<P> An attacker already has access to the entire ciphertext packet . Upon retrieving the entire plaintext of the same packet, the attacker has access to the keystream of the packet, as well as the MIC code of the session . Using this information the attacker can construct a new packet and transmit it on the network . To circumvent the WPA implemented replay protection, the attacks use QoS channels to transmit these newly constructed packets . An attacker able to transmit these packets may be able to implement any number of attacks, including ARP poisoning attacks, denial of service, and other similar attacks, with no need of being associated with the network . </P> <P> A group of security researchers at the Information Security Group at Royal Holloway, University of London reported a theoretical attack on TKIP which exploits the underlying RC4 encryption mechanism . TKIP uses a similar key structure to WEP with the low 16 - bit value of a sequence counter (used to prevent replay attacks) being expanded into the 24 - bit "IV", and this sequence counter always increment on every new packet . An attacker can use this key structure to improve existing attacks on RC4 . In particular, if the same data is encrypted multiple times, an attacker can learn this information from only 2 connections . While they claim that this attack is on the verge of practicality, only simulations were performed, and the attack has not been demonstrated in practice . </P> <P> ZDNet reported on June 18, 2010 that WEP & TKIP would soon be disallowed on Wi - Fi devices by the Wi - Fi alliance . However, a survey in 2013 showed that it was still in widespread use . </P>

Which of the following wireless security protocols uses tkip