USING THE BELKIN WIRELESS NETWORKING UTILITY
Table of Contents | section | 1 | 2 | 3 | 4 | 5 | 6 |
At the time of publication, four encryption methods are available: Encryption Methods:
Name | ||||
| Equivalent | Encryption | Protected | Protected |
| Privacy |
| Access | Access |
|
|
|
|
|
Acronym |
| |||
|
|
| (or just WPA) | (or just WPA2) |
|
|
|
|
|
Security | Good | Better | Best | Best |
|
|
|
|
|
Features | Static keys | Static keys | Dynamic key | Dynamic key |
|
|
| encryption | encryption |
|
|
| and mutual | and mutual |
|
|
| authentication | authentication |
| Encryption | Added | TKIP | AES |
| keys based | security over | (temporal | (Advanced |
| on RC4 | key integrity | Encryption | |
| algorithm | using a key | protocol) | Standard) |
| (typically | length of 104 | added so | does not |
| bits, plus 24 | that keys are | cause any | |
|
| additional | rotated and | throughput |
|
| bits of | encryption is | loss |
|
| system- | strengthened |
|
|
| generated |
|
|
|
| data |
|
|
|
|
|
|
|
WEP
WEP is a common protocol that adds security to all
64-Bit WEP
128-Bit Encryption
As a result of
All Belkin wireless products will support both
N+ Wireless USB Adapter | 28 |