Description: <div style="text-align: justify;"><br>WEP (Wired Equivalent Privacy…. and also called as Worst Ever Privacy) was the only security mechanism available in original IEEE 802.11 standard. Within few days of introduction of WEP the implementation related problems in WEP algorithm surfaced and a need for new and strong wireless security standard was felt. The Temporal key Integrity Protocol (TKIP) was an interim solution developed to fix the key reuse problem of WEP. It later became a part of the 802.11i and subsequently a part of WPA standards. TKIP was implemented in such a way that it could be used on old WEP hardware devices with a simple firmware upgrade. <br><br>The small IV space (Initializing Vector) was the main problem faced by WEP. In TKIP TSC (TKIP Sequence Counter) is used as an IV. TSC is also used for finding message integrity check value which was added in TKIP protocol. <br><br>Following are the main parts of TKIP encrypted packet. <br><br>1. IEEE 802.11 Header<br>2. TSC (TKIP Sequence Counter + Key ID) <br>3. Data<br>4. MIC (Message Integrity Check – Michael)<br>5. ICV (Integrity Check Vector – Old WEP)<br>6. FCS (CRC check sum)<br><br>This video talks about the problems with WEP algorithm and the ways in which TKIP tries to solve them. This video along with the TKIP-Introduction Part II video, gives the detailed frame format. For exact encryption technique you are requested to watch more advanced videos on www.securitytube.net<br><br>The important thing to note here is TKIP is just a temporary solution for WEP hardware devices. The ultimate solution is to migrate to more secure AES algorithms like CCMP. <br><br><br><style type="text/css">body { background: #FFF; } </style> <br></div>
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.