Hello, everyone!
Today, I would like to share with you an article on the Integrity in wireless communications.
Prerequisite * BSS in Wireless Communication
The correctness of communications delivered via a wireless network or the internet is referred to as integrity. The original 802.11 wireless network standard only offers the WEP mechanism for safeguarding data sent over the network.
Types of Integrity Method :
There are three methods for ensuring integrity:
Temporal Key Integrity Protocol (TKIP)
Counter CBC-MAC Protocol (CCMP)
Galois Counter Mode Protocol (GCMP)
The following are the explanations.
1. Temporal Key Integrity Protocol (TKIP)
WEP, which was utilized for authentication in wireless communication security, was subsequently discovered to be susceptible. Following the discovery of WEP's vulnerability, TKIP was proposed. It was created in 2002 by the WiFi Alliance and has a key size of 128 bits. Each frame is encrypted using the RC4 cipher technique.
Underneath the fundamental WEP encryption, it adds the following security enhancements.
Time Stamp
TKIP Sequence Counter
Sender’s MAC Address
Message Integrity Check (MIC)
Key mixing algo
For a long period, TKIP was utilized as an Integrity technique until some attackers were discovered who could exploit it. Actually, TKIP is no longer recommended after the change of 802.11 specifications in 2012, known as 802.11-2012.
2. Counter CBC-MAC Protocol (CCMP)
The Counter CBC-MAC Protocol was created as a more secure Integrity mechanism than TKIP.
It is made up of two algorithms:
AES counter mode encryption
Cipher Block Chaining Message Authentication Code (CBC-MAC) to ensure the integrity of the message
The Advanced Encryption Standard (AES) is currently the most powerful encryption algorithm available. Because it is open and publicly available, it is widely used by security specialists all around the world. The only snag with CCMP is that it requires both clients and access points to have supported hardware. WPA2 is a WiFi security protocol that uses CCMP.
3. Galois Counter Mode Protocol (GCMP)
The Galois Counter Mode Protocol, abbreviated as GCMP, is a more secure and efficient authenticating encryption mechanism than CCMP.
GCMP is made up of two algorithms:
AES counter mode encryption like CCMP.
Galois Message Authentication Code, to ensure the integrity of the message
WPA3 is a WiFi security standard that uses GCMP.
You are welcome to like and exchange in the comment area. Stay safe and Thank you!





