Using the Wireless Networking Utility from Verizon
At the time of publication, four encryption methods are available:
Encryption Methods:
Name | ||||
| Equivalent | Equivalent | Protected | |
| Privacy | Privacy |
| Access 2 |
Acronym |
| |||
|
|
| (or just WPA) | just WPA2) |
Security | Good | Better | Best | Best |
Features | Static keys | Static keys | Dynamic key | Dynamic key |
|
|
| encryption | encryption |
|
|
| and mutual | and mutual |
|
|
| authentication | authentication |
| Encryption | More secure | TKIP (Temporal | AES |
| keys based on | than | Key Integrity | (Advanced |
| RC4 algorithm | WEP using a | Protocol) added | Encryption |
| (typically | key length of | so that keys | Standard) |
| keys) | 104 bits plus | are rotated and | does not |
|
| 24 additional | encryption is | cause any |
|
| bits of system- | strengthened | throughput |
|
| generated data |
| loss |
WEP
WEP is a common protocol that adds security to all
64-Bit WEP
as
1
2
3
5 | section |
4 |
|
6
17