Research Article
Cryptographic Algorithm Invocation Based on Software-Defined Everything in IPsec
Figure 9
Trend of CPU occupancy rate influenced by data volume of traditional IPsec and FTA-based IPsec using (a) AES128, (b) DES, and (c) 3DES.
(a) |
(b) |
(c) |