Message integrity check (mic), Temporal key integrity protocol (tki p) – Rockwell Automation 2727-T7P30D1F MobileView Tablet T750 User Manual User Manual
Page 67
![background image](/manuals/580782/67/background.png)
Publication 2727-UM001D-EN-P - March 2004
Communications Configuration 5-13
Message Integrity Check (MIC)
MIC prevents bit-flip attacks on encrypted packets. During a bit-flip
attack, an intruder intercepts an encrypted message, alters it slightly,
and retransmits it, and the receiver accepts the retransmitted message
as legitimate. The MIC adds a few bytes to each packet to make the
packets tamper-proof.
The ACU screen displays the word “(MIC)” next to the current status if
MIC is supported by the client adapter’s driver and firmware and is
enabled on the access point.
Temporal Key Integrity Protocol (TKI P)
This feature, also referred to as WEP key hashing, defends against an
attack on WEP in which the intruder uses the initialization vector (IV)
in encrypted packets to calculate the WEP key. TKIP removes the
predictability that an intruder relies on to determine the WEP key by
exploiting IVs. It protects both unicast and broadcast WEP keys.
TIP
If you enable MIC on the access point, your client
adapter’s driver must support MIC; otherwise, the
client cannot associate.
TIP
If you enable TKIP on the access point, your client
adapter’s firmware must support TKIP; otherwise,
the client cannot associate.