Research Article

Cryptographic Algorithm Invocation Based on Software-Defined Everything in IPsec

Figure 1

Communication encryption processes in IPsec.