Protection of Public Network Communication by using Internet Protocol Security

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3

Abstract

This paper deals with the issue of the protection of public etwork c description of custom cipher algorithm mplementation method is given. Paper also contains xperiment description with results. In the existing literature here are numerous designs based on public ciphers epending on the specific product. It is known that professional security systems require their own design, cipher and complete control over cryptographic keys. Due to the complexity of lower evel protocols and kernel odification, the most frequently mplemented solutions are those of application level. The dvantages of implementation level (IP) used in this work – etter performance, higher level stability and end users laxation – are presented in paper. It is very important to point ut that the focus of this paper is not better performance chievement, but finding the adequate basis for application of ne’s own (custom) lgorithmommunications by using IPsec mplementation in Linux kernel. Complete

Authors and Affiliations

Mr. Premchand. B. Ambhore , Dr. B. B. Meshram , Ku. A. D. Wankhade

Keywords

Related Articles

A Comparative Study of Machine Learning Approaches- SVM and LS-SVM using a Web Search Engine Based Application

Semantic similarity refers to the concept by which a set of documents or words within the documents are assigned a weight based on their meaning. The accurate measurement of such similarity plays important roles in Natur...

A generic conceptual and UML model for the multi-echelon distribution supply chain

The Multi-Echelon Distribution Supply Chain (MEDSC) is a multifaceted structure, focusing on the integration of all factors that involved in the overall distribution process of finished products to the customers. The gro...

INCREASING THE EFFICIENCY OF THE SOFTWARE RCHITECTURE RECOVERY THROUGH SPANNING TREE BASED MAXIMAL GRAPH MINING TECHNIQUE

This paper represents a technique for recovering the Software Architecture based on Graph Pattern Matching by the help of mining techniques. enerally Software Architecture is represented in terms of graphs with set of...

Results evaluation of max rule, min rule and product rule in score fusion multibiometric systems

this paper discusses about unibiometric systems, multibiometric systems, product rule, max rule and min rule of score level fusion. Score level fusion is used to generate scores of a person. Min max normalization scheme...

Compact Dual Polarization Lidar System description and data processing

This paper describes the constructional features of a compact dual polarization lidar (CDPL) system developed for remote sensing the suspended particulate matter and clouds in the atmosphere. The new lidar system employs...

Download PDF file
  • EP ID EP91875
  • DOI -
  • Views 125
  • Downloads 0

How To Cite

Mr. Premchand. B. Ambhore, Dr. B. B. Meshram, Ku. A. D. Wankhade (2010). Protection of Public Network Communication by using Internet Protocol Security. International Journal on Computer Science and Engineering, 2(3), 493-499. https://europub.co.uk/articles/-A-91875