Skip to Content
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
book

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

by Jon Edney, William A. Arbaugh
July 2003
Intermediate to advanced content levelIntermediate to advanced
480 pages
12h 4m
English
Addison-Wesley Professional
Content preview from Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Chapter 11. TKIP

Chapter 11 reviews one of the new security protocols that was developed specifically for use with existing Wi-Fi equipment. We will see that the TKIP security protocol provides a huge improvement over WEP and yet is able to operate on the same type of hardware and can even be applied to many older Wi-Fi systems through firmware upgrades. We start off with an overview of what TKIP is intended to accomplish and then work through each of the functions of TKIP in detail.

What Is TKIP and Why Was It Created?

TKIP stands for Temporal Key Integrity Protocol, but that's not important right now (or probably ever). TKIP exists for one reason: to allow WEP systems to be upgraded to be secure. This is the reason TKIP was created and this requirement ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN

How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN

CCNA Lee Barken - CISSP MCP CPA
Enterprise Java™ Security: Building Secure J2EE™ Applications

Enterprise Java™ Security: Building Secure J2EE™ Applications

Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin
Wireshark for Wireless LANs

Wireshark for Wireless LANs

Jerome Henry / James Garringer

Publisher Resources

ISBN: 0321136209Purchase book