Research Article

Cryptographic Algorithm Invocation Based on Software-Defined Everything in IPsec

Figure 9

Trend of CPU occupancy rate influenced by data volume of traditional IPsec and FTA-based IPsec using (a) AES128, (b) DES, and (c) 3DES.
(a)
(b)
(c)