Sign Up
Log In
Home
discussion
Exam 200-355 Question id=2325 802.11 Technology Fundamentals

What are three primary components that describe TKIP?

A. broadcast key rotation
B. dynamic WEP
C. message integrity check
D. per-packet key hashing
E. symmetric key cipher
F. WPA2 enterprise mode

TKIP uses the same underlying mechanism as WEP, and consequently is vulnerable to a number of similar attacks. The message integrity check, per-packet key hashing, broadcast key rotation, and a sequence counter discourage many attacks. The key mixing function also eliminates the WEP key recovery attacks.