Copyright © 2011 IEEE. All rights reserved. ix
Contents
1. Overview...................................................................................................................................................... 2
1.1 Introduction.............................................................................................................................. 2
1.2 Scope........................................................................................................................................ 2
2. Normative references ................................................................................................................................... 3
6. Secure provision of the MAC Service ......................................................................................................... 4
6.1 MACsec connectivity .............................................................................................................. 4
7. Principles of secure network operation........................................................................................................ 5
8. MAC Security Protocol (MACsec).............................................................................................................. 6
9. Encoding of MACsec protocol data units.................................................................................................... 7
9.8 Transmit SA status................................................................................................................... 7
10. Principle of MAC Security Entity (SecY) operation ................................................................................. 8
11. MAC Security in Systems.......................................................................................................................... 9
11.7 MACsec in Provider Bridged Networks.................................................................................. 9
14. Cipher Suites............................................................................................................................................ 10
14.1 Cipher Suite use ..................................................................................................................... 10
14.4 Cipher Suite conformance ..................................................................................................... 10
14.5 Default Cipher Suite (GCM-AES-128) ................................................................................. 11
14.6 GCM-AES-256 ...................................................................................................................... 11
Annex B (informative) Bibliography............................................................................................................. 13
Annex C (informative) MACsec Test Vectors ............................................................................................... 14
C.1 Integrity protection (54-octet frame) ..................................................................................... 15
C.2 Integrity protection (60-octet frame) ..................................................................................... 18
C.3 Integrity protection (65-octet frame) ..................................................................................... 21
C.4 Integrity protection (79-octet frame) ..................................................................................... 24
C.5 Confidentiality protection (54-octet frame)........................................................................... 27
C.6 Confidentiality protection (60-octet frame)........................................................................... 30
C.7 Confidentiality protection (61-octet frame)........................................................................... 33
C.8 Confidentiality protection (75-octet frame)........................................................................... 36
Authorized licensed use limited to: DUKE UNIVERSITY. Downloaded on May 04,2012 at 07:26:34 UTC from IEEE Xplore. Restrictions apply.