COMPUTER NETWORKING

WIRELESS NETWORKS AND MOBILE IP

WIRELESS NETWORKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is called:
A
PEAP
B
TKIP
C
CCMP
D
WPA2
Explanation: 

Detailed explanation-1: -TKIP (short for Temporal Key Integrity Protocol) is an encryption method. TKIP provides per-packet key mixing a message integrity and re-keying mechanism. AES (short for Advanced Encryption Standard) is the Wi-FiĀ® authorized strong encryption standard.

Detailed explanation-2: -Explanation. To strengthen WEP encryption, a Temporal Key Integrity Protocol (TKIP) was employed. This placed a 128-bit wrapper around the WEP encryption with a key that is based on things such as the MAC address of the destination device and the serial number of the packet.

Detailed explanation-3: -TKIP was approved as a part of the Wi-Fi Protected Access (WPA) protocol. TKIP uses RC4 as well, but has several advantages over WEP-most notably, each data packet is encrypted using a different key, and instead of merely concatenating the IV and the key, TKIP combines them using a key mixing function.

There is 1 question to complete.