100G MACsec AES256-GCM
The MACsec protocol denes a security infrastrucure for Layer 2 (as per the OSI model) trac by assuring that a received frame has been sent by a transmitting station that claimed to send it. Furthermore, the trac between stations is both encrypted to provide data condentiality and authenticated to provide data integrity.
XIP1213E uses parallel instantiations of Advanced Encryption Standard [1] with 256 bits long key in Galois Counter Mode (AES-GCM) to protect data condentiality, data integrity and data origin authentication. The cipher suite is denoted either as GCM-AES-XPN-256 if the eXtended Packet Numbering (XPN)3 is in use, or as GCM-AES-XPN-256 if XPN is not in use. Both GCM-AES-256 and GCM-AES-XPN-256 use Xiphera’s IP core XIP1113H as the underlying building block for AES-GCM. Key management (including key exchange) lies outside the scope of 802.1AE, and hence the functionality of XIP1213E is based on the assumption that key management is performed by externally to XIP1213E.
XIP1213E has been designed for easy integration with FPGA- and ASIC-based designs in a vendor-agnostic design methodology, and the functionality of XIP1213E does not rely on any FPGA manufacturer-specic features. XIP1213E has been designed for easy integration with FPGA- and ASIC-based designs in a vendor-agnostic design methodology, and the functionality of XIP1213E does not rely on any FPGA manufacturer-specic features.
View 100G MACsec AES256-GCM full description to...
- see the entire 100G MACsec AES256-GCM datasheet
- get in contact with 100G MACsec AES256-GCM Supplier
Block Diagram of the 100G MACsec AES256-GCM IP Core
