header bg

Scan QR code or get instant email to install app

Question:

Which wireless protocol does WPA utilize to make up for WEP's weak encryption?

A TKIP
explanation

WPA (Wi-Fi Protected Access) uses the encryption protocol Temporal Key Integrity Protocol (TKIP) for wireless connections. By generating an unique key for each data frame, it was meant to replace WEP's weak encryption. Since then, it has been the target of wireless attacks, and large business does not accept it. Devices from different LANs can virtually connect and act as though they are connected to the same physical network, creating a VLAN (virtual LAN). A VPN (virtual private network) is similar since it uses encryption protocols to create a private tunnel via a public network. Someone working remotely might use a VPN to access a company server. The Advanced Encryption Standard (AES) is TKIP's successor. AES and TKIP work together in WPA2 (WPA, version 2).

Related Information