SlideShare a Scribd company logo
Layer 1 Encryption in WDM Transport Systems
Dr. Henning Hinderthür, PLM
© 2014 ADVA Optical Networking. All rights reserved. Confidential.2
Security in Telco
"What last year's revelations showed us
was irrefutable evidence that
unencrypted communications on the
internet are no longer safe. Any
communications should be encrypted by
default“
Edward Snowden - Guardian Interview, Moscow July 2014
© 2014 ADVA Optical Networking. All rights reserved. Confidential.3
Data Center Environment & Security
APPS APPS
© 2014 ADVA Optical Networking. All rights reserved. Confidential.4
Data Center Environment & Security
Physical Access to the Data Center
APPS APPS
© 2014 ADVA Optical Networking. All rights reserved. Confidential.5
Data Center Environment & Security
Hardware Security
APPS APPS
© 2014 ADVA Optical Networking. All rights reserved. Confidential.6
Data Center Environment & Security
Software Security
APPS APPS
© 2014 ADVA Optical Networking. All rights reserved. Confidential.7
Data Center Environment & Security
…and What About the Fiber Connection?
APPS APPS
© 2014 ADVA Optical Networking. All rights reserved. Confidential.8
Fiber Optic Networks
Tapping Possibilities
Y-Bridge for
service activities
Fiber Coupling device
Street cabinet
How
to get access?
Where
to get access?
Splice boxes / cassettes
(Outdoor / Inhouse)
There are multiple ways to access fiber
Protocol Analyzer
© 2014 ADVA Optical Networking. All rights reserved. Confidential.9
Encryption
What is Key?
• Highest level of security
• Speed - Low Latency
• 100% Throughput
• No Jitter
• Role Based Management (Multi Tenant Management for Carriers)
Encryption on the lowest possible layer
© 2014 ADVA Optical Networking. All rights reserved. Confidential.10
Encryption Basics
Key Lengths – Magnitude
Number of grains in 1 m3 sand from the beach 240
Number of atoms in a human body 292
Number of atoms in the earth 2165
Number of atoms in the sun 2189
Number of atoms in the Milky Way 2226
Number of atoms in the universe 2259
AES
256
© 2014 ADVA Optical Networking. All rights reserved. Confidential.11
High Speed Encryption Modes
Cisco Overlay Transport Virtualization (OTV) +82 Bytes
MacSec +32 Bytes
Cisco TrustSec +40 Bytes
Bulk Mode (0 Bytes)
• Hop-by-Hop only
• Ethernet only
• Overhead creates latency and
throughput issues
• Point-to-Point
• Protocol/ I/F agnostic (Ethernet, FC, IB, Sonet/SDH)
• Integrated Solution with lowest latency
• Huge overhead
• IP VPN Services
• Cisco Nexus
© 2014 ADVA Optical Networking. All rights reserved. Confidential.12
Encryption Performance
Comparison of Maximum Throughput
Framesize / Bytes
Throughput
© 2014 ADVA Optical Networking. All rights reserved. Confidential.13
Encryption Using G.709 / OTH Link Protocol
1 …….…. 14 15 ….… 16 17 ………………………………. 3824 3825 .… 4080
1
2
3
4
Column number
OTU/ODU
overhead
ROW
OPU
overhead
Encryption
FEC
areaEncrypted Payload
OCH Overhead Och payload FEC data
Optical channel frame structure
5TCE link protocol
• Supports
• OTU-2
• OTU-2e
• OTU-2f
AES 256
encrypted
OPU2 payload
Automatic
key exchange
using DH
Key Exchange
© 2014 ADVA Optical Networking. All rights reserved. Confidential.14
FSP 3000 Encryption Highlights
Protection Building Blocks
• Authentication via initial authentication key to protect from
“man in the middle” attacks
• AES256 encryption to offer maximum data security
• Diffie Hellman (DH) key exchange for secure encryption key generation
• New encryption key every 1min/10mins for additional security
• Key lifetime configurable
• Lowest latency (100ns) while providing 100% throughput
© 2014 ADVA Optical Networking. All rights reserved. Confidential.15
• Universal Enterprise Mux-/Transponder
• AES256 encryption
• Dynamic key exchange every 10 minutes
• 5x Any Multi-service clients
• Transparent / Framed mode
• SDH Network variant 5TCE-PCN-8GU+AES10GS
10G Muxponder with Encryption
5TCE-PCN-10GU+AES10G
Network Interface
3x Client SFP
2x Client SFP/SFP+
Module
DWDM
CWDM
Grey
SFP
SFP
SFP
SFP (+)
SFP (+)
TDM
Prop. framing
OTN-, Eth-PM
GCC0
5x GbE
5x 1G/2G FC
3 x 4G FC
8G/10G FC
5G IB/10G IB
STM-16/64
10GbE
Client Module
ODU2
Pluggable
SFP+
Network
OTU2
GFEC
STM-64
AESEncryption
CWDM
Grey
Prop. framing
© 2014 ADVA Optical Networking. All rights reserved. Confidential.16
• Universal Enterprise Muxponder 100G
• AES256 encryption with 2048bit key
• Dynamic key exchange every 1 minute
• Up to 10 x any multi-service
• 10GE, FC8/10/16, 5G Infiniband
• 40GE/100GE by means of 4x/10x 10GbE
via break out cable (SR4, LR4 and SR10)
100G Metro Muxponder with Encryption
10TCE-PCN-16GU+AES100G
Network
DWDM CFP
10x Client SFP+
Module
GMP
ODUFlex
Client Module
ODU4
DWDM
CFP
Network
OTU4
config.
EFEC
OTN PM
AESEncryption
CWDM
Grey
SFP+
SFP+
SFP+
SFP+
SFP+
SFP+
SFP+
SFP+
SFP+
SFP+
10x 10GbE
(WAN/LAN)
10x 8G FC
8x 10G FC
7x 16G FC
10x STM-64/OC-192
10x 5G IB
4x 28G
DWDM
(96ch
C-band)
© 2014 ADVA Optical Networking. All rights reserved. Confidential.17
Layer 1 Encryption Solution Suite
AES 10G Encryption
AES 100G Encryption
40GbE
100GbE
FC 16G
FC 10G
10GbE
STM-64/OC-192
FC 8G
IB 5G
FC 4G
STM-16/OC-48
FC 2G
FC 1G
GbE
1G–5G5G–15G40G100G
© 2014 ADVA Optical Networking. All rights reserved. Confidential.18
Encryption Management & Operations
© 2014 ADVA Optical Networking. All rights reserved. Confidential.19
Data Center Networks
Encryption Management for Private Networks
3rd
Party
NE
3rd
Party
NE
3rd
Party
NE
FSP NM
Server
FSP EM
or
LCT/CLI
FSP NM
Clients
LAN
Scenario 1 - User of encryption is the operator of equipment
DCN
Crypto Manager
running on FSP NM
© 2014 ADVA Optical Networking. All rights reserved. Confidential.20
Data Center Networks
Encryption Management for Private Networks
3rd
Party
NE
3rd
Party
NE
3rd
Party
NE
Scenario 2 - Encryption user does not own the network
FSP NM
Server
FSP NM
Clients
LAN
DCN
GUI Server
running NM
client apps
Customer A
WWW.
Crypto Manager
running on GUI Server
© 2014 ADVA Optical Networking. All rights reserved. Confidential.21
Crypto Management
Management Levels Provided
• Operational management
• Deals with all operational aspects (FCAPS)
• User access is handled on the NCU
• Security management
• Control of all security relevant activities
• Separated from operational management
• Access control handling on the AES Muxponder not on the NCU
• Security relevant activities are performed using the security
relevant credentials
• ROOT users have no access to security management
© 2014 ADVA Optical Networking. All rights reserved. Confidential.22
Encryption over OTN Networks
© 2014 ADVA Optical Networking. All rights reserved. Confidential.23
5TCE-PCN+AES10G5TCE-PCN+AES10G
Site B
LAN
Site A
LAN
n*1GbE,
10GbE
STM-64c
OTU-2e
STM-64c
OTU-2e
OTN Network
Carrier Managed Service
Encryption over OTN Networks
1GbE & 10GbE Services
n*1GbE,
10GbE
FSP Network &
Crypto Manager
© 2014 ADVA Optical Networking. All rights reserved. Confidential.24
10TCE-PCN-16GU+AES100G10TCE-PCN-16GU+AES100G
Site B
LAN
Site A
LAN
Multi rate Multi rate
GCC2 used for key exchange & other functions
Setup via ECC (GCC0) or an external DCN connection
Encryption over OTN Networks
10GbE, 40GbE, 100GbE Services
LR10R OTU-4
111,809 Gb/s
LR10R OTU-4
111,809 Gb/s
FSP Network &
Crypto Manager
OTN Network
Carrier Managed Service
© 2014 ADVA Optical Networking. All rights reserved. Confidential.25
Layer 1 Encryption in Operation
© 2014 ADVA Optical Networking. All rights reserved. Confidential.26
Where ADVA-Encryption is in Operation
Department of Business Innovation & Skills: 2013 Information Security Breaches Survey www.gov.uk/bis
ADVA sells ~10% of layer 1
encryption into Government
> 150 links
ADVA sells ~62% of layer 1
encryption into Finance
> 1.000 links
ADVA sells ~10% of layer 1
encryption into HealthCare
> 150 linksADVA sells ~16% of layer 1
encryption into Other
large industry
> 250 links
1.600 x 10G encrypted links in operation
• 62% Finance (50 customers)
• 10% Government (13 customers)
• 10% Healthcare (7 customers)
• 10% Large Industry (14 customers)
• 4% Cloud SPs (9 customers)
• 4% other industry
• 2% Utilities (3 customers)
ADVA sells ~2% of layer 1
encryption into Utilities
> 50 links
hhinderthuer@advaoptical.com
Thank You
IMPORTANT NOTICE
The content of this presentation is strictly confidential. ADVA Optical Networking is the exclusive owner or licensee of the content, material, and information in this
presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited.
The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or
implied. ADVA Optical Networking shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental,
consequential and special damages,
alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation.
Copyright © for the entire content of this presentation: ADVA Optical Networking.

More Related Content

PPTX
LTE Basic
PPTX
INTRODUCTION OF 4G
PDF
GSM Link Budget
PPT
GSM fundamentals (Huawei)
PPTX
TECHNIQUES TO COMBAT OSNR IN DWDM LINKS
PPTX
LTE Architecture
PDF
FTTH Basics
PPTX
Basic WDM Optical Network
LTE Basic
INTRODUCTION OF 4G
GSM Link Budget
GSM fundamentals (Huawei)
TECHNIQUES TO COMBAT OSNR IN DWDM LINKS
LTE Architecture
FTTH Basics
Basic WDM Optical Network

What's hot (20)

PDF
5G physical layer
PDF
5G Technology Tutorial
PDF
Intermediate: Bandwidth Parts (BWP)
PDF
5G network architecture progress
PDF
IPRAN BASICS.pdf
PPT
Wireless network ppt
PDF
Throughput Calculation for LTE TDD and FDD System
PPT
MIMO in 15 minutes
PDF
Advanced: 5G Service Based Architecture (SBA)
PDF
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
PDF
Misc: Non millimeter Wave (mmWave) 5G
PPT
IP RAN 100NGN
PPT
Gpon fundamentals
PPT
GSM ARCHITECTURE
PPTX
QoS (quality of service)
PPT
RF Planning Training
PDF
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
PDF
High-level architecture of Mobile Cellular Networks from 2G to 5G
5G physical layer
5G Technology Tutorial
Intermediate: Bandwidth Parts (BWP)
5G network architecture progress
IPRAN BASICS.pdf
Wireless network ppt
Throughput Calculation for LTE TDD and FDD System
MIMO in 15 minutes
Advanced: 5G Service Based Architecture (SBA)
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
Misc: Non millimeter Wave (mmWave) 5G
IP RAN 100NGN
Gpon fundamentals
GSM ARCHITECTURE
QoS (quality of service)
RF Planning Training
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
High-level architecture of Mobile Cellular Networks from 2G to 5G
Ad

Viewers also liked (20)

PDF
Introducing the ADVA MicroMux™
PDF
Transforming Packet Networks With Open Optical Transport
PDF
ADVA ConnectGuard™
PDF
Introducing the Future of Data Center Interconnect Networks
PDF
ADVA Optical Networking and Arista Networks Joint OOLS Demo
PPTX
Introducing the FSP 3000 Access Link Monitoring Solution
PDF
DWDM Presentation
PDF
Secure, High Performance Transport Networks Based on WDM Technology
PDF
Michigan Collaboration Summit - Washtenaw Community College
PDF
dwdm
 
PDF
WDM principles
PDF
FSP Network Hypervisor: Optical Network Virtualization for SDN
PDF
Introducing the ADVA FSP 150-GE110 Pro Series
PDF
ADVA Optical Networking Introduces New Data Center Interconnect Functionality
PPTX
OTN for Beginners
PPTX
PPTX
N-degree ROADM Architecture Comparison: Broadcast-and-Select vs Route-and-Select
PDF
Introducing One Network Edge
PDF
NETCONF Call Home
PDF
Introduction to Optical Backbone Networks
Introducing the ADVA MicroMux™
Transforming Packet Networks With Open Optical Transport
ADVA ConnectGuard™
Introducing the Future of Data Center Interconnect Networks
ADVA Optical Networking and Arista Networks Joint OOLS Demo
Introducing the FSP 3000 Access Link Monitoring Solution
DWDM Presentation
Secure, High Performance Transport Networks Based on WDM Technology
Michigan Collaboration Summit - Washtenaw Community College
dwdm
 
WDM principles
FSP Network Hypervisor: Optical Network Virtualization for SDN
Introducing the ADVA FSP 150-GE110 Pro Series
ADVA Optical Networking Introduces New Data Center Interconnect Functionality
OTN for Beginners
N-degree ROADM Architecture Comparison: Broadcast-and-Select vs Route-and-Select
Introducing One Network Edge
NETCONF Call Home
Introduction to Optical Backbone Networks
Ad

Similar to Layer 1 Encryption in WDM Transport Systems (20)

PPTX
100G Metro Encryption
PPTX
Secure Connectivity on Every Network Layer
PDF
Secure Optical Connectivity Solutions for High-Capacity Data Centers
PDF
Secure WDM Connectivity for High-Bandwidth Applications
PDF
Scalable, Secure, Programmable – Cloud Connectivity for the Future
PPTX
Next Gen Optical Network: Scalability, Flexibility and Security
PDF
Big Data Transport
PPTX
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
PDF
Flexible and Secure Connectivity for Cloud Data Centers
PPTX
Security in Optical Networks - Useless or Necessary?
PDF
Optical and mobile networks: friends or foes?
PPTX
Scalable and Secure Connectivity for Seamless Cloud Evolution
PDF
World's first demo of 600G SDN-enabled automation
PPTX
10-2016_CONIDA_100GAES_PROPUESTA_R1.pptx
PDF
Data Center Interconnectivity Trends and Their Effect on Optical Networking
PDF
Security and services drive data north
PDF
Introducing ConnectGuard™ Cloud
PDF
ADVA Webinar to Netwell.pdf
PPTX
Next Generation Optical Networking: Software-Defined Optical Networking
PPTX
Low latency for DCI and mobile applications
100G Metro Encryption
Secure Connectivity on Every Network Layer
Secure Optical Connectivity Solutions for High-Capacity Data Centers
Secure WDM Connectivity for High-Bandwidth Applications
Scalable, Secure, Programmable – Cloud Connectivity for the Future
Next Gen Optical Network: Scalability, Flexibility and Security
Big Data Transport
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
Flexible and Secure Connectivity for Cloud Data Centers
Security in Optical Networks - Useless or Necessary?
Optical and mobile networks: friends or foes?
Scalable and Secure Connectivity for Seamless Cloud Evolution
World's first demo of 600G SDN-enabled automation
10-2016_CONIDA_100GAES_PROPUESTA_R1.pptx
Data Center Interconnectivity Trends and Their Effect on Optical Networking
Security and services drive data north
Introducing ConnectGuard™ Cloud
ADVA Webinar to Netwell.pdf
Next Generation Optical Networking: Software-Defined Optical Networking
Low latency for DCI and mobile applications

More from ADVA (20)

PDF
Industrial optically pumped cesium beam clock
PDF
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
PDF
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
PDF
Addressing PNT threats in critical defense infrastructure
PDF
Precise and assured timing for enterprise networks
PDF
Introducing Ensemble Cloudlet for on-premises cloud demand
PDF
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
PDF
Sync on TAP - Syncing infrastructure with software
PDF
Meet stringent latency demands with time-sensitive networking
PDF
Making networks secure with multi-layer encryption
PDF
Quantum threat: How to protect your optical network
PDF
Optical networks and the ecodesign tradeoff between climate change mitigation...
PDF
Trends in next-generation data center interconnects (DCI)
PPTX
Open optical edge connecting mobile access networks
PDF
Introducing Adva Network Security – a trusted German anchor
PDF
Meet the industry's first pluggable 10G demarcation device
PDF
Introducing ADVA AccessWave25™
PDF
10G edge technology for outdoor environments
PDF
The quantum age - secure transport networks
PDF
From leased lines to optical spectrum services
Industrial optically pumped cesium beam clock
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
Addressing PNT threats in critical defense infrastructure
Precise and assured timing for enterprise networks
Introducing Ensemble Cloudlet for on-premises cloud demand
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
Sync on TAP - Syncing infrastructure with software
Meet stringent latency demands with time-sensitive networking
Making networks secure with multi-layer encryption
Quantum threat: How to protect your optical network
Optical networks and the ecodesign tradeoff between climate change mitigation...
Trends in next-generation data center interconnects (DCI)
Open optical edge connecting mobile access networks
Introducing Adva Network Security – a trusted German anchor
Meet the industry's first pluggable 10G demarcation device
Introducing ADVA AccessWave25™
10G edge technology for outdoor environments
The quantum age - secure transport networks
From leased lines to optical spectrum services

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Encapsulation theory and applications.pdf
PDF
Mushroom cultivation and it's methods.pdf
PPTX
Machine Learning_overview_presentation.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Teaching material agriculture food technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Group 1 Presentation -Planning and Decision Making .pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Programs and apps: productivity, graphics, security and other tools
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Encapsulation theory and applications.pdf
Mushroom cultivation and it's methods.pdf
Machine Learning_overview_presentation.pptx
Spectral efficient network and resource selection model in 5G networks
Diabetes mellitus diagnosis method based random forest with bat algorithm
TLE Review Electricity (Electricity).pptx
Network Security Unit 5.pdf for BCA BBA.
Unlocking AI with Model Context Protocol (MCP)
cloud_computing_Infrastucture_as_cloud_p
MIND Revenue Release Quarter 2 2025 Press Release
Building Integrated photovoltaic BIPV_UPV.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Layer 1 Encryption in WDM Transport Systems

  • 1. Layer 1 Encryption in WDM Transport Systems Dr. Henning Hinderthür, PLM
  • 2. © 2014 ADVA Optical Networking. All rights reserved. Confidential.2 Security in Telco "What last year's revelations showed us was irrefutable evidence that unencrypted communications on the internet are no longer safe. Any communications should be encrypted by default“ Edward Snowden - Guardian Interview, Moscow July 2014
  • 3. © 2014 ADVA Optical Networking. All rights reserved. Confidential.3 Data Center Environment & Security APPS APPS
  • 4. © 2014 ADVA Optical Networking. All rights reserved. Confidential.4 Data Center Environment & Security Physical Access to the Data Center APPS APPS
  • 5. © 2014 ADVA Optical Networking. All rights reserved. Confidential.5 Data Center Environment & Security Hardware Security APPS APPS
  • 6. © 2014 ADVA Optical Networking. All rights reserved. Confidential.6 Data Center Environment & Security Software Security APPS APPS
  • 7. © 2014 ADVA Optical Networking. All rights reserved. Confidential.7 Data Center Environment & Security …and What About the Fiber Connection? APPS APPS
  • 8. © 2014 ADVA Optical Networking. All rights reserved. Confidential.8 Fiber Optic Networks Tapping Possibilities Y-Bridge for service activities Fiber Coupling device Street cabinet How to get access? Where to get access? Splice boxes / cassettes (Outdoor / Inhouse) There are multiple ways to access fiber Protocol Analyzer
  • 9. © 2014 ADVA Optical Networking. All rights reserved. Confidential.9 Encryption What is Key? • Highest level of security • Speed - Low Latency • 100% Throughput • No Jitter • Role Based Management (Multi Tenant Management for Carriers) Encryption on the lowest possible layer
  • 10. © 2014 ADVA Optical Networking. All rights reserved. Confidential.10 Encryption Basics Key Lengths – Magnitude Number of grains in 1 m3 sand from the beach 240 Number of atoms in a human body 292 Number of atoms in the earth 2165 Number of atoms in the sun 2189 Number of atoms in the Milky Way 2226 Number of atoms in the universe 2259 AES 256
  • 11. © 2014 ADVA Optical Networking. All rights reserved. Confidential.11 High Speed Encryption Modes Cisco Overlay Transport Virtualization (OTV) +82 Bytes MacSec +32 Bytes Cisco TrustSec +40 Bytes Bulk Mode (0 Bytes) • Hop-by-Hop only • Ethernet only • Overhead creates latency and throughput issues • Point-to-Point • Protocol/ I/F agnostic (Ethernet, FC, IB, Sonet/SDH) • Integrated Solution with lowest latency • Huge overhead • IP VPN Services • Cisco Nexus
  • 12. © 2014 ADVA Optical Networking. All rights reserved. Confidential.12 Encryption Performance Comparison of Maximum Throughput Framesize / Bytes Throughput
  • 13. © 2014 ADVA Optical Networking. All rights reserved. Confidential.13 Encryption Using G.709 / OTH Link Protocol 1 …….…. 14 15 ….… 16 17 ………………………………. 3824 3825 .… 4080 1 2 3 4 Column number OTU/ODU overhead ROW OPU overhead Encryption FEC areaEncrypted Payload OCH Overhead Och payload FEC data Optical channel frame structure 5TCE link protocol • Supports • OTU-2 • OTU-2e • OTU-2f AES 256 encrypted OPU2 payload Automatic key exchange using DH Key Exchange
  • 14. © 2014 ADVA Optical Networking. All rights reserved. Confidential.14 FSP 3000 Encryption Highlights Protection Building Blocks • Authentication via initial authentication key to protect from “man in the middle” attacks • AES256 encryption to offer maximum data security • Diffie Hellman (DH) key exchange for secure encryption key generation • New encryption key every 1min/10mins for additional security • Key lifetime configurable • Lowest latency (100ns) while providing 100% throughput
  • 15. © 2014 ADVA Optical Networking. All rights reserved. Confidential.15 • Universal Enterprise Mux-/Transponder • AES256 encryption • Dynamic key exchange every 10 minutes • 5x Any Multi-service clients • Transparent / Framed mode • SDH Network variant 5TCE-PCN-8GU+AES10GS 10G Muxponder with Encryption 5TCE-PCN-10GU+AES10G Network Interface 3x Client SFP 2x Client SFP/SFP+ Module DWDM CWDM Grey SFP SFP SFP SFP (+) SFP (+) TDM Prop. framing OTN-, Eth-PM GCC0 5x GbE 5x 1G/2G FC 3 x 4G FC 8G/10G FC 5G IB/10G IB STM-16/64 10GbE Client Module ODU2 Pluggable SFP+ Network OTU2 GFEC STM-64 AESEncryption CWDM Grey Prop. framing
  • 16. © 2014 ADVA Optical Networking. All rights reserved. Confidential.16 • Universal Enterprise Muxponder 100G • AES256 encryption with 2048bit key • Dynamic key exchange every 1 minute • Up to 10 x any multi-service • 10GE, FC8/10/16, 5G Infiniband • 40GE/100GE by means of 4x/10x 10GbE via break out cable (SR4, LR4 and SR10) 100G Metro Muxponder with Encryption 10TCE-PCN-16GU+AES100G Network DWDM CFP 10x Client SFP+ Module GMP ODUFlex Client Module ODU4 DWDM CFP Network OTU4 config. EFEC OTN PM AESEncryption CWDM Grey SFP+ SFP+ SFP+ SFP+ SFP+ SFP+ SFP+ SFP+ SFP+ SFP+ 10x 10GbE (WAN/LAN) 10x 8G FC 8x 10G FC 7x 16G FC 10x STM-64/OC-192 10x 5G IB 4x 28G DWDM (96ch C-band)
  • 17. © 2014 ADVA Optical Networking. All rights reserved. Confidential.17 Layer 1 Encryption Solution Suite AES 10G Encryption AES 100G Encryption 40GbE 100GbE FC 16G FC 10G 10GbE STM-64/OC-192 FC 8G IB 5G FC 4G STM-16/OC-48 FC 2G FC 1G GbE 1G–5G5G–15G40G100G
  • 18. © 2014 ADVA Optical Networking. All rights reserved. Confidential.18 Encryption Management & Operations
  • 19. © 2014 ADVA Optical Networking. All rights reserved. Confidential.19 Data Center Networks Encryption Management for Private Networks 3rd Party NE 3rd Party NE 3rd Party NE FSP NM Server FSP EM or LCT/CLI FSP NM Clients LAN Scenario 1 - User of encryption is the operator of equipment DCN Crypto Manager running on FSP NM
  • 20. © 2014 ADVA Optical Networking. All rights reserved. Confidential.20 Data Center Networks Encryption Management for Private Networks 3rd Party NE 3rd Party NE 3rd Party NE Scenario 2 - Encryption user does not own the network FSP NM Server FSP NM Clients LAN DCN GUI Server running NM client apps Customer A WWW. Crypto Manager running on GUI Server
  • 21. © 2014 ADVA Optical Networking. All rights reserved. Confidential.21 Crypto Management Management Levels Provided • Operational management • Deals with all operational aspects (FCAPS) • User access is handled on the NCU • Security management • Control of all security relevant activities • Separated from operational management • Access control handling on the AES Muxponder not on the NCU • Security relevant activities are performed using the security relevant credentials • ROOT users have no access to security management
  • 22. © 2014 ADVA Optical Networking. All rights reserved. Confidential.22 Encryption over OTN Networks
  • 23. © 2014 ADVA Optical Networking. All rights reserved. Confidential.23 5TCE-PCN+AES10G5TCE-PCN+AES10G Site B LAN Site A LAN n*1GbE, 10GbE STM-64c OTU-2e STM-64c OTU-2e OTN Network Carrier Managed Service Encryption over OTN Networks 1GbE & 10GbE Services n*1GbE, 10GbE FSP Network & Crypto Manager
  • 24. © 2014 ADVA Optical Networking. All rights reserved. Confidential.24 10TCE-PCN-16GU+AES100G10TCE-PCN-16GU+AES100G Site B LAN Site A LAN Multi rate Multi rate GCC2 used for key exchange & other functions Setup via ECC (GCC0) or an external DCN connection Encryption over OTN Networks 10GbE, 40GbE, 100GbE Services LR10R OTU-4 111,809 Gb/s LR10R OTU-4 111,809 Gb/s FSP Network & Crypto Manager OTN Network Carrier Managed Service
  • 25. © 2014 ADVA Optical Networking. All rights reserved. Confidential.25 Layer 1 Encryption in Operation
  • 26. © 2014 ADVA Optical Networking. All rights reserved. Confidential.26 Where ADVA-Encryption is in Operation Department of Business Innovation & Skills: 2013 Information Security Breaches Survey www.gov.uk/bis ADVA sells ~10% of layer 1 encryption into Government > 150 links ADVA sells ~62% of layer 1 encryption into Finance > 1.000 links ADVA sells ~10% of layer 1 encryption into HealthCare > 150 linksADVA sells ~16% of layer 1 encryption into Other large industry > 250 links 1.600 x 10G encrypted links in operation • 62% Finance (50 customers) • 10% Government (13 customers) • 10% Healthcare (7 customers) • 10% Large Industry (14 customers) • 4% Cloud SPs (9 customers) • 4% other industry • 2% Utilities (3 customers) ADVA sells ~2% of layer 1 encryption into Utilities > 50 links
  • 27. hhinderthuer@advaoptical.com Thank You IMPORTANT NOTICE The content of this presentation is strictly confidential. ADVA Optical Networking is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited. The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA Optical Networking shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation. Copyright © for the entire content of this presentation: ADVA Optical Networking.

Editor's Notes

  • #4: – not for every optical network encryption brings a benefit. In general security is interesting whenever there is a consolidation of services which are considered mission critical for the operator. Typically this is the case for data centers. In the end of my talk I will give a little overview that shows were we are effectively deploying optical encryption and you will see that industry - or you could say - Enterprise customers are a sweet spot. So lets have a look into a typical Enterprise / Data Center network:
  • #5: Most of the data center we talk about have a secure physical access, this means building are in one or the other way shielded against attacks from the outside world and there are security gates that make sure not everybody can enter the buildings.
  • #6: Due to those measures Data Center Hardware,…..Servers, Storage, Mainframes,…is protected. So due to teh fact that you have a physical security gateway a potential enemy can‘t just go there, steal HW or do HW reconfigurations.
  • #7: Talking about SW that is actually running on the HW. Also here Data Centers have security concepts….secure shells, separated IP domains, central authentification servers controlling who gets SW access to which device or part of the network by when and also providing passwords in a centralized way acc. to certain rules rather than individual operators providing access for everybody who knows the birthday of their wife.
  • #8: So that‘s all fine and well understood. But the point where those concepts don‘t have control is the point were the optical fiber leaves the data center building or the campus and in 99% of all cases crosses public ground where it is really difficult for the data center operator to make sure that only teh right poeple get access to this infrastructure.
  • #9: were can potential attackers get access to a fiber network? – because fiber operators have to continiously maintain their infrastructure they have street cabinets. Everybody know the grey boxes and can imagine how easy it is to open a street cabinet and get access to such a splice box that contains a group of fibers which are in-service. From there an attacker can either deploy such a little Y-bridge which tabs light permanently or he can use such a coupling device which makes use of the fact that whenever you start bending fibers light will leak out of the fiber core and can be collected and detected. OK- so that‘s how you get the light but how do you get to that data? I think we all know that. Wavelengths can get identified and filtered using standard ITU filters, transport protocols like G.709 are fully standardized and protocol analyzers will perfectly do the job of stripping them away and providing a payload signal. The cost for the equipment that you need to realize such a scenario is below 10k dollar.
  • #10: OK. So I am a network operator and in order to protect against such a scenario I want to run encryption on my network. So what are the key criteria I have to look for? … …and as a result of a market analysis I will come to the conclusion that encryption should always be done on teh lowest possible layer. Not every operator has access to teh L1 therefore sometimes L2 or L3 solutions show better economics.
  • #11: Lets now talk a bit more about the concept of L1 encryption. As you might know there are lots of different encryption schemes and algorithms available. And it would be beyond teh scope of this session to introduce you to the way how all the different schemes really operate on the level of algorithms. But just one quick comparison here….Security levels scale with the complexity of the key. In the digital domain the key is always a number and key complexity is due to the size of this number. AES256 is a quasi-standard in encryption today. Researchers today believe that it can only be attacked by trial and error. The number of trials you need in order to have reasonable chance beeing successful is almost at the level of the number of atoms in the universe.
  • #12: Whats the difference between encryption on L3 – typically know as Ipsec – or encryption on L2 or encryption on L1? First of all the most obvious difference is …L1 encryption is protocol agnostic. So it can be applied to any prototcol in the data center and there are lots of different protocols present in today data center networks - not everything is Ethernet. But there is also a big difference in the way encryption inluences the transport. At this point you have to know that most encryption schemes are dynamic. That means keys are not static, they change automatically. In order to make sure that the remote location can follow this dynamic key exchange both location have to continiously exchange some data. …data that is generated by the encryption scheme itself. For a encrpytion scheme that is based on a protocol like L2 or L3 this means that you have to add an overhead. For example in IP – every IP packet has to carry an additional overhead that carries the pure encrpytion information. You see the orange areas in the pictures – those are teh encrpytion header that are added to the different protocols. Adding larger header to IP packet or MAC frames means that you limit teh effective throughput and also add latency. In contrast to that a L1 encryption that uses an available tranport protocol can just go to the header of that transport protocol and insert the relevant information. So you turn some bits of an idle pattern in an OTU2 frame into something meaningful. The impact to teh payload with regards to throughput is zero.
  • #13: What you see here is prototcol throught put an encrpyted system as a function of frame size. First – what is called ADVA encryption here is a L1 scheme…and you can – for everything that is L2 or L3 protocol based throuput scales with teh inverse frame size. Average framesize in today‘s internet traffic is about 300 to 400 bytes, source „NetworkWorld“. So we see typically 20% effects. But it can be even more for very small packets.
  • #14: The following OTU/ODU overhead bytes are used for the dynamic key exchange in our ADVA AES256 encryption solution: 10TCE-PCN-16GU+AES100G: GCC2 5TCE-PC(T)N-10G+AES10G: GCC1/2
  • #15: Lets have a look at teh networking aspects of such an encrpytion scheme. First of all – we do a so-called inflight encryption. This means – data in encryption on teh network side btu unencrypted at all clients ports. – completely symmetrical. In order to make sure that only those systems that are supposed to talk to eahc other are running the same encryption scheme the first thing that needed to establish such a scheme is authentification. This means that a so-called atuh. Key need to be provided to both systems and then they are allowed to talk to each other. This is done via some secure shells – can be in-band, can be out of band. Then the AES 256 scheme starts running between two individual cards. Every minute all keys will automatically change. In order to enable the remote location o follow this fast key exchange there is so called Deffie-Hellman that just enables the remote location to always generate the news key on ist own rather than transmitting key between the two sites. Payload transport is not at all affected or disrupted….
  • #24: Main focus of encryption over long distance OTN networks is on GbE and 10GbE LAN services. The following bytes are used with the STM-64c line interface: F2/3 bytes used for key exchange, latency & other functions Setup via  ECC (DCCR) or an external DCN connection The following bytes are used with the OTU-2e line interface: GCC1/2 used for key exchange, latency & other functions Setup via  ECC (GCC0) or an external DCN connection
  • #25: Main focus of encryption over long distance OTN networks is on Ethernet LAN services.
  • #27: Bar chart shows the sector spending on security in the UK.