Belkin F5D8055 User Manual - Page 30

Bit WEP, Bit Encryption

Page 30 highlights

USING THE BELKIN WIRELESS NETWORKING UTILITY Table of Contents section 1 2 3 4 5 6 At the time of publication, four encryption methods are available: Encryption Methods: Name 64-bit Wired Equivalent Privacy Acronym 64-bit WEP Security Good Features Static keys Encryption keys based on RC4 algorithm (typically 40-bit keys) 128-bit Encryption Wi-Fi Protected Access Wi-Fi Protected Access 128-bit WEP WPA-TKIP/AES WPA2-AES (or just WPA) (or just WPA2) Better Best Best Static keys Dynamic key Dynamic key encryption encryption and mutual and mutual authentication authentication Added security over 64-bit WEP using a key length of 104 bits, plus 24 additional bits of systemgenerated data TKIP (temporal key integrity protocol) added so that keys are rotated and encryption is strengthened AES (Advanced Encryption Standard) does not cause any throughput loss WEP WEP is a common protocol that adds security to all Wi-Fi-compliant wireless products. WEP gives wireless networks the equivalent level of privacy protection as a comparable wired network. 64-Bit WEP 64-bit WEP was first introduced with 64-bit encryption, which includes a key length of 40 bits plus 24 additional bits of system-generated data (64 bits total). Some hardware manufacturers refer to 64-bit as 40-bit encryption. Shortly after the technology was introduced, researchers found that 64-bit encryption was too easy to decode. 128-Bit Encryption As a result of 64-bit WEP's potential security weaknesses, a more secure method of 128-bit encryption was developed. 128-bit encryption includes a key length of 104 bits plus 24 additional bits of systemgenerated data (128 bits total). Some hardware manufacturers refer to 128-bit as 104-bit encryption. Most of the new wireless equipment in the market today supports both 64-bit WEP and 128-bit WEP encryption, but you might have older equipment that only supports 64-bit WEP. All Belkin wireless products will support both 64-bit WEP and 128-bit encryption. N+ Wireless USB Adapter 28

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155

28
Table of Contents
1
2
3
6
5
N+ Wireless USB Adapter
SECTION
4
USING THE BELKIN WIRELESS NETWORKING UTILITY
Name
64-bit Wired
Equivalent
Privacy
128-bit
Encryption
Wi-Fi
Protected
Access
Wi-Fi
Protected
Access
Acronym
64-bit WEP
128-bit WEP
WPA-TKIP/AES
(or just WPA)
WPA2-AES
(or just WPA2)
Security
Good
Better
Best
Best
Features
Static keys
Static keys
Dynamic key
encryption
and mutual
authentication
Dynamic key
encryption
and mutual
authentication
Encryption
keys based
on RC4
algorithm
(typically
40-bit keys)
Added
security over
64-bit WEP
using a key
length of 104
bits, plus 24
additional
bits of
system-
generated
data
TKIP
(temporal
key integrity
protocol)
added so
that keys are
rotated and
encryption is
strengthened
AES
(Advanced
Encryption
Standard)
does not
cause any
throughput
loss
At the time of publication, four encryption methods are available:
Encryption Methods:
WEP
WEP
is a common protocol that adds security to all Wi-Fi-compliant
wireless products. WEP gives wireless networks the equivalent level of
privacy protection as a comparable wired network.
64-Bit WEP
64-bit WEP was first introduced with 64-bit encryption, which includes
a key length of 40 bits plus 24 additional bits of system-generated data
(64 bits total). Some hardware manufacturers refer to 64-bit as 40-bit
encryption. Shortly after the technology was introduced, researchers
found that 64-bit encryption was too easy to decode.
128-Bit Encryption
As a result of 64-bit WEP’s potential security weaknesses, a more
secure method of 128-bit encryption was developed. 128-bit encryption
includes a key length of 104 bits plus 24 additional bits of system-
generated data (128 bits total). Some hardware manufacturers refer to
128-bit as 104-bit encryption. Most of the new wireless equipment in the
market today supports both 64-bit WEP and 128-bit WEP encryption,
but you might have older equipment that only supports 64-bit WEP.
All Belkin wireless products will support both 64-bit WEP and 128-bit
encryption.