How do TKIP and MIC perform encryption in the WPA personal security model?

What will be an ideal response?


The steps are as follows:
* Step 1-Instead of using an initialization vector and secret key as with WEP, the temporal key is XORed with the sender's MAC address to create an intermediate Value 1.
* Step 2-Value 1 is then mixed with a sequence number to produce Value 2, which is the per-packet key.Value 2 is then entered into the Pseudo-Random Number Generator (PRNG), just as with normal WEP.
* Step 3-Instead of sending the text through the CRC generator, the MIC key, sender's MAC address, and receiver's MAC address are all sent through a MIC function.This creates text with the MIC key appended.This value is then XORed with the keystream to create the ciphertext.

Computer Science & Information Technology

You might also like to view...

Which is not one of the seven main sections of a strong form?

A) heading B) footnote C) body D) signature and verification E) comments

Computer Science & Information Technology

The CPU is the part of the ALU that performs mathematical operations and makes comparisons

Indicate whether the statement is true or false

Computer Science & Information Technology

Why are keys important?

What will be an ideal response?

Computer Science & Information Technology

catch blocks are not required to contain:

a. Braces { }. b. Parentheses ( ). c. Some form of parameter type indication. d. A parameter name.

Computer Science & Information Technology