Research Article

Cryptographic Algorithm Invocation Based on Software-Defined Everything in IPsec

Figure 3

Structure of the scheme for combining and switching cryptographic algorithms.