Research Article

Cryptographic Algorithm Invocation Based on Software-Defined Everything in IPsec

Table 2

Examples of combined-policies.

Policy IDCryptographic algorithmCombined-policy description

0AES128Encrypt 128 bits of data using AES128.
1DES, 3DESEncrypt the first 64 bits and the last 64 bits of data using DES and 3DES, respectively.
2AES128, DES, 3DESEncrypt the first 64 bits and the last 64 bits of data using DES and 3DES, respectively, and then encrypt the 128 bits of data again using AES128.