中文 English

800G Ethernet MACsec Integration And Verification


Ethernet is the interconnect technology of choice for a wide range of applications including (but not limited to) data centers, wireless backhaul, automotive, artificial intelligence (AI), and many other use cases. It is ubiquitous. As bandwidth requirements continue to scale to ever-dizzying heights due to the proliferation of data-intensive applications, developing, integrating, and validatin... » read more

Securing ADAS At The Chip Level


The advent of ADAS, Advanced Driver Assistance Systems, is making a dramatic impact on new vehicles. It provides many helpful functions such as automotive night vision, forward collision warnings, collision avoidance, and lane departure warnings. In order to operate, ADAS requires the computerization of most of the functions of the vehicle. This results in from 50 to over 100 electronic control... » read more

MACsec Explained: Securing Data in Motion


For end-to-end security of data, it needs to be secured when at rest (processed or stored in a device) and when in motion (communicated between connected devices). For data at rest, a hardware root of trust anchored in silicon provides the foundation upon which all data security is built. Similarly, for data in motion, security anchored in hardware at the foundational communication layer prov... » read more

Secure TSN Ethernet With MACsec Is Now Possible


For end-to-end security of data, it must be secured both when at rest (processed or stored in a device) and when in motion (communicated between connected devices). For data at rest, a hardware root of trust anchored in silicon provides that foundation upon which all data security is built. Applications, OS, and boot code all depend on the root of trust as the source of confidentiality, integri... » read more

Secure Networking Basics: MACsec, IPsec, And SSL/TLS/DTLS


The MACsec, IPsec and SSL/TLS/DTLS protocols are the primary means of securing data in motion (communicated between connected devices). These protocols can be anchored in hardware or implemented in software as part of an end-to-end security architecture. This white paper provides fundamental information on each of these protocols including their interrelationships and use cases. ... » read more

The Evolution Of Ethernet To 800G And MACsec Encryption


Ethernet is a frame-based data communication technology that employs variable-sized frames to carry a data payload. This contrasts with long-haul Optical Transport Networks (OTN) that use fixed-sized frames. The size of Ethernet frames ranges from a minimum of 60 bytes up to 1500 bytes, and in case of jumbo frames, up to 9K bytes. A frame is a Layer 2 data container with the physical addresses ... » read more

Securing Data In Motion With MACsec


For end-to-end security of data, it must be secured both when “at rest” (processed or stored in a connected device) and when it is “in motion” (communicated between connected devices). For data at rest, a hardware root of trust anchored in silicon provides that foundation upon which all data and device security is built. For example, the security of applications builds on an uncompromis... » read more

MACsec Fundamentals: Securing Data in Motion


For end-to-end security of data and devices, data must be secured both when it as rest (stored on a connected device) and when it is in motion (communicated between connected devices). For data at rest, a hardware root of trust anchored in silicon provides that foundation upon which all device security is built. Similarly, MACsec security anchored in hardware at the foundational communication l... » read more