Belkin F5D7050_v3 User Manual - Page 25

Wired Equivalent Privacy WEP, Wireless Protected Access WPA

Page 25 highlights

section Using the Belkin Wireless Networking Utility Wired Equivalent Privacy (WEP) is a less secure, but more 1 widely adopted, wireless security protocol. Depending on the security level (64- or 128-bit), the user will be asked to input a 10- or 2 26-character hex key. A hex key is a combination of letters, a-f, and numbers, 0-9. 3 Wireless Protected Access (WPA) is the new standard in the wireless security. However, not all wireless cards and adapters support 4 this technology. Please check your wireless adapter's user manual to check if it supports WPA. Instead of a hex key, WPA uses only passphrases, which are much easier to remember. 5 The following section, intended for the home, home-office, and small- office user, presents a few different ways to maximize the security of 6 your wireless network. At the time of publication, four encryption methods are available: 7 Encryption Methods: Name Acronym Security Features 64-Bit Wired Equivalent Privacy 128-Bit Wired Equivalent Privacy Wi-Fi Protected Access-TKIP Wi-Fi Protected Access 2 64-bit WEP Good Static keys 128-bit WEP Better Static keys WPA-TKIP/ AES (or just WPA) Best Dynamic key encryption and mutual authentication WPA2-AES (or just WPA2) Best Dynamic key encryption and mutual authentication Encryption keys based on RC4 algorithm (typically 40-bit keys) More secure than 64-bit WEP using a key length of 104 bits plus 24 additional bits of systemgenerated data TKIP (Temporal Key Integrity Protocol) added so that keys are rotated and encryption is strengthened AES (Advanced Encryption Standard) does not cause any throughput loss 23

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50

23
Using the Belkin Wireless Networking Utility
section
1
2
3
4
5
6
7
Wired Equivalent Privacy (WEP)
is a less secure, but more
widely adopted, wireless security protocol° Depending on the
security level (64- or 128-bit), the user will be asked to input a 10- or
26-character hex key. A hex key is a combination of letters, a–f, and
numbers, 0–9.
Wireless Protected Access (WPA)
is the new standard in the
wireless security° However, not all wireless cards and adapters support
this technology° Please check your wireless adapter’s user manual
to check if it supports WPA° Instead of a hex key, WPA uses only
passphrases, which are much easier to remember°
The following section, intended for the home, home-office, and small-
office user, presents a few different ways to maximize the security of
your wireless network°
At the time of publication, four encryption methods are available:
Encryption Methods:
Name
64-Bit Wired
Equivalent Privacy
128-Bit Wired
Equivalent
Privacy
Wi-Fi
Protected
Access-TKIP
Wi-Fi
Protected
Access 2
Acronym
64-bit WEP
128-bit WEP
WPA-TKIP/
AES (or just
WPA)
WPA2-AES (or
just WPA2)
Security
Good
Better
Best
Best
Features
Static keys
Static keys
Dynamic key
encryption
and mutual
authentication
Dynamic key
encryption
and mutual
authentication
Encryption keys
based on RC4
algorithm (typically
40-bit keys)
More secure
than 64-bit
WEP using a
key length of
104 bits plus
24 additional
bits of system-
generated data
TKIP
(Temporal
Key Integrity
Protocol)
added so
that keys are
rotated and
encryption is
strengthened
AES
(Advanced
Encryption
Standard)
does not
cause any
throughput
loss