Exam 200-355 | Question id=2325 | 802.11 Technology Fundamentals |
What are three primary components that describe TKIP?
A. |
broadcast key rotation | |
B. |
dynamic WEP | |
C. |
message integrity check | |
D. |
per-packet key hashing | |
E. |
symmetric key cipher | |
F. |
WPA2 enterprise mode |
TKIP uses the same underlying mechanism as WEP, and consequently is vulnerable to a number of similar attacks. The message integrity check, per-packet key hashing, broadcast key rotation, and a sequence counter discourage many attacks. The key mixing function also eliminates the WEP key recovery attacks.