User's Manual
Table Of Contents
- User’s Manual for the NETGEAR Super AG Wireless USB 2.0 Adapter WG111U
- Technical Support
- Statement of Conditions
- FCC Information to User
- Regulatory Compliance Information
- Export Restrictions
- Europe - EU Declaration of Conformity
- Requirements For Operation in the European Community
- Canadian Department of Communications Radio Interference Regulations
- Chapter 1 About This Manual
- Chapter 2 Introduction
- Chapter 3 Basic Setup
- Chapter 4 Configuration
- Chapter 5 Wireless Security Configuration
- Chapter 6 Troubleshooting
- Basic Tips
- Frequently Asked Questions
- General Questions
- Why do I see no more than 54 Mbps on the Configuration Utility status line?
- The WG111U Smart Configuration Utility keeps asking me to save my settings
- Ad Hoc mode is not working correctly
- How to know if the WG111U card has received a valid IP address
- How to use XP’s own Wireless configuration utility
- I cannot connect to the AP that I want from the Networks browser list
- New Hardware Wizard appears after installation has completed
- How to get a PDF copy of the Manual
- General Questions
- Appendix A Technical Specifications
- Appendix B Wireless Networking Basics
- What You Need To Use a Router with a Broadband Modem
- Preparing Your Computers for TCP/IP Networking
- Configuring Windows 95, 98, and Me for TCP/IP Networking
- Configuring Windows NT4, 2000 or XP for IP Networking
- Configuring the Macintosh for TCP/IP Networking
- Verifying the Readiness of Your Internet Account
- Restarting the Network
- Glossary
- Index
User’s Manual for the NETGEAR Super AG Wireless USB 2.0 Adapter WG111U
Wireless Networking Basics B-15
202-10065-01
Temporal Key Integrity Protocol (TKIP)
WPA uses TKIP to provide important data encryption enhancements including a per-packet key
mixing function, a message integrity check (MIC) named Michael, an extended initialization
vector (IV) with sequencing rules, and a re-keying mechanism. TKIP also provides for the
following:
• The verification of the security configuration after the encryption keys are determined.
• The synchronized changing of the unicast encryption key for each frame.
• The determination of a unique starting unicast encryption key for each preshared key
authentication.
Michael
With 802.11 and WEP, data integrity is provided by a 32-bit integrity check value (ICV) that is
appended to the 802.11 payload and encrypted with WEP. Although the ICV is encrypted, you can
use cryptanalysis to change bits in the encrypted payload and update the encrypted ICV without
being detected by the receiver.
With WPA, a method known as Michael specifies a new algorithm that calculates an 8-byte
message integrity code (MIC) using the calculation facilities available on existing wireless
devices. The MIC is placed between the data portion of the IEEE 802.11 frame and the 4-byte ICV.
The MIC field is encrypted together with the frame data and the ICV.
Michael also provides replay protection. A new frame counter in the IEEE 802.11 frame is used to
prevent replay attacks.
AES Support
One of the encryption methods supported by WPA beside TKIP is the advanced encryption
standard (AES), although AES support will not be required initially for Wi-Fi certification. This is
viewed as the optimal choice for security conscience organizations, but the problem with AES is
that it requires a fundamental redesign of the NIC’s hardware in both the station and the access
point. TKIP was a pragmatic compromise that allows organizations to deploy better security while
AES capable equipment is being designed, manufactured, and incrementally deployed.










