User's Manual
Table Of Contents
- Reference Manual for the Model DG834GT 108 Mbps Super Wireless ADSL Router
- Contents
- Chapter 1 About This Guide
- Chapter 2 Introduction
- Chapter 3 Connecting the Router to the Internet
- What You Need Before You Begin
- Connecting the DG834GT to Your LAN
- Auto-Detecting Your Internet Connection Type
- Testing Your Internet Connection
- Manually Configuring Your Internet Connection
- Chapter 4 Wireless Configuration
- Chapter 5 Protecting Your Network
- Chapter 6 Managing Your Network
- Chapter 7 Advanced Configuration
- Chapter 8 Troubleshooting
- Appendix A Technical Specifications
- Appendix B Network and Routing Basics
- Appendix C Preparing Your Network
- Preparing Your Computers for TCP/IP Networking
- Configuring Windows 95, 98, and Me for TCP/IP Networking
- Configuring Windows NT4, 2000 or XP for IP Networking
- DHCP Configuration of TCP/IP in Windows XP, 2000, or NT4
- Configuring the Macintosh for TCP/IP Networking
- Verifying the Readiness of Your Internet Account
- Restarting the Network
- Appendix D Wireless Networking Basics
- Glossary
Reference Manual for the Model DG834GT 108 Mbps Super Wireless ADSL Router
Wireless Networking Basics D-15
August 2004
Temporal Key Integrity Protocol (TKIP)
WPA uses TKIP to provide important data encryption enhancements including a per-packet key
mixing function, a message integrity check (MIC) named Michael, an extended initialization
vector (IV) with sequencing rules, and a re-keying mechanism. TKIP also provides for the
following:
• The verification of the security configuration after the encryption keys are determined.
• The synchronized changing of the unicast encryption key for each frame.
• The determination of a unique starting unicast encryption key for each preshared key
authentication.
Michael
With 802.11 and WEP, data integrity is provided by a 32-bit integrity check value (ICV) that is
appended to the 802.11 payload and encrypted with WEP. Although the ICV is encrypted, you can
use cryptanalysis to change bits in the encrypted payload and update the encrypted ICV without
being detected by the receiver.
With WPA, a method known as Michael specifies a new algorithm that calculates an 8-byte
message integrity check (MIC) using the calculation facilities available on existing wireless
devices. The MIC is placed between the data portion of the IEEE 802.11 frame and the 4-byte ICV.
The MIC field is encrypted together with the frame data and the ICV.
Michael also provides replay protection. A new frame counter in the IEEE 802.11 frame is used to
prevent replay attacks.
Optional AES Support to be Phased In
One of the encryption methods supported by WPA, besides TKIP, is the advanced encryption
standard (AES), although AES support will not be required initially for Wi-Fi certification. This is
viewed as the optimal choice for security conscience organizations, but the problem with AES is
that it requires a fundamental redesign of the NIC’s hardware in both the station and the access
point. TKIP is a pragmatic compromise that allows organizations to deploy better security while
AES capable equipment is being designed, manufactured, and incrementally deployed.