SlideShare a Scribd company logo
1 of 10
Download to read offline
Protecting
Data in Motion
with MACsec
Fall 2020
Gijs Willemse
Sr. Director of Product Management
2
• Data that is transferred between two devices and/or servers
• Many different sources and application
• Consumer electronics, Mobile devices, IoT
• Automotive, Infrastructure, Edge devices
• Cloud servers, Data centers, others
• Many different transmission medium
• Wireless: Mobile (3GPP) and WiFi (or combinations)
• Wired: Copper, Optical, long distance optical (OTN)
• Why do I need Secure Communication?
• Medium is in the public domain
• Transferred data is vulnerable for many different attacks, including:
physical, man-in-the-middle, (D)DoS, Sniffing, Spoofing…
What is “Data in Motion”
3
MACsec
• Media Access Control Security
(IEEE)
• Protect Ethernet links
• Switch – Switch
• Switch – Host
• Host – Host
• Extensions to deploy over VLAN
Crypto
• Products generally require FIPS
140-2 algorithm validated before
deployment in public domain
Protecting Data in Motion: Use Secure Communication Protocols
Session
TCP / UDP
IP
Layer 2 (Link)
Layer 1 (Physical)
Application
TCP / UDP
IP
Layer 2 (Link)
Layer 1 (Physical)
IPsec
MACsec
Client Server
OSI Protocol Stack
TLS
Crypto
IPsec
• Internet Protocol Security (IETF)
• Set up a Virtual Private Network
Secure IP traffic between
• Network – Network
• Network – Host
• Host – Host
TLS (SSL)
• Transport Layer Security (IETF)
• Secure communications
between two applications
• Web Browser – Web Server
• Client App – Cloud API
• Sensor chip – App Processor
4
• Meet line rate throughput
• Speed of optical links goes up to 800Gbps and fastest switches handle >10Tbps of traffic
• Limit Latency
• Realtime application is factory, medical or even consumer space have strict latency requirements
• Response times must be minimized
• Applications require constant latency
• Support Prioritization
• TSN Ethernet layer define prioritization: pre-emption of packets is required
• Cope with network diversity and various deployments
• Networks are virtual
• Connections can be hop-by-hop, but also end-to-end
• Traffic passes different networks and infrastructures
Requirements for Secure Communication
5
• MACsec is the L2 security standard, widely deployed in PHYs, switches, firewalls, gateways, NICs
and 5G equipment
• Advantages of MACsec
• Scalable crypto
• Low latency
• Fully inline datapath
• Negligible SW overhead
• Implementation Challenges
• Line rate under all conditions
• Prioritization / Frame Preemption
• Rambus has portfolio that covers all ranges and features optimized for the modern Ethernet
requirements, including custom classification. Meets line-rate under all conditions
• The only provider of control plane software
MACsec Security
PHY
MACsec
classifier
MACsec
transformation
MAC/PCS
PTP
MAC/PCS
Line:
8x112G
SerDes
Switch
MACsec
classifier
MACsec
transformation
Bufferingand
multiplexing
MAC/
PCSMAC/
PCSMAC/
PCS
MAC/
PCSMAC/
PCSMAC/
PCS
optionalPTP
6
• Ethernet is getting adopted in aerospace, automotive, manufacturing and utility industries
• Enables new levels of connectivity and cost reduction.
• Enables new uses cases
• These applications require deterministic traffic
• TSN group of standards is defined
• Adding: priority queues, minimum jitter, preemption, shaping/scheduling, time.
• TSN features are integrated into Ethernet subsystem
• Ethernet PHYs
• Switches
• Gateways
• Automotive/industrial TSN SOCs
Time Sensitive Networking (TSN Ethernet)
7
• TSN Ethernet does requires data protection. Yes, MACsec is a logical choice.
• Addition of Security must keep deterministic behavior of the Ethernet traffic
• This raises implementation challenges that are not covered by standards and must be resolved
• It must be possible to interleave packets, allowing priority packets to interrupt regular traffic
• Crypto works on native cipher block sizes (typical 16B), interruption of a data stream requires complex
state/date storage
• Rambus MACsec IPs support TSN, targeting MACsec-capable Ethernet ports
• Lowest latency of fixed latency modes
• Side-band signaling to interact with external PTP modules and classifiers
• Preemption support by processing two interleaved streams per port
• Preemption support by processing IEEE802.3br fragments while keeping the fragment size, latency
and relation unchanged
TSN MACsec: Translating Challenges into Solutions
8
Deployment in SoC/switch and PHY
SOC
PHY
MAC merge sublayer
eMAC pMAC
System MAC
TSN MACsec
Line MAC
PCS
DMA
PHY
SOC
TSN MACsec
MAC merge sublayer
eMAC pMAC
PCS
DMA / Switch Interface
9
• Catalog solutions include:
• Single port, MACsec/VLAN-in-clear for rates of 1G / 2.5G / 10G / 25G / 50G / 100G
• [New] Next generation single-port IPs with pre-emption from 1 to 50G TSN Ethernet
• Multichannel (TDM) MACsec for 100G to 800G: EIP-163/164. Optional support for proprietary classification
and other custom extensions
• Full-featured control plane product
• MACsec Toolkit: IEEE 802.1X (EAP + MKA). Includes a SW data plane for development purpose
• Non-MACsec TDM Silicon IP products for >1Tbps AES-GCM encryption
• Scalable AES-GCM engine
• IPsec AES-GCM transform engine for NICs
• TLS/IPsec and wireless algorithm (3GPP) packet engines: EIP-196/EIP-197
• TLS/IPsec/MACsec Toolkits implementing the key exchange protocol for all three security
stacks (MatrixSSL/QuickSec)
Rambus MACsec Offering
Thank you
For more information:
gwillemse@rambus.com

More Related Content

What's hot (20)

6LoWPAN: An Open IoT Networking Protocol
6LoWPAN: An Open IoT Networking Protocol6LoWPAN: An Open IoT Networking Protocol
6LoWPAN: An Open IoT Networking Protocol
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 
Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlow
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
 
Pgp
PgpPgp
Pgp
 
Wimax security
Wimax securityWimax security
Wimax security
 
Introduction to vxlan
Introduction to vxlanIntroduction to vxlan
Introduction to vxlan
 
Snort
SnortSnort
Snort
 
Session hijacking
Session hijackingSession hijacking
Session hijacking
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
pfSense presentation
pfSense presentationpfSense presentation
pfSense presentation
 
Https
HttpsHttps
Https
 
Cisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBookCisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBook
 
MQTT Introduction
MQTT IntroductionMQTT Introduction
MQTT Introduction
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wireshark
 
SSH - Secure Shell
SSH - Secure ShellSSH - Secure Shell
SSH - Secure Shell
 
Wired equivalent privacy (wep)
Wired equivalent privacy (wep)Wired equivalent privacy (wep)
Wired equivalent privacy (wep)
 
Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSH
 
OpenvSwitch Deep Dive
OpenvSwitch Deep DiveOpenvSwitch Deep Dive
OpenvSwitch Deep Dive
 

Similar to Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit 2020

IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit IIIpkaviya
 
Geef Industry 4.0 een boost
Geef Industry 4.0 een boostGeef Industry 4.0 een boost
Geef Industry 4.0 een boostHowest_ENM
 
Network Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking DevicesNetwork Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking DevicesAalok Shah
 
249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513Zarobiza
 
zigbee technology
zigbee technology zigbee technology
zigbee technology N.CH Karthik
 
System design of multiprotocol iot
System design of multiprotocol iotSystem design of multiprotocol iot
System design of multiprotocol iotDev Bhattacharya
 
SELTA Access Network Portfolio
SELTA Access Network PortfolioSELTA Access Network Portfolio
SELTA Access Network PortfolioSELTA
 
Power Utilities Migration Solutions
Power Utilities Migration SolutionsPower Utilities Migration Solutions
Power Utilities Migration SolutionsNir Cohen
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMazin Alwaaly
 
VET4SBO Level 3 module 1 - unit 2 - 0.009 en
VET4SBO Level 3   module 1 - unit 2 - 0.009 enVET4SBO Level 3   module 1 - unit 2 - 0.009 en
VET4SBO Level 3 module 1 - unit 2 - 0.009 enKarel Van Isacker
 
OSI reference model
OSI reference modelOSI reference model
OSI reference modelshanthishyam
 

Similar to Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit 2020 (20)

Dm3000
Dm3000Dm3000
Dm3000
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
 
MPLS ppt
MPLS pptMPLS ppt
MPLS ppt
 
ATM
ATMATM
ATM
 
06-Networks-Software.pdf
06-Networks-Software.pdf06-Networks-Software.pdf
06-Networks-Software.pdf
 
MC PPT.pptx
MC PPT.pptxMC PPT.pptx
MC PPT.pptx
 
Geef Industry 4.0 een boost
Geef Industry 4.0 een boostGeef Industry 4.0 een boost
Geef Industry 4.0 een boost
 
Network Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking DevicesNetwork Topologies, L1-L2 Basics, Networking Devices
Network Topologies, L1-L2 Basics, Networking Devices
 
249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513
 
zigbee technology
zigbee technology zigbee technology
zigbee technology
 
Ethernet basics
Ethernet basicsEthernet basics
Ethernet basics
 
System design of multiprotocol iot
System design of multiprotocol iotSystem design of multiprotocol iot
System design of multiprotocol iot
 
SELTA Access Network Portfolio
SELTA Access Network PortfolioSELTA Access Network Portfolio
SELTA Access Network Portfolio
 
Allied Telesis IE510-28GSX
Allied Telesis IE510-28GSXAllied Telesis IE510-28GSX
Allied Telesis IE510-28GSX
 
Power Utilities Migration Solutions
Power Utilities Migration SolutionsPower Utilities Migration Solutions
Power Utilities Migration Solutions
 
ADAM-3600 Sales kit_WATER.pptx
ADAM-3600 Sales kit_WATER.pptxADAM-3600 Sales kit_WATER.pptx
ADAM-3600 Sales kit_WATER.pptx
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
 
VET4SBO Level 3 module 1 - unit 2 - 0.009 en
VET4SBO Level 3   module 1 - unit 2 - 0.009 enVET4SBO Level 3   module 1 - unit 2 - 0.009 en
VET4SBO Level 3 module 1 - unit 2 - 0.009 en
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
Basic networking
Basic networkingBasic networking
Basic networking
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit 2020

  • 1. Protecting Data in Motion with MACsec Fall 2020 Gijs Willemse Sr. Director of Product Management
  • 2. 2 • Data that is transferred between two devices and/or servers • Many different sources and application • Consumer electronics, Mobile devices, IoT • Automotive, Infrastructure, Edge devices • Cloud servers, Data centers, others • Many different transmission medium • Wireless: Mobile (3GPP) and WiFi (or combinations) • Wired: Copper, Optical, long distance optical (OTN) • Why do I need Secure Communication? • Medium is in the public domain • Transferred data is vulnerable for many different attacks, including: physical, man-in-the-middle, (D)DoS, Sniffing, Spoofing… What is “Data in Motion”
  • 3. 3 MACsec • Media Access Control Security (IEEE) • Protect Ethernet links • Switch – Switch • Switch – Host • Host – Host • Extensions to deploy over VLAN Crypto • Products generally require FIPS 140-2 algorithm validated before deployment in public domain Protecting Data in Motion: Use Secure Communication Protocols Session TCP / UDP IP Layer 2 (Link) Layer 1 (Physical) Application TCP / UDP IP Layer 2 (Link) Layer 1 (Physical) IPsec MACsec Client Server OSI Protocol Stack TLS Crypto IPsec • Internet Protocol Security (IETF) • Set up a Virtual Private Network Secure IP traffic between • Network – Network • Network – Host • Host – Host TLS (SSL) • Transport Layer Security (IETF) • Secure communications between two applications • Web Browser – Web Server • Client App – Cloud API • Sensor chip – App Processor
  • 4. 4 • Meet line rate throughput • Speed of optical links goes up to 800Gbps and fastest switches handle >10Tbps of traffic • Limit Latency • Realtime application is factory, medical or even consumer space have strict latency requirements • Response times must be minimized • Applications require constant latency • Support Prioritization • TSN Ethernet layer define prioritization: pre-emption of packets is required • Cope with network diversity and various deployments • Networks are virtual • Connections can be hop-by-hop, but also end-to-end • Traffic passes different networks and infrastructures Requirements for Secure Communication
  • 5. 5 • MACsec is the L2 security standard, widely deployed in PHYs, switches, firewalls, gateways, NICs and 5G equipment • Advantages of MACsec • Scalable crypto • Low latency • Fully inline datapath • Negligible SW overhead • Implementation Challenges • Line rate under all conditions • Prioritization / Frame Preemption • Rambus has portfolio that covers all ranges and features optimized for the modern Ethernet requirements, including custom classification. Meets line-rate under all conditions • The only provider of control plane software MACsec Security PHY MACsec classifier MACsec transformation MAC/PCS PTP MAC/PCS Line: 8x112G SerDes Switch MACsec classifier MACsec transformation Bufferingand multiplexing MAC/ PCSMAC/ PCSMAC/ PCS MAC/ PCSMAC/ PCSMAC/ PCS optionalPTP
  • 6. 6 • Ethernet is getting adopted in aerospace, automotive, manufacturing and utility industries • Enables new levels of connectivity and cost reduction. • Enables new uses cases • These applications require deterministic traffic • TSN group of standards is defined • Adding: priority queues, minimum jitter, preemption, shaping/scheduling, time. • TSN features are integrated into Ethernet subsystem • Ethernet PHYs • Switches • Gateways • Automotive/industrial TSN SOCs Time Sensitive Networking (TSN Ethernet)
  • 7. 7 • TSN Ethernet does requires data protection. Yes, MACsec is a logical choice. • Addition of Security must keep deterministic behavior of the Ethernet traffic • This raises implementation challenges that are not covered by standards and must be resolved • It must be possible to interleave packets, allowing priority packets to interrupt regular traffic • Crypto works on native cipher block sizes (typical 16B), interruption of a data stream requires complex state/date storage • Rambus MACsec IPs support TSN, targeting MACsec-capable Ethernet ports • Lowest latency of fixed latency modes • Side-band signaling to interact with external PTP modules and classifiers • Preemption support by processing two interleaved streams per port • Preemption support by processing IEEE802.3br fragments while keeping the fragment size, latency and relation unchanged TSN MACsec: Translating Challenges into Solutions
  • 8. 8 Deployment in SoC/switch and PHY SOC PHY MAC merge sublayer eMAC pMAC System MAC TSN MACsec Line MAC PCS DMA PHY SOC TSN MACsec MAC merge sublayer eMAC pMAC PCS DMA / Switch Interface
  • 9. 9 • Catalog solutions include: • Single port, MACsec/VLAN-in-clear for rates of 1G / 2.5G / 10G / 25G / 50G / 100G • [New] Next generation single-port IPs with pre-emption from 1 to 50G TSN Ethernet • Multichannel (TDM) MACsec for 100G to 800G: EIP-163/164. Optional support for proprietary classification and other custom extensions • Full-featured control plane product • MACsec Toolkit: IEEE 802.1X (EAP + MKA). Includes a SW data plane for development purpose • Non-MACsec TDM Silicon IP products for >1Tbps AES-GCM encryption • Scalable AES-GCM engine • IPsec AES-GCM transform engine for NICs • TLS/IPsec and wireless algorithm (3GPP) packet engines: EIP-196/EIP-197 • TLS/IPsec/MACsec Toolkits implementing the key exchange protocol for all three security stacks (MatrixSSL/QuickSec) Rambus MACsec Offering
  • 10. Thank you For more information: gwillemse@rambus.com