Open Access Open Access  Restricted Access Subscription or Fee Access

Implementation and Investigation of AES, DES and Triple DES to Secure MPLS Network

K. Gurpreet, K. Dinesh


Today's communication networks and services are migrating to a converged paradigm centered on IP (Internet Protocol). MPLS (Multi-Protocol Label Switching) has emerged as a key enabling technology for this migration. MPLS technology has proven its value for delivering new services while at the same time allowing migration from old to new networks. So, the security of this network is the main important challenging task. For this, various encryption standards are used. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. This paper provides a performance comparison by implementing three of the most common encryption algorithms: DES, 3DES, and AES on MPLS Technology. This comparison has been done on different hardware machines against Brute Force Attack. Then, it finally investigates the effectiveness of these algorithms against brute force attack on MPLS Network. Simulation has been conducted in MATLAB.


AES, DES, Triple DES, MPLS and KeyLength.

Full Text:



Lee H.; Hwang J.; Kang B.; Jun K. (2000) End-to-end QoS architecture for VPNs: MPLS VPN deployment in a backbone network. International Conference on Parallel Processing Workshops, pp.479-483, August 2000.

Susan, L., Standing the Test of time: The Data Encryption Standard. March 2000.

Cisco Systems. White paper: Security of the MPLS Architecture. August 14, 2001.

Wiener, M. Brute Force attacks on cryptographic keys. October, 2001.

Federal Information Processing Standards Publication 197. Advanced Encryption Standard. November 26, 2001.

Barlow, D.A.; Vassiliou, V.; Owen, H.L. (2003) A cryptographic protocol to protect MPLS labels. Information Assurance Workshop, IEEE Systems, Man and Cybernetics Society, pp. 237- 242, 18-20 June 2003.

Peterkin R.; Ionescu D. (2006) A Hardware/Software Co-Design for RSVP-TE MPLS. Electrical and Computer Engineering. Canadian Conference on, pp.1409-1412, May 2006.

Raphael C-W. Phan. (2007) Reducing the exhaustive key search of the Data Encryption Standard (DES). Computer Standards & Interfaces. Volume 29, Issue 5. pages 528-530. July 2007.

Liwen He; Botham, P. (2008) Pure MPLS Technology. Availability, Reliability and Security, ARES 08, Third International Conference on, pp.253-259, 4-7 March 2008.

Islam, M. N.; Mia, M. M. H.; Chowdhury, M. F. I.; Matin, M. A. (2008) Effect of Security Increment to Symmetric Data Encryption through AES Methodology. Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/ Distributed Computing, pp. 291-294, 2008.

Ramakrishnan, V.; Wargo, C.; John, S. (2008) GMPLS Network Security: Gap Analysis. ICNS Conference, 2008 IEEE Systems, pp. 1-7, 5-7 May 2008.

M. Carolyn. 7 reasons MPLS has been wildly successful. March 2009.

Sachin, M.; Kumar, D.; (2010) Implementation and Analysis of AES, DES and Triple DES on GSM Network. IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.1, January 2010.

Garry, C. Kessler. An Overview of Cryptography. November, 2010.

Miller, B. and Stewart, E. Multi-Protocol Label Switching (MPLS) Conformance and Performance Testing. White Papers.

Bruce Schneier Niels Ferguson. Practical Cryptography. Number ISBN 0-471-22357-3.

Abdel-Karim Al Tamimi, “Performance Analysis of Data Encryption Algorithms”. [Available Online At:]


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.