What is the size of the wrapper that TKIP places around the WEP encryption for increasing security?

Email security features

S/MIME (image: http://tinyurl.com/klayodd)

What is the size of the wrapper that TKIP places around the WEP encryption for increasing security?

S/MIME is (short for Secure/Mime) otherwise known as Secure Multi-Purpose Internet Mail Extensions is a standard that is used for public key encryption and signing of any MIME data (email messages), it allows you to do two thing, firstly it will ensure any of your email receivers that it is in fact you that is sending the messages, and secondly it will allow the possibility of sending and/or receiving of encrypted emails

Wireless Security Features

Temporal Key Integrity Protocol (TKIP) is a wireless network security protocol of IEEE 802.11. TKIP encryption is stronger than WEP, which was the first Wi-Fi security protocol. With TKIP comes the ability to increase your encryption strength, avoid collision attacks without hardware replacement, it will serve as a WEP code wrapper and also adding per-packet mixing of MAC base keys and serial numbers, it can also assign a unique 48-bit sequencing number to each packet.

Network device security features

Hub

When you are referring to a network, a hub is the most basic of the networking devices that connects multiple computers or other network devices together. Unlike a network switch or router, a network hub has no routing tables or any intelligence on where the information is supposed to be sent out to and so it just broadcasts all of the network data across each connection. The majority of hubs could identify a simple network error such as collisions, but taking all of the information and broadcasting to multiple ports can be a security risk and cause bottlenecks. In the past network hubs were popular because they were so much more cost efficient than a switch and router, but today the majority of switches cost very little more than a hub and are a much superior solution for any network.

Transmission media:Issues

Use of Shielding (image: http://tinyurl.com/kvqcfbj)

What is the size of the wrapper that TKIP places around the WEP encryption for increasing security?

Shielding (in the electrical sense) is a layer of metal between two parts of a device or system to stop stray emissions getting out or protect a sensitive circuit from unwanted external noise. Cable shielding also has the same function. The shielding encloses the signal wires within the cable and helps prevent any form of interference getting in or out. 

Personal Access control: Devices

Usernames and Passwords.

Username

Is otherwise known as an account name,login ID, user ID, username or a user nameis the name given to a user on a computer or computer network. Each username is different for the purpose of individuality, with everyone having a different username it's easier to determined what data and information belongs to what person.

Password

 Is a set of secret characters or words known only to the user and is utilized to gain access to a computer, web page, network resource, or data. Passwords help guarantee that a computer or data can only be logged on by those who have been approved the right to view or right to use them.

What is the size of the wrapper that TKIP places around the WEP encryption for increasing security?


Security control at device level: access control

Log In (image: http://tinyurl.com/oz94of8)

Otherwise commonly referred to as sign in, To Login or logon is the procedure all users must complete if they wish to gain control to a workstationnetwork, bulletin board or other service that requires permission. Most logins require that the user enter his or her username and password. The majority of the time, the user ID must be of a determined length such as eight characters and the password will have to contain at least one digit and not match a word from your natural language. It's fine if your user ID is freely known and is visible when you enter it via a keyboard or any other input device, however the password must remain unknown to others and hidden as entered.

Encrypting files for confidentiality.

The translation of data into a secret code to avoid just anyone knowing what the data is. Encryption is the most effective way to ensure your data’s security. If you would like to know what an encrypted file contains, you'd need to gain access to a secret key or password that will give you the knowledge on how to decrypt the data or information. Unencrypted data is called plain text; encrypted data is referred to as cipher text.

What is the size of the secret key used in WEP encryption?

WEP uses a shared-secret key, which is 40 bits in length. The shared-secret key is concatenated with a 24-bit initialization vector (IV) to create a 64-bit key, which is used to encrypt packets according to the RCA RC4 PRNG algorithm. The IV is a pseudo-random number, sent in the clear in the packet header.

What is the size of the initialization vector IV that WEP uses for encryption?

An Initialization vector (IV) of length 24 bits was added to these key lengths to make the WEP keys as 64 bit/ 128 bit keys.

How does TKIP improve security?

TKIP uses RC4 to perform the encryption, which is the same as WEP. A major difference from WEP, however, is that TKIP changes temporal keys every 10,000 packets. This provides a dynamic distribution method that significantly enhances the security of the network."

In which of the following attacks does an attacker crack the WEP secret key?

As an example, the initialization vector (IV) that WEP uses for encryption is 24-bit, which is quite weak and means that IVs are reused with the same key. By examining the repeating result, it was easy for attackers to crack the WEP secret key. This is known as an IV attack.