scholarly journals A research on the impact of encryption algorithms on the quality of VPN tunnels’ transmission

2018 ◽  
Vol 21 ◽  
pp. 00011
Author(s):  
Dariusz Strzęciwilk ◽  
Krzysztof Ptaszek ◽  
Paweł Hoser ◽  
Izabella Antoniku

The following article presents the results on the impact of encryption algorithms and the cryptographic hash function on the QoS (Quality of Service) transmission in a computer network. A network model supporting data encryption using the AES algorithm and the MD5 and SHA hash functions used in VPN tunnels was designed and tested. The influence of different data length on the quality of transmission in a secured network was studied. The measurements and tests of networks were performed according to two methodologies ITU-T Y.1564 and RFC 2544. The impact of the data encryption mechanism on bandwidth, data loss and maximum delays was examined. The secured network tests were performed with different combinations of encryption algorithms and hash functions of the VPN tunnel in the ESP (Encapsulating Security Payload) transport mode.

2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Shen Lvping

With the development of information technology and network technology, digital archive management systems have been widely used in archive management. Different from the inherent uniqueness and strong tamper-proof modification of traditional paper archives, electronic archives are stored in centralized databases which face more risks of network attacks, data loss, or stealing through malicious software and are more likely to be forged and tampered by internal managers or external attackers. The management of intangible cultural heritage archives is an important part of intangible cultural heritage protection. Because intangible heritage archives are different from traditional official archives, traditional archive management methods cannot be fully applied to intangible heritage archives’ management. This study combines the characteristics of blockchain technology with distributed ledgers, consensus mechanisms, encryption algorithms, etc., and proposes intangible cultural heritage file management based on blockchain technology for the complex, highly dispersed, large quantity, and low quality of intangible cultural heritage files. Optimizing methods, applying blockchain technology to the authenticity protection of electronic archives and designing and developing an archive management system based on blockchain technology, help to solve a series of problems in the process of intangible cultural heritage archives management.


2020 ◽  
Vol 2020 ◽  
pp. 1-9 ◽  
Author(s):  
Bahman A. Sassani (Sarrafpour) ◽  
Mohammed Alkorbi ◽  
Noreen Jamil ◽  
M. Asif Naeem ◽  
Farhaan Mirza

Sensitive data need to be protected from being stolen and read by unauthorized persons regardless of whether the data are stored in hard drives, flash memory, laptops, desktops, and other storage devices. In an enterprise environment where sensitive data is stored on storage devices, such as financial or military data, encryption is used in the storage device to ensure data confidentiality. Nowadays, the SSD-based NAND storage devices are favored over HDD and SSHD to store data because they offer increased performance and reduced access latency to the client. In this paper, the performance of different symmetric encryption algorithms is evaluated on HDD, SSHD, and SSD-based NAND MLC flash memory using two different storage encryption software. Based on the experiments we carried out, Advanced Encryption Standard (AES) algorithm on HDD outperforms Serpent and Twofish algorithms in terms of random read speed and write speed (both sequentially and randomly), whereas Twofish algorithm is slightly faster than AES in sequential reading on SSHD and SSD-based NAND MLC flash memory. By conducting full range of evaluative tests across HDD, SSHD, and SSD, our experimental results can give better idea for the storage consumers to determine which kind of storage device and encryption algorithm is suitable for their purposes. This will give them an opportunity to continuously achieve the best performance of the storage device and secure their sensitive data.


Author(s):  
Petr Zach ◽  
Martin Pokorný ◽  
Jiří Balej

This article deals with the impact of Wireless (Wi-Fi) networks on the perceived quality of voice services. The Quality of Service (QoS) metrics must be monitored in the computer network during the voice data transmission to ensure proper voice service quality the end-user has paid for, especially in the wireless networks. In addition to the QoS, research area called Quality of Experience (QoE) provides metrics and methods for quality evaluation from the end-user’s perspective. This article focuses on a QoE estimation of Voice over IP (VoIP) calls in the wireless networks using network simulator. Results contribute to voice quality estimation based on characteristics of the wireless network and location of a wireless client.


2021 ◽  
Vol 2021 ◽  
pp. 1-19
Author(s):  
Yifeng He ◽  
Nan Ye ◽  
Rui Zhang

Nowadays, the development of information technology can be described as extremely rapid, especially with the widespread use of the Internet; the security of communications in the network has become an important issue we are facing. The purpose of this article is to solve the problems in today’s network security data encryption algorithms. Starting from the computer network communication security data encryption algorithm, we discuss the effects of several different encryption methods on improving network security. The research results show that it is known that the application of link encryption algorithm in network communication security encryption algorithm can increase the security index by 25%, the node encryption algorithm can increase the security index by 35%, and the end-to-end encryption algorithm can make the cyber activity safety index to increase by 40%. Among them, RSA algorithm and DES algorithm are two very representative algorithms; they represent different encryption systems. From the perspective of network data link, there are three methods of encryption algorithm, namely, link encryption algorithm, node encryption algorithm, and end-to-end encryption algorithm.


Author(s):  
Karamjit Kaur ◽  
Anil Kumar

Background: In WDM networks, there is a crucial need to monitor signal degradation factors in order to maintain the quality of transmission. This is more critical in dynamic optical networks as non-linear impairments are network state dependent. Moreover, PLIs are accumulative in nature, so the overall impact is increased tremendously as the length of signal path is increased. The interactions between different impairments along the path also influence their overall impact. Objective: Among the different impairments, the present work focus on phase modulations owing to intensities of signals themselves as well as the neighboring signals. It includes the influence of SPM, SPM and XPM, system parameters like signal power, wavelength and fiber parameters like attenuation coefficient, dispersion coefficient and their influence on Q-value and BER. Method: The analysis is done through a single and two-channel transmitter system with varied power, wavelengths and system parameters. The corresponding optical spectrums are analysed. Result & Conclusion: It has been found that SPM and XPM pose broadening effect on spectrum without any effect on temporal distributions. The magnitude of signal power is among the parameters significantly influencing the broadening of spectrum. Higher is the power, more is the magnitude of broadening. It has been found that in order to neglect the impact of input power; its magnitude must be kept below 20 mW. Also, the dispersion and attenuation value need to be carefully as they pose counteracting effect to SPM and XPM for certain values and hence can be used as compensation measure without any additional cost.


Author(s):  
A.A. Anis ◽  
C.B.M. Rashidi ◽  
S.A. Aljunid

Weather severity has unfavorable effect on FSO transmission performance. The impact could result in poor quality of transmission and communication failure. This paper presents the analysis using multiple free space optic channels with amplification to mitigate haze attenuation. The visibility is progressively reduced due to the attenuation effects, causing the bit error rate to increase. Three designs of FSO system are proposed in this research as they are simulated and analysed thoroughly using Optisys software. The achieved result shows improved performance for Design 3, as the minimum BER achieved is 10<sup>-127</sup> when the power received is -26 dBm, and maximum Q-factor of 23.6 at the aperture diameter of 40 cm. It is proved to improve the system efficiently in low visibility condition compared to Design 1 and Design 2. It clearly has shown the superior capabilities of Design 3 to intercept and mitigate the atmospheric attenuation in haze condition as the power loss during transmission also reduced significantly.


Author(s):  
Florence Leplingard ◽  
Thierry Zami ◽  
Annalisa Morea ◽  
Nicolas Brogard ◽  
Dominique Bayart

Author(s):  
Maria Ines Silvani ◽  
Ricardo T. Lopes ◽  
Gevaldo L. de Almeida ◽  
Marcelo José Gonçalves ◽  
Rosanne C.A.A. Furieri

2021 ◽  
Vol 11 (3) ◽  
pp. 239-246
Author(s):  
Rusydi Umar ◽  
Imam Riadi ◽  
Ridho Surya Kusuma

Sodinokibi Ransomware virus becomes a severe threat by targeting data encryption on a server, and this virus infection continues to spread to encrypt data on other computers. This study aims to mitigate by experiment with building a prevention system through computer network management. The mitigation process is carried out through static, dynamic, and Software-Defined Networking (SDN) analysis to prevent the impact of attacks through programmatic network management. SDN consists of two main components in its implementation, the Ryu controller and Open Virtual Switch (OVS). Result testing mitigation system on infected networks by crippling TCP internet protocol access can reduce virus spread by 17.13% and suppress Sodinokibi traffic logs by up to 73.97%. Based on the percentage data, SDN-based mitigation in this study is per the objectives to make it possible to mitigate Ransomware attacks on computer network traffic.


2020 ◽  
Vol 29 (4) ◽  
pp. 2097-2108
Author(s):  
Robyn L. Croft ◽  
Courtney T. Byrd

Purpose The purpose of this study was to identify levels of self-compassion in adults who do and do not stutter and to determine whether self-compassion predicts the impact of stuttering on quality of life in adults who stutter. Method Participants included 140 adults who do and do not stutter matched for age and gender. All participants completed the Self-Compassion Scale. Adults who stutter also completed the Overall Assessment of the Speaker's Experience of Stuttering. Data were analyzed for self-compassion differences between and within adults who do and do not stutter and to predict self-compassion on quality of life in adults who stutter. Results Adults who do and do not stutter exhibited no significant differences in total self-compassion, regardless of participant gender. A simple linear regression of the total self-compassion score and total Overall Assessment of the Speaker's Experience of Stuttering score showed a significant, negative linear relationship of self-compassion predicting the impact of stuttering on quality of life. Conclusions Data suggest that higher levels of self-kindness, mindfulness, and social connectedness (i.e., self-compassion) are related to reduced negative reactions to stuttering, an increased participation in daily communication situations, and an improved overall quality of life. Future research should replicate current findings and identify moderators of the self-compassion–quality of life relationship.


Sign in / Sign up

Export Citation Format

Share Document