Belkin F5D9050 User Manual - Page 23
At the time of publication, four Encryption Methods are available, Encryption Methods, Bit WEP
View all Belkin F5D9050 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 23 highlights
section Using the Belkin Wireless Networking Utility 1 At the time of publication, four Encryption Methods are available: Encryption Methods: 2 Name 64-Bit Wired 128-Bit Wi-Fi Wi-Fi Equivalent Privacy Encryption Protected Access-TKIP Protected Access 2 3 Acronym 64-bit WEP 128-bit WEP WPA-TKIP/ WPA2-AES (or AES (or just WPA) just WPA2) 4 Security Good Better Best Best Features Static keys Static keys Dynamic key Dynamic key 5 encryption encryption and mutual and mutual authentication authentication 6 Encryption keys based on RC4 algorithm (typically 40-bit keys) More secure than 64-bit WEP using a key length of 104 bits plus 24 additional bits of systemgenerated data TKIP (Temporal Key Integrity Protocol) added so that keys are rotated and encryption is strengthened AES (Advanced Encryption Standard) does not cause any throughput loss WEP WEP is a common protocol that adds security to all Wi-Fi-compliant wireless products. WEP gives wireless networks the equivalent level of privacy protection as a comparable wired network. 64-Bit WEP 64-bit WEP was first introduced with 64-bit encryption, which includes a key length of 40 bits plus 24 additional bits of systemgenerated data (64 bits total). Some hardware manufacturers refer to 64-bit as 40-bit encryption. Shortly after the technology was introduced, researchers found that 64-bit encryption was too easy to decode. 19