... mechanisms,IPsec offers many architectural advantages. Firstly, hedetails of network security are usually hidden from ap-plications, which therefore automatically and transpar-ently take advantage ... indi-cated use of a hardware accelerator for that cryptographicalgorithm. In all cases where IPsec is used, we use HMAC-SHA1 as the data integrity/authentication algorithm; whenhardware acceleration ... operation and encryption al-gorithms affect its performance and the benefits of usingcryptographic hardware to accelerate IPsec processing.Finally, we compare against other secure data transfermechanisms,...