| Exam 200-355 | Question id=2325 | 802.11 Technology Fundamentals | 
        What are three primary components that describe TKIP?
      
| A. | broadcast key rotation | |
| B. | dynamic WEP | |
| C. | message integrity check | |
| D. | per-packet key hashing | |
| E. | symmetric key cipher | |
| F. | WPA2 enterprise mode | 
TKIP uses the same underlying mechanism as WEP, and consequently is vulnerable to a number of similar attacks. The message integrity check, per-packet key hashing, broadcast key rotation, and a sequence counter discourage many attacks. The key mixing function also eliminates the WEP key recovery attacks.