TKIP or CCMP (AES)
C. Replay protection: sequence numbers in packets
D. Integrity: MIC (message integrity code)
E. Robust management frame protection
F. Key management: temporal keys, master keys
PalGov © 2011 45
WPA and WPA2
- WPA:
- Uses TKIP for data protection
- Uses 802.1X/EAP for authentication
- Backward compatible with WEP hardware
- WPA2:
- Uses CCMP (AES) for data protection
- Uses 802.1X/EAP for authentication
- Not backward compatible with WEP hardware
- W