Compute Mic

Some articles on mic, compute mic:

IEEE 802.11i-2004 - Protocol Operation - The Four-Way Handshake
... The STA sends its own nonce-value (SNonce) to the AP together with a MIC, including authentication, which is really a Message Authentication and Integrity Code (MAIC) ... The AP sends the GTK and a sequence number together with another MIC. 64 bytes) 16 bytes of EAPOL-Key Confirmation Key (KCK)– Used to compute MIC on WPA EAPOL Key message 16 bytes of EAPOL-Key Encryption Key (KEK) - AP uses this key to encrypt additional data sent (in the 'Key ...