NETGEAR WG111U user manual Temporal Key Integrity Protocol Tkip

Page 77

User’s Manual for the NETGEAR Super AG Wireless USB 2.0 Adapter WG111U

Temporal Key Integrity Protocol (TKIP)

WPA uses TKIP to provide important data encryption enhancements including a per-packet key mixing function, a message integrity check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. TKIP also provides for the following:

The verification of the security configuration after the encryption keys are determined.

The synchronized changing of the unicast encryption key for each frame.

The determination of a unique starting unicast encryption key for each preshared key authentication.

Michael

With 802.11 and WEP, data integrity is provided by a 32-bit integrity check value (ICV) that is appended to the 802.11 payload and encrypted with WEP. Although the ICV is encrypted, you can use cryptanalysis to change bits in the encrypted payload and update the encrypted ICV without being detected by the receiver.

With WPA, a method known as Michael specifies a new algorithm that calculates an 8-byte message integrity code (MIC) using the calculation facilities available on existing wireless devices. The MIC is placed between the data portion of the IEEE 802.11 frame and the 4-byte ICV. The MIC field is encrypted together with the frame data and the ICV.

Michael also provides replay protection. A new frame counter in the IEEE 802.11 frame is used to prevent replay attacks.

AES Support

One of the encryption methods supported by WPA beside TKIP is the advanced encryption standard (AES), although AES support will not be required initially for Wi-Fi certification. This is viewed as the optimal choice for security conscience organizations, but the problem with AES is that it requires a fundamental redesign of the NIC’s hardware in both the station and the access point. TKIP was a pragmatic compromise that allows organizations to deploy better security while AES capable equipment is being designed, manufactured, and incrementally deployed.

Wireless Networking Basics

B-15

202-10065-01

Image 77
Contents 202-10065-01 Certificate of the Manufacturer/Importer Technical SupportFCC Requirements for Operation in the United States FCC Guidelines for Human ExposureDeclaration Of Conformity Export Restrictions Operation Using 2.4 GHz Channels in FranceMetropolitan Regions with Eased Restrictions in 2.4GHz Band Allowed 5GHz Channels in Each European Community Country Operation Using 5 GHz Channels in the European CommunityVii Viii Contents Chapter Configuration Appendix C Preparing Your Network to Work with a Router Glossary Index Chapter About This Manual Manual SpecificationsAudience, Scope, Conventions Typographical conventionsHtml version of this manual How to Use this ManualHow to Print this Manual About This Manual About the WG111U Chapter Introduction802.11a and 802.11b/g Wireless Networking Key FeaturesComparing the 802.11a, 802.11b, and 802.11g Modes Comparison of Wireless ModesWhat’s in the Box? Road Map for ‘How to Get There From Here’If I Want To? What’s Needed? What Do I Do? How Do I? Road Map for How to Get There From HereNetgear Super AG Netgear Super AG Wireless Wired network Wirelessly connect Verifying System Requirements Chapter Basic SetupWhat You Need Before You Begin Observing Location and Range Guidelines Determining Placement of the USB AdapterAttach fastener to back of plastic cradle Two Basic Operating ModesBasic Installation Instructions WG111U Default Wireless Configuration SettingsFor Windows XP Users Installing a WG111U Install the Netgear Super AG Wireless USB 2.0 Adapter WG111U Configure your WG111U Verify wireless connectivity to your network For Windows 2000, ME, and 98SE Users Installing a WG111U Found New Hardware Wizard WG111U System Tray Icon Configure your WG111U WG111U Wireless Connection Indicators LED Descriptions Interpreting the LED on the WG111UStatus LED Color Condition Description Interpreting System Tray Icon ColorsRed YellowUsing Configuration Profiles Chapter ConfigurationUnderstanding the Configuration Options Run the WG111U Smart Wireless Wizard Connecting to an Access Point in Infrastructure ModeHow to Configure an Infrastructure Mode Profile Save your settings in a Profile Configure the wireless network settingsConfigure the PC network settings Connecting to Another PC in Ad-hoc ModeHow to Configure an Ad-hoc Mode Profile Ad-Hoc Setting dialog box Ping -t 192.168.0.1 and then click OK Statistics What’s on the Statistics Page?Advanced Settings Understanding the Advanced SettingsTPC Configuration Procedure European Regulatory Requirements for Transmit Power ControlConfiguration Understanding the Security Options Chapter Wireless Security ConfigurationBasic Requirements for WEP Using WEP SecurityWEP Security Encryption Key WEP Security Settings WorksheetWireless Network Name Ssid Configure the WEP settings How to Configure WEP Encryption SecurityConfigure the Network Name Ssid settings Basic Requirements for WPA-PSK Using WPA-PSK Advanced SecurityHow to Configure WPA-PSK Advanced Security WPA-PSK Security Settings WorksheetWPA-PSK settings screen Configure the WPA-PSK settingsWireless Security Configuration Basic Tips Chapter TroubleshootingGeneral Questions Frequently Asked QuestionsAd Hoc mode is not working correctly New Hardware Wizard appears after installation has completed How to use XP’s own Wireless configuration utilityTroubleshooting USB Appendix a Technical SpecificationsTechnical Specifications Infrastructure Mode Appendix B Wireless Networking BasicsWireless Networking Overview Wireless Channels Ad Hoc Mode Peer-to-Peer WorkgroupNetwork Name Extended Service Set Identification Essid Table B-1 802.11g Radio Frequency Channels Radio frequency channels used are listed in Table B-1WEP Authentication WEP Wireless SecurityAccess point have the same WEP are described below Authentication Shared Key Steps Key Size and Configuration How to Use WEP Parameters WPA Wireless SecurityHow Does WPA Compare to WEP? How Does WPA Compare to Ieee 802.11i? What are the Key Features of WPA Security?Wireless Networking Basics Figure B-3 WPA Overview Login AuthenticationFigure B-4 802.1x Authentication Sequence WPA Data Encryption Key Management Temporal Key Integrity Protocol Tkip Changes to Wireless Access Points Supporting a Mixture of WPA and WEP Wireless ClientsIs WPA Perfect? Product Support for WPAChanges to Wireless Network Adapters WPA two-phase authenticationNew WPA information element MichaelChanges to Wireless Client Programs Appendix C Preparing Your Network to Work with a Router Computer Network Configuration RequirementsWhat You Need To Use a Router with a Broadband Modem Cabling and Computer HardwareWhere Do I Get the Internet Configuration Parameters? Internet Configuration RequirementsRecord Your Internet Connection Information Preparing Your Computers for TCP/IP Networking Installing a New Adapter Configuring Windows 95, 98, and Me for TCP/IP NetworkingInstalling or Verifying Windows Networking Components Installing the Client for Microsoft Networks Installing TCP/IPOpen the Network Panel Verify the Configuration SettingsVerifying TCP/IP Properties Selecting the Windows’ Internet Access MethodVerify the Properties IP Address Setting Configuring Windows NT4, 2000 or XP for IP Networking Dhcp Configuration of TCP/IP in Windows XP Configuring Dhcp of TCP/IP in Windows XP, 2000, or NT4Open the Network Connection Window Go to the Network Connection Status windowSet Dhcp for TCP/IP Go to PropertiesCheck the Local Area Connection Properties Settings Dhcp Configuration of TCP/IP in WindowsCheck the Internet Protocol Properties Complete the configurationGo to TCP/IP Properties Dhcp Configuration of TCP/IP in Windows NT4Set the TCP/IP Properties Verifying TCP/IP Properties for Windows XP, 2000, and NT4MacOS Configuring the Macintosh for TCP/IP NetworkingMacOS 8.6 or Verifying TCP/IP Properties for Macintosh Computers Verifying the Readiness of Your Internet AccountWhat Is Your Configuration Information? Are Login Protocols Used?Select the Gateway tab Restarting the Network Glossary Glossary-2 Glossary Glossary-3 Glossary-4 Glossary Glossary-5 Glossary-6 Numerics IndexIndex-2