Belkin F5D9050 user manual Bit WEP, Using the Belkin Wireless Networking Utility, section

Models: F5D9050

1 44
Download 44 pages 57.81 Kb
Page 23
Image 23
64-Bit WEP

Using the Belkin Wireless Networking Utility

At the time of publication, four Encryption Methods are available: Encryption Methods:

Name

64-Bit Wired

128-Bit

Wi-Fi

Wi-Fi

 

Equivalent Privacy

Encryption

Protected

Protected

 

 

 

Access-TKIP

Access 2

 

 

 

 

 

Acronym

64-bit WEP

128-bit WEP

WPA-TKIP/

WPA2-AES (or

 

 

 

AES (or just

just WPA2)

 

 

 

WPA)

 

 

 

 

 

 

Security

Good

Better

Best

Best

 

 

 

 

 

Features

Static keys

Static keys

Dynamic key

Dynamic key

 

 

 

encryption

encryption

 

 

 

and mutual

and mutual

 

 

 

authentication

authentication

 

 

 

 

 

 

Encryption keys

More secure

TKIP

AES

 

based on RC4

than 64-bit

(Temporal

(Advanced

 

algorithm (typically

WEP using a

Key Integrity

Encryption

 

40-bit keys)

key length of

Protocol)

Standard)

 

 

104 bits plus

added so

does not

 

 

24 additional

that keys are

cause any

 

 

bits of system-

rotated and

throughput

 

 

generated data

encryption is

loss

 

 

 

strengthened

 

 

 

 

 

 

WEP

WEP is a common protocol that adds security to all Wi-Fi-compliant wireless products. WEP gives wireless networks the equivalent level of privacy protection as a comparable wired network.

64-Bit WEP

64-bit WEP was first introduced with 64-bit encryption, which includes a key length of 40 bits plus 24 additional bits of system- generated data (64 bits total). Some hardware manufacturers refer to 64-bit as 40-bit encryption. Shortly after the technology was introduced, researchers found that 64-bit encryption was too easy to decode.

1

2

3

4

5

6

section

19

Page 23
Image 23
Belkin F5D9050 user manual Bit WEP, Using the Belkin Wireless Networking Utility, section