Choosing Secure Remote Access Technologies
A performance test for a VPN tunnel was performed to highlight the differences in network latency and throughput when additional levels of security are added. Cryptographic functions like hashing and Perfect Forward Secrecy are discussed and compared along with different cryptographic algorithms like DES and 3DES. Ultimately, the differences in performance between cryptographic configurations are slight, though could be amplified by network conditions.
School Location:USA - North Carolina
Source Type:Master's Thesis
Keywords:computer networks – encryption virtual private remote access
Date of Publication:11/22/2004