ITWissen.info - Tech know how online

temporal key (TK)

The WLAN standard IEEE 802.11i deals with WLAN security. The corresponding specifications describe the generation of a temporary key

(TK), which is used in the authentication protocol. The Temporal Key is derived from the Pairwise Master

Key(PMK) and is used in the Temporal Key Integrity Protocol (TKIP) or in the Counter Mode with CBC-MAC Protocol (CCMP) for encryption

on thelink layer

. Temporal keys only remain on the WLAN station as long as it is connected to the access point.

As soon as the connection is interrupted, it deletes the TC keys and all associated keys.

Informationen zum Artikel
Englisch: temporal key - TK
Updated at: 31.05.2014
#Words: 100
Links:
Translations: DE