HP Deskjet 6800 series printer
Encryption type | Description | Benefits | Limitations | |
|
|
| All devices must | |
|
|
| have the key. | |
| Devices on a |
| The WEP key does | |
WEP | network share a | Simplest strategy | not change | |
password, called a | that provides | automatically. | ||
encryption | ||||
WEP key to encode | encryption. | WEP encryption | ||
| ||||
| and decode data. |
| ||
|
| provides less | ||
|
|
| ||
|
|
| security than both | |
|
|
| AES or TKIP. | |
|
|
|
| |
| Advanced |
|
| |
| Encryption Standard |
|
| |
| (AES) is a U.S. |
|
| |
| government |
|
| |
| sponsored |
|
| |
| encryption method |
|
| |
| that uses a complex | Since the |
| |
| algorithm called | encryption key |
| |
| Rijndael. | changes |
| |
AES | AES uses | automatically, the | All devices must | |
data is more difficult | ||||
| encryption keys to | have the key. | ||
| encode data. AES | for eavesdroppers |
| |
| to decode. |
| ||
| automatically |
| ||
|
|
| ||
| changes the |
|
| |
| encryption keys |
|
| |
| after a certain time |
|
| |
| interval, thus making |
|
| |
| the wireless network |
|
| |
| less vulnerable to |
|
| |
| eavesdropping. |
|
| |
|
|
|
| |
| Temporal Key |
|
| |
| Integrity Protocol |
|
| |
| (TKIP) uses |
|
| |
| encryption keys to | Since the |
| |
| encode data. TKIP | encryption key |
| |
| automatically | changes | All devices must | |
TKIP | changes the | automatically, the | ||
have the key. | ||||
| encryption keys | data is more difficult | ||
| after a certain time | for eavesdroppers |
| |
| interval, thus making | to decode. |
| |
| the wireless network |
|
| |
| less vulnerable to |
|
| |
| eavesdropping. |
|
| |
|
|
|
|
28