TELECOMMUNICATIONS SYSTEMS
COMMUNICATION WIRELESS COMPUTING DEVICES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
WPA2
|
|
Temporal Key Integrity Protocol (TKIP)
|
|
Cyclic Redundancy Check (CRC)
|
|
Message Integrity Check (MIC)
|
Detailed explanation-1: -TKIP is the encryption method used in Wi-Fi Protected Access (WPA), which replaced WEP in WLAN products. TKIP is a suite of algorithms that works as a “wrapper” to WEP, which allows users of legacy WLAN equipment to upgrade to TKIP without replacing hardware.
Detailed explanation-2: -TKIP was approved as a part of the Wi-Fi Protected Access (WPA) protocol. TKIP uses RC4 as well, but has several advantages over WEP-most notably, each data packet is encrypted using a different key, and instead of merely concatenating the IV and the key, TKIP combines them using a key mixing function.
Detailed explanation-3: -WEP is not secure as other encryption types such as TKIP. TKIP-Temporal Key Integrity Protocol (TKIP) uses the same encryption algorithm as WEP. However, TKIP is more secure and has an additional message integrity check (MIC).
Detailed explanation-4: -TKIP (short for Temporal Key Integrity Protocol) is an encryption method. TKIP provides per-packet key mixing a message integrity and re-keying mechanism. AES (short for Advanced Encryption Standard) is the Wi-Fi® authorized strong encryption standard.
Detailed explanation-5: -The WPA Wi-Fi protocol is more secure than WEP, because it uses a 256-bit key for encryption, which is a major upgrade from the 64-bit and 128-bit keys used by the WEP system. WPA also uses the Temporal Key Integrity Protocol (TKIP), which dynamically generates a new key for each packet, or unit of data.