Implementation and Investigation of AES, DES and Triple DES to Secure MPLS Network
Abstract
Keywords
Full Text:
PDFReferences
Lee H.; Hwang J.; Kang B.; Jun K. (2000) End-to-end QoS architecture for VPNs: MPLS VPN deployment in a backbone network. International Conference on Parallel Processing Workshops, pp.479-483, August 2000.
Susan, L., Standing the Test of time: The Data Encryption Standard. March 2000.
Cisco Systems. White paper: Security of the MPLS Architecture. August 14, 2001.
Wiener, M. Brute Force attacks on cryptographic keys. October, 2001.
Federal Information Processing Standards Publication 197. Advanced Encryption Standard. November 26, 2001.
Barlow, D.A.; Vassiliou, V.; Owen, H.L. (2003) A cryptographic protocol to protect MPLS labels. Information Assurance Workshop, IEEE Systems, Man and Cybernetics Society, pp. 237- 242, 18-20 June 2003.
Peterkin R.; Ionescu D. (2006) A Hardware/Software Co-Design for RSVP-TE MPLS. Electrical and Computer Engineering. Canadian Conference on, pp.1409-1412, May 2006.
Raphael C-W. Phan. (2007) Reducing the exhaustive key search of the Data Encryption Standard (DES). Computer Standards & Interfaces. Volume 29, Issue 5. pages 528-530. July 2007.
Liwen He; Botham, P. (2008) Pure MPLS Technology. Availability, Reliability and Security, ARES 08, Third International Conference on, pp.253-259, 4-7 March 2008.
Islam, M. N.; Mia, M. M. H.; Chowdhury, M. F. I.; Matin, M. A. (2008) Effect of Security Increment to Symmetric Data Encryption through AES Methodology. Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/ Distributed Computing, pp. 291-294, 2008.
Ramakrishnan, V.; Wargo, C.; John, S. (2008) GMPLS Network Security: Gap Analysis. ICNS Conference, 2008 IEEE Systems, pp. 1-7, 5-7 May 2008.
M. Carolyn. 7 reasons MPLS has been wildly successful. March 2009. http://www.networkworld.com/news/2009/032709-mpls-turns-12.html.
Sachin, M.; Kumar, D.; (2010) Implementation and Analysis of AES, DES and Triple DES on GSM Network. IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.1, January 2010.
Garry, C. Kessler. An Overview of Cryptography. November, 2010.
Miller, B. and Stewart, E. Multi-Protocol Label Switching (MPLS) Conformance and Performance Testing. White Papers.
Bruce Schneier Niels Ferguson. Practical Cryptography. Number ISBN 0-471-22357-3.
Abdel-Karim Al Tamimi, “Performance Analysis of Data Encryption Algorithms”. [Available Online At:] http://www.cs.wustl.edu/~jain/cse567-06/ftp/encryption_perf/index.html
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.