{"title":"黑核网加密技术研究","authors":"Liao Jingjing, Zhong Xi-yu, Li Hanping","doi":"10.1109/ICEICT.2019.8846315","DOIUrl":null,"url":null,"abstract":"High Assurance Internet Protocol Encryptor is one of the key technology which is used to construct Global Information Grid by the black core network. It is also the basic facility to ensure the end-to-end transmission security of IP network. The composition and principle of High Assurance Internet Protocol Encryptor are proposed. Moreover, the deployment pattern and the functionality are introduced. In special, the comparison of network security and performance is carried out through the analysis of the encryptor deployment in the typical black core network architecture. All in all, the above results can be used to the design of tactical wireless network, where the network security and performance should be considered at the same time.","PeriodicalId":382686,"journal":{"name":"2019 IEEE 2nd International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Study on the Encryption Technology of Black Core Network\",\"authors\":\"Liao Jingjing, Zhong Xi-yu, Li Hanping\",\"doi\":\"10.1109/ICEICT.2019.8846315\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"High Assurance Internet Protocol Encryptor is one of the key technology which is used to construct Global Information Grid by the black core network. It is also the basic facility to ensure the end-to-end transmission security of IP network. The composition and principle of High Assurance Internet Protocol Encryptor are proposed. Moreover, the deployment pattern and the functionality are introduced. In special, the comparison of network security and performance is carried out through the analysis of the encryptor deployment in the typical black core network architecture. All in all, the above results can be used to the design of tactical wireless network, where the network security and performance should be considered at the same time.\",\"PeriodicalId\":382686,\"journal\":{\"name\":\"2019 IEEE 2nd International Conference on Electronic Information and Communication Technology (ICEICT)\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 2nd International Conference on Electronic Information and Communication Technology (ICEICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEICT.2019.8846315\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 2nd International Conference on Electronic Information and Communication Technology (ICEICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEICT.2019.8846315","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Study on the Encryption Technology of Black Core Network
High Assurance Internet Protocol Encryptor is one of the key technology which is used to construct Global Information Grid by the black core network. It is also the basic facility to ensure the end-to-end transmission security of IP network. The composition and principle of High Assurance Internet Protocol Encryptor are proposed. Moreover, the deployment pattern and the functionality are introduced. In special, the comparison of network security and performance is carried out through the analysis of the encryptor deployment in the typical black core network architecture. All in all, the above results can be used to the design of tactical wireless network, where the network security and performance should be considered at the same time.