2021
DOI: 10.13052/jcsm2245-1439.1016
|View full text |Cite
|
Sign up to set email alerts
|

Post-quantum MACsec in Ethernet Networks

Abstract: The demand on MACsec in Ethernet is increasing substantially since MACsec fits well for industrial applications which require strong security as well as efficiency. To provide a long-term security, the MACsec protocol should be resistant to future attacks including quantum attacks. In this paper, MACsec is analysed under a quantum attack scenario. To achieve 128-bit quantum security, AES (Advanced Encryption Standard) algorithms defined in MACsec should mandate to use 256-bit keys. On the other hand, classical… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 11 publications
(14 reference statements)
0
1
0
Order By: Relevance
“…A significant body of research has been dedicated to the augmentation of network security infrastructure with PQC capabilities, including X.509 certificates [18][19][20][21][22], Media Access Control security (MACsec) [23], Internet Protocol Security (IPSec) [24,25], Transport Layer Security (TLS) [26][27][28][29][30][31][32][33][34][35][36], Secure Shell (SSH) [32,37], and WireGuard [38][39][40]. In addition, PQC algorithms have been implemented in devices as part of their secure boot capability [41,42].…”
Section: Device Security and Spdmmentioning
confidence: 99%
“…A significant body of research has been dedicated to the augmentation of network security infrastructure with PQC capabilities, including X.509 certificates [18][19][20][21][22], Media Access Control security (MACsec) [23], Internet Protocol Security (IPSec) [24,25], Transport Layer Security (TLS) [26][27][28][29][30][31][32][33][34][35][36], Secure Shell (SSH) [32,37], and WireGuard [38][39][40]. In addition, PQC algorithms have been implemented in devices as part of their secure boot capability [41,42].…”
Section: Device Security and Spdmmentioning
confidence: 99%