Difficulty: Medium
Correct Answer: AES-CCMP
Explanation:
Introduction / Context:
Wi-Fi Protected Access, or WPA, was introduced to improve the security of wireless LANs beyond what WEP could provide. WPA2 is the second generation of this standard and is widely recommended as the minimum security level for modern deployments. A key part of WPA2 is the encryption and integrity suite used to protect data frames on the air. Understanding which cipher and mode belong to WPA2 is a common exam topic.
Given Data / Assumptions:
Concept / Approach:
WPA originally introduced TKIP with MIC as an improvement over WEP, but it still had limitations. WPA2 moved to a stronger and more modern cipher: the Advanced Encryption Standard in Counter Mode with Cipher Block Chaining Message Authentication Code Protocol, abbreviated AES CCMP. This combination provides both confidentiality and integrity. PSK refers to a key distribution method, not an encryption algorithm, and WEP based methods are obsolete and insecure.
Step-by-Step Solution:
Recall that WPA2 is based on the IEEE 802.11i amendment, which specifies AES CCMP as the required encryption and integrity mechanism.
Recognise that TKIP with MIC was introduced with WPA, sometimes referred to as WPA version 1, but it is not the primary suite for WPA2 and is discouraged in modern deployments.
Understand that PSK simply means pre shared key and describes how keys are managed, not how encryption itself is performed.
WEP and related phrases such as PPK via IV refer to older RC4 based methods using initialization vectors, which are vulnerable and not part of WPA2 best practice.
The only option that correctly names the WPA2 encryption suite is AES-CCMP.
Verification / Alternative check:
Reading Wi-Fi Alliance certification details and IEEE 802.11i documentation confirms that WPA2 Certified devices must support AES CCMP for robust security. Many enterprise Wi-Fi designs explicitly require WPA2 with AES, distinguishing it from older WPA with TKIP. Although some mixed mode configurations allow legacy clients, the standard expectation for WPA2 security is AES CCMP.
Why Other Options Are Wrong:
Option b, PPK via IV, is not a standard name for any WPA2 cipher suite and loosely resembles WEP concepts rather than modern AES based security.
Common Pitfalls:
Option c, PSK, is often misinterpreted as an encryption algorithm, but it only describes the use of a pre shared key for authentication in WPA or WPA2 Personal modes. Encryption is still provided by TKIP or AES underneath.
Option d, TKIP/MIC, corresponds to the cipher suite introduced with WPA version 1, not WPA2, and is considered legacy and less secure.
Option e, WEP with shared key, is the original and now deprecated wireless security method that WPA and WPA2 were designed to replace.
Common Pitfalls:
Learners sometimes mix up security mode labels in consumer Wi-Fi routers, which might display options such as WPA2 Personal (AES) or WPA/WPA2 Mixed (TKIP/AES). For exams, remember that pure WPA2 security refers to AES CCMP, and TKIP is associated with WPA. Always distinguish between key management methods like PSK and actual encryption suites like AES CCMP.
Final Answer:
WPA2 uses the AES-CCMP encryption and integrity suite to protect wireless frames.
Discussion & Comments