How do TKIP and MIC perform encryption in the WPA personal security model?
What will be an ideal response?
The steps are as follows:
* Step 1-Instead of using an initialization vector and secret key as with WEP, the temporal key is XORed with the sender's MAC address to create an intermediate Value 1.
* Step 2-Value 1 is then mixed with a sequence number to produce Value 2, which is the per-packet key.Value 2 is then entered into the Pseudo-Random Number Generator (PRNG), just as with normal WEP.
* Step 3-Instead of sending the text through the CRC generator, the MIC key, sender's MAC address, and receiver's MAC address are all sent through a MIC function.This creates text with the MIC key appended.This value is then XORed with the keystream to create the ciphertext.
You might also like to view...
Which is not one of the seven main sections of a strong form?
A) heading B) footnote C) body D) signature and verification E) comments
The CPU is the part of the ALU that performs mathematical operations and makes comparisons
Indicate whether the statement is true or false
Why are keys important?
What will be an ideal response?
catch blocks are not required to contain:
a. Braces { }. b. Parentheses ( ). c. Some form of parameter type indication. d. A parameter name.