Research Article
Cryptographic Algorithm Invocation Based on Software-Defined Everything in IPsec
Table 2
Examples of combined-policies.
| Policy ID | Cryptographic algorithm | Combined-policy description |
| 0 | AES128 | Encrypt 128 bits of data using AES128. | 1 | DES, 3DES | Encrypt the first 64 bits and the last 64 bits of data using DES and 3DES, respectively. | 2 | AES128, DES, 3DES | Encrypt the first 64 bits and the last 64 bits of data using DES and 3DES, respectively, and then encrypt the 128 bits of data again using AES128. |
|
|