I thought the patched cowpatty could however I'll have to ask a authority on that. I do know that cowpatty broke both of the test .cap files that come with aircrack
I would assume that one of those is TKIP.
r00t@infected ~/aircrack-svn/test $ aircrack-ng *cap
Read 40 packets.
# BSSID ESSID Encryption
1 00:14:6C:7E:40:80 Harkonen WPA (1 handshake)
2 00:0D:93:EB:B0:8C test WPA (1 handshake)
Index number of target network ?
I just got done writing a little bash script to group all my word list and pyrit stuff together. Its pretty cool.