Using the Wireless Networking Utility from Verizon
Wired Equivalent Privacy (WEP) is a less secure, but more
widely adopted wireless security protocol. Depending on the security level (64- or
Wireless Protected Access (WPA) is the new standard in
the wireless security. However, not all wireless cards and adapters support this technology. Please check your wireless adapter’s user manual to check if it supports WPA. Instead of a hex key, WPA uses only passphrases, which are much easier to remember.
The following section, intended for the home, home office, and small office user, presents a few different ways to maximize the security of your wireless network.
At the time of publication, four encryption methods are available:
Encryption Methods:
Name | ||||
| Equivalent | Equivalent | Protected | Access 2 |
| Privacy | Privacy |
| |
Acronym | ||||
|
|
| AES (or just | just WPA2) |
|
|
| WPA) |
|
Security | Good | Better | Best | Best |
Features | Static keys | Static keys | Dynamic key | Dynamic key |
|
|
| encryption | encryption |
|
|
| and mutual | and mutual |
|
|
| authentication | authentication |
| Encryption | More secure than | TKIP | AES (Advanced |
| keys based on | (Temporal | Encryption | |
| RC4 algorithm | a key length of | Key Integrity | Standard) does |
| (typically | 104 bits plus | Protocol) | not cause any |
| keys) | 24 additional | added so | throughput loss |
|
| bits of system- | that keys are |
|
|
| generated data | rotated and |
|
|
|
| encryption is |
|
|
|
| strengthened |
|
Wired Equivalent Privacy (WEP)
WEP is a common protocol that adds security to all
1
2
3
5 | section |
4 |
|
6
17