SYNTHESIS OF STRUCTURES OF OPERATING DEVICES IMPLEMENTATION CRYPTOGRAPHIC ALGORITHMS IPSEC OF OPTIMIZED FOR MEDIA PACKAGES PROCESSIN
DOI:
https://doi.org/10.47839/ijc.3.3.311Keywords:
IPSec-protocol, Н.235, MD5 algorithm, media packet, optimization, SHA-1, DESAbstract
In the paper the operating device of IPSec protocol optimized for treatment media of packages is investigated. Analytical expressions which describe time of media packages processing depending on the parameters of operating device structure are offered, the mathematical model of operating device of IPSec processor is developed. On the basis of mathematical model, with the purpose of reduction of delay and jitter, which rise up during the generation of media package, software is developed for optimization of structures descriptions of processor IPSec operating device. The row of the optimized structures of operating device is got for different services of given IPSec treatment at different technological descriptions of component base. The analysis of results allowed to set that in most cases, the least time of treatment media of packages is observed at iterative and iterative-conveyer realization of IPSec operating device.References
International Telecommunication Union, “Packet based multimedia communication systems”, Recommendation H.323 / Telecommunication Standardization Sector of ITU, Geneva, Switzerland, Feb., 1998.
Zheng Wang, “Internet QoS, Architecture and Mechanism for Quality of Service”, Morgan Kaufmann Publishers, 340, Pine Street, San Francisco, CA 94104-3205, USA, 2001.
ITU-T H.323: Packet-based multimedia communications systems, 9.1999. http://www.imtc.org/h323.htm.
www.wave-conferencing.com/seminarb/
Study Group 15. Security and Encryption for H-Series (H.323 and other H.245-Based) Multimedia Terminals. Telecommunication Standardization Sector, ITU-T, November 2000.
S. Kent , R. Atkinson. Security Architecture for the Internet Protocol // Internet-Draft, May 1998.
Шевчук Р.П.. Оптимізація програмно-апаратних засобів реалізації IPSec. Маг. Роб., Тернопіль: , 2003. – 121 с.
Коркішко Т.А., Мельник А.О. Методика проектування багатоканальних процесорів симетричного блокового шифрування // Вісник Тернопільського державного технічного університету. – Тернопіль, 2002. – Т.7, № 2. – С. 100 – 109.
Т. Коркішко, Л. Коркішко, Р. Шевчук. Базові структури операційних пристроїв хешування для процесорів підтримки протоколу IPSEC // Комп’ютинг. – 2003. – Том 2. - №1. – С. 41-47.
Kent S, Atkinson R. IP Authentication Header // RFC 2402, November 1998.
Kent S, Atkinson R. IP Encapsulating Security Payload // RFC 2406, 1998.
Мельник А.О. Спеціалізовані комп’ютерні системи реального часу. –Львів, 1996.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.