How do TKIP and MIC perform encryption in the WPA personal security model?

What will be an ideal response?


The steps are as follows:
* Step 1-Instead of using an initialization vector and secret key as with WEP, the temporal key is XORed with the sender's MAC address to create an intermediate Value 1.
* Step 2-Value 1 is then mixed with a sequence number to produce Value 2, which is the per-packet key.Value 2 is then entered into the Pseudo-Random Number Generator (PRNG), just as with normal WEP.
* Step 3-Instead of sending the text through the CRC generator, the MIC key, sender's MAC address, and receiver's MAC address are all sent through a MIC function.This creates text with the MIC key appended.This value is then XORed with the keystream to create the ciphertext.

Computer Science & Information Technology

You might also like to view...

The body element is prohibited from having ____ as a child element, in the strict DTD.

A. img B. textarea C. input D. all the above

Computer Science & Information Technology

The highest level heading style is Heading 1.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To ensure that two hyphenated words appear on the same line, you would insert a ________ hyphen between them

A) nonbreaking B) simple C) binding D) continuous

Computer Science & Information Technology

____ firewalls can be used to perform load balancing.

A. Application gateway B. Stateful C. Stateless D. NAT

Computer Science & Information Technology