When a wireless client uses WPA2 AES, which keys are created at the end of the four-way handshake process between the client and the access point?

When a wireless client uses WPA2 AES, which keys are created at the end of the four-way handshake process between the client and the access point?
A. AES key, TKIP key, WEP key
B. AES key, WPA2 key, PMK
C. KCK, KEK, TK
D. KCK, KEK, MIC key

cisco-exams

5 thoughts on “When a wireless client uses WPA2 AES, which keys are created at the end of the four-way handshake process between the client and the access point?

  1. That’s correct:-

    Fourth, PTK will be divided into three keys as shown in
    Figure 2 where :
    • Key Confirmation Key (KCK 128 bits) which is used
    to provide data integrity in the four-way handshaking
    communication.
    • Key Encryption Key (KEK 128 bits) which is used to
    protect the four-way handshaking communication.
    • Temporal Key (TK 128 bits) is used to protect wireless
    data.

    http://www.eecs.ucf.edu/~jinyier/papers/MILCOM15.pdf

  2. C is correct because the PTK has three component keys “KCK, KEK, TK”. Search that on google images to look that.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.