期刊文献+

基于Diffie-Hellman算法的VPN技术实现和网络影响分析

VPN Technology Realization and Network Influence Analysis Based on Diffie-Hellman Algorithm
下载PDF
导出
摘要 Diffie-Hellman算法通过密钥交换的方式为企业VPN网络的信息传输提供数据机密性,其有效性依赖于计算离散对数的难度。在描述算法过程的基础上,利用Visual C++语言编程并在Windows XP环境中编译。通过一个具体的企业VPN网络部署和配置,实现了企业内网对等体之间通过VPN隧道的相互通信和对Internet资源的访问,分析了由于加载VPN数据包而对网络性能产生的影响,主要体现在网络吞吐量和网络延迟的变化上。因此提高VPN网络的应用性能和数据传输的质量是今后研究的主要方向。 Diffie-Hellman algorithm provides data confidentiality for information transmission through VPN network of enterprise by the mean of key exchange,its validity depends on the difficulty of computing discrete logarithm.On the basis of describing the algorithm process, the algorithm was programmed using Visual C++ programming language and compiled in the Windows XP operating system.Through the deployment and configuration of a specific enterprise VPN network,the communication was realized between peer of enterprise intranet and internet resource could be accessed,the influence,such as network throughput and network delay, was analyzed causing by loading VPN packets on network performance.Therefore,it is the main direction of future research to improve the application of VPN network performance and the quality of the data transmission.
出处 《软件工程师》 2014年第11期18-21,共4页 Software Engineer
关键词 DIFFIE-HELLMAN算法 VPN技术 网络性能 网络吞吐量 网络延迟 diffie-hellman algorithm VPN technology network performance network throughput network delay
  • 相关文献

参考文献8

二级参考文献28

  • 1冯鐕钊,张世发.基于VPN技术的移动办公网络实现方案[J].广东水利电力职业技术学院学报,2006,4(3):60-63. 被引量:1
  • 2[2]S.Kent,R.Atkinson.RFC2401:Security Architecture for the Intemet Protocol.1998
  • 3S G Akl, P D Taylor. Cryptographic solution to a problem of access control in a hierarchy[J].ACM Transaction on Computer System, 1983,1(3) :239 - 248.
  • 4J Crampton, et al. On key assignment for hierarchical access control[ A ]. In Proceedings of the 19th IEEE workshop on Computer Security Foundations (CSFW' 06) [C]. Washington, DC, USA: IEEE Computer Society,2006.98 - 111.
  • 5Q Zhang, Y Wang. A centralized key management scheme for hierarchical access control[ A]. In Proceedings of IEEE Global Telecommunications Conference (GLOBECOM' 04 ) Vol. 4 [ C]. Dallas TX, 2004.2067 - 2071.
  • 6H R Hassen, A BouabdaUah, H Bettahar, et al. Key management for content access control in a hierarchy [ J ]. Computer Networks , 2037 , 51 (11) :3197 - 3219.
  • 7J C Birget, X Zou, G Noubir. Hierarchy-based access control in distributed environments[ A]. In IEEE International Conference on Communications ( ICC ' 01 ) Vol. 1[ C]. 2001. 229 - 233.
  • 8J Z Yan,J F Ma, H Y Liu. Key Hierarchies for Hierarchical Access Control in Secure Group Communications[J]. Computer Networks,2009,53(3) :353 - 364.
  • 9B Davey,H Priestley. Introduction to Lattices and Order[M]. Cambridge University Press, 1990.
  • 10F Harary. Graph Theory[M]. Reading, MA: Addison-Wesley, 1994.

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部