What are the TKIP major components?

What will be an ideal response?


TKIP has three major components to address vulnerabilities:
* MIC-MIC protects against forgeries by ensuring that the message has not been tampered with, which CRC under WEP could not do.The original WEP design used a 24-bit initialization vector (IV) along with a secret key to generate a keystream.TKIP creates a different key for each packet.
* IV sequence-TKIP reuses the WEP IV field as a sequence number for each packet. Both the transmitter and receiver initialize the packet sequence space to zero whenever new TKIP keys are set, and the transmitter increments the sequence number with each packet it sends.This ensures that an attacker does not record a valid packet and then retransmit it. Also, the length of the sequence number (IV) has been doubled, from 24 bits to 48 bits.
* TKIP key mixing-WEP constructs a per-packet RC4 key by concatenating a key and the packet IV. The new per-packet key construction, called the TKIP key mixing function, substitutes a temporary (temporal) key for the WEP base key and constructs a per-packet key that changes with each packet. Temporal keys have a fixed lifetime and are replaced frequently.

Computer Science & Information Technology

You might also like to view...

In all but very rare cases, loops must contain, within themselves

a. nested loops b. a way to terminate c. arithmetic operators d. nested decision strucures

Computer Science & Information Technology

Which additional software repository is the largest external repository for openSUSE?

A. NON-OSS B. nVidia drivers C. VideoLan Client D. Packman

Computer Science & Information Technology

Which wildcard symbol is a substitute for one or more characters?

A. ? B. * C. # D. @

Computer Science & Information Technology

Which of the following statements about multiway selection is true?

A. Multiway selection is implemented using conditional expressions. B. Multiway selection expressions must evaluate to a Boolean value. C. Multiway selection expressions must evaluate to an integral value. D. Multiway selection chooses among several alternatives.

Computer Science & Information Technology