How do TKIP and MIC perform encryption in the WPA personal security model?
What will be an ideal response?
The steps are as follows:
* Step 1-Instead of using an initialization vector and secret key as with WEP, the temporal key is XORed with the sender's MAC address to create an intermediate Value 1.
* Step 2-Value 1 is then mixed with a sequence number to produce Value 2, which is the per-packet key.Value 2 is then entered into the Pseudo-Random Number Generator (PRNG), just as with normal WEP.
* Step 3-Instead of sending the text through the CRC generator, the MIC key, sender's MAC address, and receiver's MAC address are all sent through a MIC function.This creates text with the MIC key appended.This value is then XORed with the keystream to create the ciphertext.
You might also like to view...
The body element is prohibited from having ____ as a child element, in the strict DTD.
A. img B. textarea C. input D. all the above
The highest level heading style is Heading 1.?
Answer the following statement true (T) or false (F)
To ensure that two hyphenated words appear on the same line, you would insert a ________ hyphen between them
A) nonbreaking B) simple C) binding D) continuous
____ firewalls can be used to perform load balancing.
A. Application gateway B. Stateful C. Stateless D. NAT