Skip to main content

TLV-to-MUC Express: Post-quantum MACsec in VXLAN

  • Conference paper
  • First Online:
Secure IT Systems (NordSec 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12556))

Included in the following conference series:

Abstract

MACsec in VXLAN is an end-to-end security protocol for protecting Ethernet frames traveling over IP networks. It can provide a high-speed Ethernet encryption while supporting the virtualization of a large network such as data center network. Although MACsec addresses most of security threats, it is not immune against quantum attacks which are a future, yet disastrous threat against public-key cryptography in use. In this paper, we demonstrate a new solution for a MACsec protocol over VXLAN in a post-quantum setting. Instead of a standard MACsec key agreement protocol, we use an ephemeral key exchange protocol and an end-to-end authentication scheme, both of which are based on post-quantum cryptography. To measure the impact on the performance, we established a quantum-secure link between Germany and Israel using MACsec in VXLAN over public IP networks. We verified that the impact on the latency and throughput is minimal. Our experiment confirms that quantum-secure virtualized links can be already established in a long-distance without changing their infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. ADVA Optical Networking. FSP 150 ProVMe Series. https://www.adva.com/en/products/packet-edge-and-aggregation/edge-computing/fsp-150-provme-series

  2. Alagic, G., et al.: Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process, July 2020

    Google Scholar 

  3. Barker, E., Chen, L., Davis, R.: Recommendation for key-derivation methods in key-establishment schemes. NIST Special Publication 800–56C Revision 2, August 2020. https://csrc.nist.gov/publications/detail/sp/800-56c/rev-2/final

  4. Barker, W., Polk, W., Souppaya M.: Getting Ready for Post-Quantum Cryptography: Explore Challenges Associated with Adoption and Use of Post-Quantum Cryptographic Algorithms, May 2020

    Google Scholar 

  5. Bernstein, D., et al.: Classic McEliece: conservative code-based cryptography (2019). https://classic.mceliece.org/nist/mceliece-20190331.pdf

  6. Chen, C., et al.: NTRU 2019. https://ntru.org/

  7. Chen, L., et al.: Report on post-quantum cryptography, NISTIR 8105 (2016)

    Google Scholar 

  8. Cho, J., Sergeev, A.: Post-quantum MACsec key agreement for ethernet networks. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES (2020)

    Google Scholar 

  9. Cooper, D., Apon, D., Dang, Q., Davidson, M., Dworkin, M., Miller, C.: Recommendation for stateful hash-based signature schemes. Draft NIST Special Publication 800–208, December 2019. NIST.SP.800-208-draft.pdf

    Google Scholar 

  10. D’Anvers, J., Karmakar, A., Roy, S., Vercauteren, F.: SABER: Mod-LWR based KEM (2019). https://www.esat.kuleuven.be/cosic/pqcrypto/saber/index.html

  11. Ding, J., Chen, M., Petzoldt, A., Schmidt, D., Yang., B.: Rainbow (2019)

    Google Scholar 

  12. DPDK: Data plane development kit. https://www.dpdk.org

  13. GĂĽnther, F., Thomson, M., Wood, C.A.: Usage limits on AEAD algorithms, August 2020. https://www.ietf.org/id/draft-irtf-cfrg-aead-limits-00.txt

  14. Huelsing, A., Butin, D., Gazdag, S., Rijneveld, J., Mohaisen, A.: XMSS: Extended Hash-Based Signatures. Internet-Draft draft-irtf-cfrg-xmss-hash-based-signatures-12, Internet Engineering Task Force, January 2018. Work in Progress

    Google Scholar 

  15. IEEE: IEEE standard for local and metropolitan area network-bridges and bridged networks. IEEE Std 802.1Q-2018 (Revision of IEEE Std 802.1Q-2014), pp. 1–1993, July 2018

    Google Scholar 

  16. IEEE. Local and metropolitan area networks-port-based network access control. IEEE Std 802.1X-2010 (Revision of IE EE Std 802.1X-2004), pp. 1–205, February 2010

    Google Scholar 

  17. IEEE: Local and metropolitan area networks-media access control (MAC) security. 802.1AE: MAC Security (MACsec). https://1.ieee802.org/security/802-1ae/

  18. IEEE: Media access control (MAC) security amendment 1: Galois counter mode-advanced encryption standard- 256 (GCM-AES-256) cipher suite. 802.1AEbn-2011. https://1.ieee802.org/security/802-1aebn/

  19. IEEE: Media access control (MAC) security amendment 2: Extended packet numbering. 802.1AEBW-2013. https://1.ieee802.org/security/802-1aebw/

  20. KernelNewbies: 802.1AE MAC-level encryption (MACsec), Linux 4.6, May 2016

    Google Scholar 

  21. Liu, Y., Li, W.: VXLAN Security Option, May 2015. https://tools.ietf.org/html/draft-liu-nvo3-vxlan-security-option-01

  22. Luykx, A., Paterson, K.: Limits on authenticated encryption use in TLS. www.isg.rhul.ac.uk/~kp/TLS-AEbounds.pdf

  23. Lyubashevsky, V., et al.: Crystals-dilithium (2019). https://pq-crystals.org/dilithium/index.shtml

  24. McGrew, D., Curcio, M., Fluhrer, S.: Leighton-Micali Hash-Based Signatures. RFC 8554, April 2019. https://rfc-editor.org/rfc/rfc8554.txt

  25. National Security Agency: Ethernet security specification, version 0.5, October 2011

    Google Scholar 

  26. Prest, T., et al.: Falcon: Fast-Fourier lattice-based compact signatures over NTRU (2019). https://falcon-sign.info/

  27. Rescorla, E.: The transport layer security (TLS) protocol version 1.3, March 2016. Internet-Draft draft-ietf-tls-tls13-12

    Google Scholar 

  28. Schwabe, P., et al.: Crystals-kyber (2019). https://pq-crystals.org/kyber/index.shtml

  29. Steblia, D., Fluhrer, S., Gueron, S.: Hybrid key exchange in TLS 1.3, February 2020

    Google Scholar 

Download references

Acknowledgment

This research is co-funded by the Federal Ministry of Education and Research of Germany under the QuaSiModO project (Grant agreement No 16KIS1051).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joo Yeon Cho .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cho, J.Y., Sergeev, A. (2021). TLV-to-MUC Express: Post-quantum MACsec in VXLAN. In: Asplund, M., Nadjm-Tehrani, S. (eds) Secure IT Systems. NordSec 2020. Lecture Notes in Computer Science(), vol 12556. Springer, Cham. https://doi.org/10.1007/978-3-030-70852-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-70852-8_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-70851-1

  • Online ISBN: 978-3-030-70852-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics