How does TKIP provide encapsulation?
What will be an ideal response?
TKIP provides encapsulation, which enhances the WEP encapsulation technique without requiring hardware changes. It uses three distinct keys: two integrity keys and an encryption key. Validation checks are performed on the frames as they are unencapsulated. For example, if a violation of proper frame sequencing is detected, the frame is discarded. Also, for each frame, the MIC is recomputed and compared with the MIC transmitted in the packet; if these do not match, the frame is discarded and TKIP countermeasures are invoked
You might also like to view...
A value or expression that can be evaluated as true or false is called a:
A) comparison operator. B) data bar. C) logical test. D) conditional format.
When you enter a domain name, a(n) ____________________ translates the domain name to its associated IP address so data can be routed to the correct computer.
Fill in the blank(s) with the appropriate word(s).