FUNDAMENTALS OF COMPUTER

TELECOMMUNICATIONS SYSTEMS

COMMUNICATION WIRELESS COMPUTING DEVICES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
WPA replaces WEP with ____
A
WPA2
B
Temporal Key Integrity Protocol (TKIP)
C
Cyclic Redundancy Check (CRC)
D
Message Integrity Check (MIC)
Explanation: 

Detailed explanation-1: -TKIP is the encryption method used in Wi-Fi Protected Access (WPA), which replaced WEP in WLAN products. TKIP is a suite of algorithms that works as a “wrapper” to WEP, which allows users of legacy WLAN equipment to upgrade to TKIP without replacing hardware.

Detailed explanation-2: -TKIP was approved as a part of the Wi-Fi Protected Access (WPA) protocol. TKIP uses RC4 as well, but has several advantages over WEP-most notably, each data packet is encrypted using a different key, and instead of merely concatenating the IV and the key, TKIP combines them using a key mixing function.

Detailed explanation-3: -WEP is not secure as other encryption types such as TKIP. TKIP-Temporal Key Integrity Protocol (TKIP) uses the same encryption algorithm as WEP. However, TKIP is more secure and has an additional message integrity check (MIC).

Detailed explanation-4: -TKIP (short for Temporal Key Integrity Protocol) is an encryption method. TKIP provides per-packet key mixing a message integrity and re-keying mechanism. AES (short for Advanced Encryption Standard) is the Wi-Fi® authorized strong encryption standard.

Detailed explanation-5: -The WPA Wi-Fi protocol is more secure than WEP, because it uses a 256-bit key for encryption, which is a major upgrade from the 64-bit and 128-bit keys used by the WEP system. WPA also uses the Temporal Key Integrity Protocol (TKIP), which dynamically generates a new key for each packet, or unit of data.

There is 1 question to complete.