MACsec - IPsec - E2E Encryption

End to End encryption is popular among audience, is it not? It happens at application layer(TCP/IP L5). Cryptography in networking has overhead of meta data in the form of frame/packet headers. It can be costly and reduce throughput in network specifically when E2E cryptography, IPsec and MACsec coming into picture together. IPsec protocol is designed to function at l3 whereas MACsec exist at l2/l1 layer. When cryptography is enabled at all these three layers one can assume how much overhead of headers/meta data(E2E meta data, IPsec header, MACsec header) can impact throughput in network. Is it really worth to have E2E encrypted data or MACsec/IPsec can be skipped, which one you will prefer to skip to enhance your network throughput ??

Currently E2E cryptography is consuming cpu cycles to encrypt/decrypt data, not done via HW crypto engine to offload CPU, so you need good enough high processing CPU/processor in your device/system to achieve E2E cryptography without impacting system resiliency and performance by big number.

IPsec(tunnel and transport mode) functionality can be achieved via CPU or HW crypto engine. Nowadays crypto engine is not costly, its foot print is small, one can afford it. IPsec works at l3, most vulnerable layer to attack, most critical layer for security.

MACsec IP can be part of network PHY, there are many MACsec capable PHY is available in market by many vendors like BRCM, Aquantia, etc, even MACsec IP can sit within Packet forwarding engine(PFE). Basically point is MACsec encryption/decryption does not need CPU cycles and not impacting system performance. MACsec works at l1/l2, makes your internal network secure.

I would compromise with layer 5 security/cryptography and select IPsec and MACsec to achieve better throughput(at least l5 layer overhead would be reduced), however if cost is impacting my budget then E2E cryptography might be better solution(skipping IPSec & MACsec). In later case I do not need fund for separate crypto engine and MACsec engine(obviously I would not use cpu cycles for IPsec and MACsec feature).

I think MACsec + IPsec would be deadly combination for hackers and ethical crackers as well(cpu cycles would also be saved, it matters on loaded system).

Hopefully I am making relevant conclusion, appreciate expert comments on it.

To view or add a comment, sign in

More articles by Amit Gupta

  • Storage Media Selection

    Storage media performance impact system performance in various aspects including system boot time. In embedded system…

  • Linux key input subsystem and its use in IOT.

    Hi All, Most of the IOT based Platform used Linux input event framework to send critical information (e.g.

  • Nand v/s SPI Nor Boot:

    Hi All, In this post, I am going to discuss about the confusion lie, in most of the developer’s mind, between Nand and…

    3 Comments
  • Ethernet Card Autonegotiation feature:

    Hi Guys, I know there is always confusion among NIC device driver developers and testers about some relevant…

  • Network Interface MTU:

    Hi, What do you think whether Maximum transmit unit(MTU) is TCP/IP stack software feature or hardware(NIC) feature? I…

Others also viewed

Explore content categories