SlideShare a Scribd company logo
Protecting
Data in Motion
with MACsec
Fall 2020
Gijs Willemse
Sr. Director of Product Management
2
• Data that is transferred between two devices and/or servers
• Many different sources and application
• Consumer electronics, Mobile devices, IoT
• Automotive, Infrastructure, Edge devices
• Cloud servers, Data centers, others
• Many different transmission medium
• Wireless: Mobile (3GPP) and WiFi (or combinations)
• Wired: Copper, Optical, long distance optical (OTN)
• Why do I need Secure Communication?
• Medium is in the public domain
• Transferred data is vulnerable for many different attacks, including:
physical, man-in-the-middle, (D)DoS, Sniffing, Spoofing…
What is “Data in Motion”
3
MACsec
• Media Access Control Security
(IEEE)
• Protect Ethernet links
• Switch – Switch
• Switch – Host
• Host – Host
• Extensions to deploy over VLAN
Crypto
• Products generally require FIPS
140-2 algorithm validated before
deployment in public domain
Protecting Data in Motion: Use Secure Communication Protocols
Session
TCP / UDP
IP
Layer 2 (Link)
Layer 1 (Physical)
Application
TCP / UDP
IP
Layer 2 (Link)
Layer 1 (Physical)
IPsec
MACsec
Client Server
OSI Protocol Stack
TLS
Crypto
IPsec
• Internet Protocol Security (IETF)
• Set up a Virtual Private Network
Secure IP traffic between
• Network – Network
• Network – Host
• Host – Host
TLS (SSL)
• Transport Layer Security (IETF)
• Secure communications
between two applications
• Web Browser – Web Server
• Client App – Cloud API
• Sensor chip – App Processor
4
• Meet line rate throughput
• Speed of optical links goes up to 800Gbps and fastest switches handle >10Tbps of traffic
• Limit Latency
• Realtime application is factory, medical or even consumer space have strict latency requirements
• Response times must be minimized
• Applications require constant latency
• Support Prioritization
• TSN Ethernet layer define prioritization: pre-emption of packets is required
• Cope with network diversity and various deployments
• Networks are virtual
• Connections can be hop-by-hop, but also end-to-end
• Traffic passes different networks and infrastructures
Requirements for Secure Communication
5
• MACsec is the L2 security standard, widely deployed in PHYs, switches, firewalls, gateways, NICs
and 5G equipment
• Advantages of MACsec
• Scalable crypto
• Low latency
• Fully inline datapath
• Negligible SW overhead
• Implementation Challenges
• Line rate under all conditions
• Prioritization / Frame Preemption
• Rambus has portfolio that covers all ranges and features optimized for the modern Ethernet
requirements, including custom classification. Meets line-rate under all conditions
• The only provider of control plane software
MACsec Security
PHY
MACsec
classifier
MACsec
transformation
MAC/PCS
PTP
MAC/PCS
Line:
8x112G
SerDes
Switch
MACsec
classifier
MACsec
transformation
Bufferingand
multiplexing
MAC/
PCSMAC/
PCSMAC/
PCS
MAC/
PCSMAC/
PCSMAC/
PCS
optionalPTP
6
• Ethernet is getting adopted in aerospace, automotive, manufacturing and utility industries
• Enables new levels of connectivity and cost reduction.
• Enables new uses cases
• These applications require deterministic traffic
• TSN group of standards is defined
• Adding: priority queues, minimum jitter, preemption, shaping/scheduling, time.
• TSN features are integrated into Ethernet subsystem
• Ethernet PHYs
• Switches
• Gateways
• Automotive/industrial TSN SOCs
Time Sensitive Networking (TSN Ethernet)
7
• TSN Ethernet does requires data protection. Yes, MACsec is a logical choice.
• Addition of Security must keep deterministic behavior of the Ethernet traffic
• This raises implementation challenges that are not covered by standards and must be resolved
• It must be possible to interleave packets, allowing priority packets to interrupt regular traffic
• Crypto works on native cipher block sizes (typical 16B), interruption of a data stream requires complex
state/date storage
• Rambus MACsec IPs support TSN, targeting MACsec-capable Ethernet ports
• Lowest latency of fixed latency modes
• Side-band signaling to interact with external PTP modules and classifiers
• Preemption support by processing two interleaved streams per port
• Preemption support by processing IEEE802.3br fragments while keeping the fragment size, latency
and relation unchanged
TSN MACsec: Translating Challenges into Solutions
8
Deployment in SoC/switch and PHY
SOC
PHY
MAC merge sublayer
eMAC pMAC
System MAC
TSN MACsec
Line MAC
PCS
DMA
PHY
SOC
TSN MACsec
MAC merge sublayer
eMAC pMAC
PCS
DMA / Switch Interface
9
• Catalog solutions include:
• Single port, MACsec/VLAN-in-clear for rates of 1G / 2.5G / 10G / 25G / 50G / 100G
• [New] Next generation single-port IPs with pre-emption from 1 to 50G TSN Ethernet
• Multichannel (TDM) MACsec for 100G to 800G: EIP-163/164. Optional support for proprietary classification
and other custom extensions
• Full-featured control plane product
• MACsec Toolkit: IEEE 802.1X (EAP + MKA). Includes a SW data plane for development purpose
• Non-MACsec TDM Silicon IP products for >1Tbps AES-GCM encryption
• Scalable AES-GCM engine
• IPsec AES-GCM transform engine for NICs
• TLS/IPsec and wireless algorithm (3GPP) packet engines: EIP-196/EIP-197
• TLS/IPsec/MACsec Toolkits implementing the key exchange protocol for all three security
stacks (MatrixSSL/QuickSec)
Rambus MACsec Offering
Thank you
For more information:
gwillemse@rambus.com

More Related Content

PDF
News And Development Update Of The CloudStack Tungsten Fabric SDN Plug-in
PPTX
Securing Kafka with SPIFFE @ TransferWise
PDF
How to Manage Scale-Out Environments with MariaDB MaxScale
PPTX
Migrating from InnoDB and HBase to MyRocks at Facebook
PDF
What’s New in VMware vSphere 7?
PPTX
Kafka Quotas Talk at LinkedIn
PDF
What's Coming in CloudStack 4.19
PDF
OpenStack Neutron Tutorial
News And Development Update Of The CloudStack Tungsten Fabric SDN Plug-in
Securing Kafka with SPIFFE @ TransferWise
How to Manage Scale-Out Environments with MariaDB MaxScale
Migrating from InnoDB and HBase to MyRocks at Facebook
What’s New in VMware vSphere 7?
Kafka Quotas Talk at LinkedIn
What's Coming in CloudStack 4.19
OpenStack Neutron Tutorial

What's hot (20)

PDF
Terraform 101
PPTX
ONOS: Open Network Operating System. An Open-Source Distributed SDN Operating...
PDF
Red Hat Satellite
PPTX
Overview of Distributed Virtual Router (DVR) in Openstack/Neutron
PPTX
Oracle ebs db platform migration
PDF
Ceph Object Storage at Spreadshirt (July 2015, Ceph Berlin Meetup)
PDF
Scalability, Availability & Stability Patterns
PPTX
Virtual Infrastructure Overview
PDF
[2018] MySQL 이중화 진화기
PDF
Grafana introduction
PDF
What CloudStackers Need To Know About LINSTOR/DRBD
PDF
The Best Storage Solution For CloudStack: LINSTOR
PDF
JavaユーザのためのVSCodeのススメ
PDF
DevOps - Interview Question.pdf
PDF
Kafka High Availability in multi data center setup with floating Observers wi...
PDF
[DockerCon 2023] Reproducible builds with BuildKit for software supply chain ...
PDF
Kubernetes Basics
PDF
Docker 101: Introduction to Docker
PDF
[OpenStack Days Korea 2016] Track1 - All flash CEPH 구성 및 최적화
PDF
Parallelize R Code Using Apache Spark
Terraform 101
ONOS: Open Network Operating System. An Open-Source Distributed SDN Operating...
Red Hat Satellite
Overview of Distributed Virtual Router (DVR) in Openstack/Neutron
Oracle ebs db platform migration
Ceph Object Storage at Spreadshirt (July 2015, Ceph Berlin Meetup)
Scalability, Availability & Stability Patterns
Virtual Infrastructure Overview
[2018] MySQL 이중화 진화기
Grafana introduction
What CloudStackers Need To Know About LINSTOR/DRBD
The Best Storage Solution For CloudStack: LINSTOR
JavaユーザのためのVSCodeのススメ
DevOps - Interview Question.pdf
Kafka High Availability in multi data center setup with floating Observers wi...
[DockerCon 2023] Reproducible builds with BuildKit for software supply chain ...
Kubernetes Basics
Docker 101: Introduction to Docker
[OpenStack Days Korea 2016] Track1 - All flash CEPH 구성 및 최적화
Parallelize R Code Using Apache Spark
Ad

Similar to Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit 2020 (20)

PPT
PPTX
Wireless Local Area Networks
PDF
New flaws in WPA-TKIP
PDF
Telecommunications and Network Security Presentation
PDF
CISSP Week 6
PDF
WiFi-technology WiFi-technology WiFi-technology
PDF
CISSP Week 7
PDF
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
PDF
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
PPT
Networking Brief Overview
PDF
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
PPT
IEEE-802.11overview1111111111111111111.ppt
PPTX
PPT
wireless lan security for their all details
PPTX
iMinds' course: preceding exercises
PPT
Internetworking Overview
PPTX
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
PPTX
The Basics of Industrial Ethernet Communications
PPT
wireless lan security.ppt
PPTX
Hardened Ethernet In ITS 2010
Wireless Local Area Networks
New flaws in WPA-TKIP
Telecommunications and Network Security Presentation
CISSP Week 6
WiFi-technology WiFi-technology WiFi-technology
CISSP Week 7
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
Networking Brief Overview
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
IEEE-802.11overview1111111111111111111.ppt
wireless lan security for their all details
iMinds' course: preceding exercises
Internetworking Overview
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
The Basics of Industrial Ethernet Communications
wireless lan security.ppt
Hardened Ethernet In ITS 2010
Ad

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Empathic Computing: Creating Shared Understanding
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Cloud computing and distributed systems.
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Approach and Philosophy of On baking technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
KodekX | Application Modernization Development
PDF
Electronic commerce courselecture one. Pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Diabetes mellitus diagnosis method based random forest with bat algorithm
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Spectroscopy.pptx food analysis technology
MIND Revenue Release Quarter 2 2025 Press Release
Empathic Computing: Creating Shared Understanding
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Programs and apps: productivity, graphics, security and other tools
Cloud computing and distributed systems.
Unlocking AI with Model Context Protocol (MCP)
Chapter 3 Spatial Domain Image Processing.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Approach and Philosophy of On baking technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Network Security Unit 5.pdf for BCA BBA.
KodekX | Application Modernization Development
Electronic commerce courselecture one. Pdf

Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit 2020

  • 1. Protecting Data in Motion with MACsec Fall 2020 Gijs Willemse Sr. Director of Product Management
  • 2. 2 • Data that is transferred between two devices and/or servers • Many different sources and application • Consumer electronics, Mobile devices, IoT • Automotive, Infrastructure, Edge devices • Cloud servers, Data centers, others • Many different transmission medium • Wireless: Mobile (3GPP) and WiFi (or combinations) • Wired: Copper, Optical, long distance optical (OTN) • Why do I need Secure Communication? • Medium is in the public domain • Transferred data is vulnerable for many different attacks, including: physical, man-in-the-middle, (D)DoS, Sniffing, Spoofing… What is “Data in Motion”
  • 3. 3 MACsec • Media Access Control Security (IEEE) • Protect Ethernet links • Switch – Switch • Switch – Host • Host – Host • Extensions to deploy over VLAN Crypto • Products generally require FIPS 140-2 algorithm validated before deployment in public domain Protecting Data in Motion: Use Secure Communication Protocols Session TCP / UDP IP Layer 2 (Link) Layer 1 (Physical) Application TCP / UDP IP Layer 2 (Link) Layer 1 (Physical) IPsec MACsec Client Server OSI Protocol Stack TLS Crypto IPsec • Internet Protocol Security (IETF) • Set up a Virtual Private Network Secure IP traffic between • Network – Network • Network – Host • Host – Host TLS (SSL) • Transport Layer Security (IETF) • Secure communications between two applications • Web Browser – Web Server • Client App – Cloud API • Sensor chip – App Processor
  • 4. 4 • Meet line rate throughput • Speed of optical links goes up to 800Gbps and fastest switches handle >10Tbps of traffic • Limit Latency • Realtime application is factory, medical or even consumer space have strict latency requirements • Response times must be minimized • Applications require constant latency • Support Prioritization • TSN Ethernet layer define prioritization: pre-emption of packets is required • Cope with network diversity and various deployments • Networks are virtual • Connections can be hop-by-hop, but also end-to-end • Traffic passes different networks and infrastructures Requirements for Secure Communication
  • 5. 5 • MACsec is the L2 security standard, widely deployed in PHYs, switches, firewalls, gateways, NICs and 5G equipment • Advantages of MACsec • Scalable crypto • Low latency • Fully inline datapath • Negligible SW overhead • Implementation Challenges • Line rate under all conditions • Prioritization / Frame Preemption • Rambus has portfolio that covers all ranges and features optimized for the modern Ethernet requirements, including custom classification. Meets line-rate under all conditions • The only provider of control plane software MACsec Security PHY MACsec classifier MACsec transformation MAC/PCS PTP MAC/PCS Line: 8x112G SerDes Switch MACsec classifier MACsec transformation Bufferingand multiplexing MAC/ PCSMAC/ PCSMAC/ PCS MAC/ PCSMAC/ PCSMAC/ PCS optionalPTP
  • 6. 6 • Ethernet is getting adopted in aerospace, automotive, manufacturing and utility industries • Enables new levels of connectivity and cost reduction. • Enables new uses cases • These applications require deterministic traffic • TSN group of standards is defined • Adding: priority queues, minimum jitter, preemption, shaping/scheduling, time. • TSN features are integrated into Ethernet subsystem • Ethernet PHYs • Switches • Gateways • Automotive/industrial TSN SOCs Time Sensitive Networking (TSN Ethernet)
  • 7. 7 • TSN Ethernet does requires data protection. Yes, MACsec is a logical choice. • Addition of Security must keep deterministic behavior of the Ethernet traffic • This raises implementation challenges that are not covered by standards and must be resolved • It must be possible to interleave packets, allowing priority packets to interrupt regular traffic • Crypto works on native cipher block sizes (typical 16B), interruption of a data stream requires complex state/date storage • Rambus MACsec IPs support TSN, targeting MACsec-capable Ethernet ports • Lowest latency of fixed latency modes • Side-band signaling to interact with external PTP modules and classifiers • Preemption support by processing two interleaved streams per port • Preemption support by processing IEEE802.3br fragments while keeping the fragment size, latency and relation unchanged TSN MACsec: Translating Challenges into Solutions
  • 8. 8 Deployment in SoC/switch and PHY SOC PHY MAC merge sublayer eMAC pMAC System MAC TSN MACsec Line MAC PCS DMA PHY SOC TSN MACsec MAC merge sublayer eMAC pMAC PCS DMA / Switch Interface
  • 9. 9 • Catalog solutions include: • Single port, MACsec/VLAN-in-clear for rates of 1G / 2.5G / 10G / 25G / 50G / 100G • [New] Next generation single-port IPs with pre-emption from 1 to 50G TSN Ethernet • Multichannel (TDM) MACsec for 100G to 800G: EIP-163/164. Optional support for proprietary classification and other custom extensions • Full-featured control plane product • MACsec Toolkit: IEEE 802.1X (EAP + MKA). Includes a SW data plane for development purpose • Non-MACsec TDM Silicon IP products for >1Tbps AES-GCM encryption • Scalable AES-GCM engine • IPsec AES-GCM transform engine for NICs • TLS/IPsec and wireless algorithm (3GPP) packet engines: EIP-196/EIP-197 • TLS/IPsec/MACsec Toolkits implementing the key exchange protocol for all three security stacks (MatrixSSL/QuickSec) Rambus MACsec Offering
  • 10. Thank you For more information: gwillemse@rambus.com