MACsec Explained: From A to Z
From A to Z, learn everything you need to know about Media Access Control Security (also known as MACsec).
For end-to-end security of data, it needs to be secured when at rest (processed or stored in a device) and when in motion (communicated between connected devices). For data at rest, a hardware root of trust anchored in silicon provides the foundation upon which all data security is built. Similarly, for data in motion, security anchored in hardware at the foundational communication layer provides that basis of trust, and that’s where MACsec enters the picture.
To read the full article, click here
Related Semiconductor IP
- MACsec Protocol Engine for 1G/10G+ Ethernet
- HPC MACsec Security Modules for Ethernet
- ASIL B / ISO 26262 and ISO 21434 Compliant 1G-25G MACsec Security Module
- P1619 / 802.1ae (MACSec) GCM/XTS/CBC-AES Core
- 1.6T/3.2T Multi-Channel MACsec Engine with TDM Interface (MACsec-IP-364)
Related Blogs
- Rambus CXL IP: A Journey from Spec to Compliance
- Rambus CXL IP: A Journey from Spec to Compliance
- JESD204 Frame Mapping explained from converter samples to lanes
- Three Smart Steps to Quickly Test a Register Map for Your Entire SoC
Latest Blogs
- Inside the SiFive Performance™ P570 Gen 3: High Performance Efficiency for Next-Generation Consumer and Commercial Applications
- What the steam engine can teach us about modern chip design
- Automotive silicon in the era of AI, functional safety, and cybersecurity
- JPEG XS Officially Joins GenICam, The Machine Vision Standard Managed By EMVA
- Beyond PCIe Compliance: Why Stress Testing Is Crucial for Edge AI Deployments