What are the main characteristics of the Temporal Key Integrity Protocol (TKIP)?
What will be an ideal response?
WPA replaces WEP with an encryption technology called Temporal Key Integrity Protocol (TKIP). WEP uses a 40-bit encryption key and does not change.TKIP has several advantages over WEP. First, it uses a longer 128-bit key. Also, TKIP keys are known as per-packet keys. This means that TKIP dynamically generates a new key for each packet that is created. Per-packet keys prevent collisions, which was one of the primary weaknesses of WEP.When coupled with IEEE 802.1x,TKIP provides an even greater level of security. After accepting a device's credentials, the authentication server can use 802.1x to produce a unique master key for that user session. TKIP distributes the key to the wireless device and AP, setting up an automated key hierarchy and management system. TKIP then dynamically generates unique keys to encrypt every data packet that is wirelessly communicated during a session.
You might also like to view...
Which type of search filter finds files that contain an exact phrase?
A) BUT B) quotes C) exactly D) AND
Explain the advantages of including a transaction server in the architecture of a transaction processing system.
What will be an ideal response?