Research Article

Cryptographic Algorithm Invocation Based on Software-Defined Everything in IPsec

Figure 2

Algorithm addition in (a) traditional IPsec and (b) FTA-based IPsec with additive opening interfaces.
(a)
(b)