MACsec Explained: From A to Z
From A to Z, learn everything you need to know about Media Access Control Security (also known as MACsec).
For end-to-end security of data, it needs to be secured when at rest (processed or stored in a device) and when in motion (communicated between connected devices). For data at rest, a hardware root of trust anchored in silicon provides the foundation upon which all data security is built. Similarly, for data in motion, security anchored in hardware at the foundational communication layer provides that basis of trust, and that’s where MACsec enters the picture.
To read the full article, click here
Related Semiconductor IP
- P1619 / 802.1ae (MACSec) GCM/XTS/CBC-AES Core
- 1.6T/3.2T Multi-Channel MACsec Engine with TDM Interface (MACsec-IP-364)
- MSP7-32 MACsec IP core for FPGA or ASIC
- 100G / 200G / 400G / 800G / 1.6T MACsec
- HPC MACsec Security Modules for Ethernet
Related Blogs
- Rambus CXL IP: A Journey from Spec to Compliance
- Rambus CXL IP: A Journey from Spec to Compliance
- JESD204 Frame Mapping explained from converter samples to lanes
- Why Aerospace Semiconductor Designers Are Taking a Page from Their Automotive Friends
Latest Blogs
- Leadership in CAN XL strengthens Bosch’s position in vehicle communication
- Validating UPLI Protocol Across Topologies with Cadence UALink VIP
- Cadence Tapes Out 32GT/s UCIe IP Subsystem on Samsung 4nm Technology
- LPDDR6 vs. LPDDR5 and LPDDR5X: What’s the Difference?
- DEEPX, Rambus, and Samsung Foundry Collaborate to Enable Efficient Edge Inferencing Applications