning
confidence: 99%
“…The protocol increases the security level by applying different cryptographic algorithms to send and receive encrypted data over secure channels. Originally IPSec was designed for wired networks and the wireless networks' limitations, such as processing power of mobile devices and the limited resources of wireless channels were not considered initially [8].…”
Section: Ipsecmentioning
confidence: 99%