Definition

TKIP (Temporal Key Integrity Protocol)

TKIP (Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.11i standard for wireless LANs (WLANs). It was designed to provide more secure encryption than the notoriously weak Wired Equivalent Privacy (WEP), the original WLAN security protocol. TKIP is the encryption method used in Wi-Fi Protected Access (WPA), which replaced WEP in WLAN products.

TKIP is a suite of algorithms that works as a "wrapper" to WEP, which allows users of legacy WLAN equipment to upgrade to TKIP without replacing hardware. TKIP uses the original WEP programming but "wraps" additional code at the beginning and end to encapsulate and modify it. Like WEP, TKIP uses the RC4 stream encryption algorithm as its basis. The new protocol, however, encrypts each data packet with a unique encryption key, and the keys are much stronger than those of its predecessor. To increase key strength, TKIP includes four additional algorithms:

 

  • A cryptographic message integrity check to protect packets
  • An initialization-vector sequencing mechanism that includes hashing, as opposed to WEP's plain text transmission
  • A per-packet key-mixing function to increase cryptographic strength
  • A re-keying mechanism to provide key generation every 10,000 packets.

While TKIP is useful for upgrading security on devices originally equipped with WEP, it does not address all of the security issues facing WLANs and may not be reliable or efficient enough for sensitive corporate and government data transmission. The 802.11i standard specifies the Advanced Encryption Standard (AES) in addition to TKIP. AES offers a higher level of security and is approved for government use, but requires a hardware upgrade for implementation. As organizations replace older wireless equipment, AES is expected to become the accepted encryption standard for WLAN security.

This was last updated in March 2006
Posted by: Margaret Rouse

Email Alerts

Register now to receive SearchMobileComputing.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More News and Tutorials

  • Rugged mobile devices must be more than durable in harsh environments

    The durability of ruggedized mobile devices is only the first consideration for mobile managers with workers who take devices into hazardous environments. Connectivity, usability and portability are also important features.

  • Mobile phone beats out smartphone as device of choice

    Mobile phones edged out smartphones as the most commonly used devices in organizations, according to SearchMobileComputing.com's recent survey, which also found that many companies support any kind of devices brought in by users.

  • Mobile data services -- getting connected

    Mobile data computing continues to grow as more service providers offer services and at increasing speeds. Different ways to connect to the mobile data network are discussed in this tip by Paul DeBeasi.

Do you have something to add to this definition? Let us know.

Send your comments to techterms@whatis.com

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: