91³Ô¹ÏÍø

Introduction

There is an ever-increasing demand for bandwidth, driven by an exponential growth in the number of devices connected to the cloud and a broadening variety of sensors, applications, and services, resulting in an explosion of data traffic. This in turn, drives the proliferation of high bandwidth interfaces such as Ethernet, PCIe/CXL, and DDR to sustain faster data movement and increased processing and storage capacities. End-to-end data security in the connected ecosystem is more critical than ever, including when data is at rest and when it is in motion, both as it is communicated between devices and the cloud and while it is processed or stored to a device. 

Ethernet-connected devices, like computers, servers, hubs, routers, and more, are expanding in every direction, including high performance computing, 5G, mobile and automotive markets, all requiring security. Security on the internet or any other ethernet network depends on encryption. The more encryption is used, the harder it is for attackers to steal data, eavesdrop on communications, and/or compromise systems. 

Why Encrypt Ethernet Traffic

There are many reasons to encrypt Ethernet traffic. Compliance is one of the most common and may involve one or more standards for the treatment of sensitive or personally identifiable data. Examples of such standards are defined in the Health Insurance Portability and Accountability Act of 1996 (HIPAA) in the US or the analogous European General Data Protection Regulation (GDPR). For institutions that obtain and use data on children, rules defined in the Family Education Rights and Privacy Act (FERPA) may also apply. Failure to comply with applicable standards can result in significant penalties even if a data breach does not occur.

Data theft is not only the domain of regulated content ¨C any research, intellectual property, proprietary data or code is potentially a target for theft or malicious alteration. Intrusion detection and prevention starts with ensuring privacy for exchanging account credentials and sensitive or valuable data. Source validation and authentication services are a critical element of this infrastructure, not all breaches occur from outside of an organization, and rights-based data management depends critically on safe (private and reliable) identity validation. 

What is MACsec

The primary security standard to secure Ethernet traffic is the Media Access Control Security (MACsec). MACsec provides data security in motion between Ethernet-connected devices and protects network communication against DoS attacks, eavesdropping, and man-in-the-middle attacks.

MACsec is an established protocol based on AES-GCM cryptography that secures the data link layer (where communication begins) by providing confidentiality, data integrity, data origin authenticity, and replay protection.

OSI Stack Security Protocols and Where MACsec Fits

Security on the internet or any other Ethernet network depends on encryption, for the privacy of communication and integrity and authentication using shared authenticated keys. There are several different ways to encrypt ethernet traffic, and they occur at different layers in the OSI stack on which it is based:  

  • TLS, developed in 1999 as an enhancement of SSL, is implemented at the transport layer of TCP/IP (OSI layer 4).  DTLS initially proposed in April of 2006 via RFC 4347 applies to datagram protocols such as UDP/IP (also layer 4). As such, it is not restricted to Ethernet but can only secure a single stream or one communication channel at a time. TLS protects web browsers, client applications, and all the applications¡¯ communications to cloud services. HTTPS and SSH are examples of protocols that can leverage TLS ¨C and the implementation is entirely within the control of the software.  
  • IPsec: If encryption is needed to protect networks (as well as anything else traversing the IP protocol), IPsec is an option, implemented at the network layer of the OSI stack (layer 3), often as a VPN connection. IPsec is usually implemented as a software stack and used voluntarily by users. 
  • MACsec: when the encryption on an Ethernet network is required for all traffic, regardless of the upper layer protocols involved, it is necessary to enforce it at the hardware level (link or medium access layer 2). Fortunately, this is precisely what MACsec (aka IEEE 802.1AE) provides. MACsec is used to protect network-to-network or device-to-network connections. Each connection on an Ethernet network (host to host, host to switch, or switch to switch) will traverse both encrypted and unencrypted traffic if control over that encryption is imposed at higher layers but once MACsec is enabled for a link, all traffic on that connection will be secured from prying eyes. As with its upper-layer cousins, MACsec provides both encryption and authentication services by adding two additional fields to the ethernet frame:
    • Security Tag, which is an extension of the EtherType field also used for VLAN tagging
    • Message Authentication Code (ICV) to define the integrity check value algorithm

Setting up a MACsec encrypted connection involves five steps:

  • Step 1: Mutual peer authentication is established using a Pre-shared Key (PSK).
  • Step 2: After successful authentication, a secure Connectivity Association Key Name (CKN) is exchanged to form a connectivity association between the peers. The MKA ICV is validated with a Connectivity Association Key (CAK), which is effectively a secret key.
  • Step 3: The priority value of the two endpoints is used to elect which becomes the key server while the other device functions as a key client. 
  • Step 4: The key server then generates and distributes the Secure Association Key (SAK) to the key client (peer) to form a security association.
  • Step 5: Encrypted data can now be exchanged between peers.

MACsec hardware encryption also provides the lowest latency security as compared to options implemented at higher layers of the OSI stack.

Synopsys Ethernet 91³Ô¹ÏÍø with MACsec Security

Synopsys MACsec Security Modules secure ethernet traffic against denial-of-service (DoS) attacks, eavesdropping, and man-in-the-middle attacks by supporting confidentiality, integrity, origin authentication, and replay protection in switch, router, and bridge SoCs for cloud computing, 5G, mobile and automotive applications. 

They are standards-compliant full-duplex solutions that integrate seamlessly with Synopsys Ethernet MAC & PCS IP, supporting scalable data rates with optimal latency, network prioritization, and diversity for a range of secure Ethernet connections. Figure 1 depicts the Synopsys Ethernet solution with Synopsys MACsec Module offering that enables system-on-chip (SoC) designers to quickly integrate security in their system for a fast time-to-market and reduced risk.

Figure 1: Synopsys Ethernet Security 91³Ô¹ÏÍø block diagram

With the Synopsys MACsec Security Modules, designers can take advantage of:

  • Compliance with the IEEE 802.1AE standard
  • Per frame security processing, including encapsulation/decapsulation and frame validation
  • Scalable throughput to 100+ Gbps based on pipelined AES-GCM cryptography with optimized latency
  • Modes
    • Encryption/decryption and authentication
    • Authentication only
  • 128-bit & 256-bit key sizes
  • Fixed Ingress/Egress latency
  • Extended packet numbering as per IEEE 802.1AEbn standard
  • Jumbo frames support
  • SecTag insertion & removal
  • Configurable number of Secure Channels and Associations
  • Configurable replay protection window size
  • Configurable offset
  • Programmable confidentiality offset
  • VLAN tag in the clear support
  • Selectable bypass mode

Conclusions

Data retention policies vary worldwide; even some government actors will try to impose access or retention rights to data under surveillance, ownership, oversight policy, or legislation. It is not sufficient protection to encrypt data only at rest. The use of multiple layers of network encryption might be necessary to ensure privacy and integrity, traversing unknown and uncontrolled elements of internet infrastructure. Zero-day vulnerabilities, malware, and viruses can easily threaten without the validation and protection offered by encryption techniques.

The main security standard to secure ethernet traffic is MACsec, which provides data security in motion between Ethernet-connected devices. The pre-shared key used in the first step of MACsec negotiation can prevent non-trusted devices from successfully connecting to a secured ethernet fabric. Computing on shared infrastructure further complicates this challenge - unless you can verify a connection is secured, don¡¯t trust it!

By adding Synopsys MACsec Security Modules to Synopsys Ethernet IP 91³Ô¹ÏÍø, designers of networking SoCs can protect high-speed network traffic, enabling end-to-end security of data in motion between Ethernet-connected devices. 

Learn more about enabling the highest levels of SoC security with Synopsys Secure Interfaces.

Synopsys IP Technical Bulletin

In-depth technical articles, white papers, videos, webinars, product announcements and more.

Continue Reading