HP 680n HP Wireless Print Server 680n - (English) Setup Guide - Page 17

Encryption, TKIP Temporal Key Integrity Protocol, are typically used

Page 17 highlights

Encryption Wireless networks use radio signals for network communications, which can be easily monitored by someone eavesdropping on the network. To deter eavesdropping and to help ensure data privacy, encryption of wireless communications may be used. WEP (Wired Equivalent Privacy) encryption protocols were developed to provide a basic level of data privacy. WEP protocols use encryption keys to encrypt and decrypt wireless communications. Note WEP encryption levels are sometimes called "40-bit", "64-bit", "104-bit" or "128-bit" encryption. Both 40-bit and 64-bit encryption are really the same, as are 104bit and 128-bit encryption. When entering WEP keys, the user specifies 40 bits for 64-bit encryption, or 104 bits for 128-bit encryption. An additional 24 initialization vector (IV) bits are automatically added for a total of 64 bits and 128 bits, respectively. In this guide, we will use "40/64-bit" and "104/128-bit" to specify these WEP encryption levels. For basic encryption, static WEP keys are configured on each device on the wireless network. WEP keys are considered static because they remain the same unless manually reconfigured. For example, on a typical Infrastructure mode network that uses static WEP encryption, a change to the WEP key on an Access Point will require a manual change to the WEP key on each wireless device. For advanced encryption methods, dynamic encryption protocols are used. For dynamic encryption protocols, encryption keys are automatically changed at routine intervals making them difficult to decipher. Dynamic encryption protocols, such as dynamic WEP and TKIP (Temporal Key Integrity Protocol), are typically used on highly-secure networks that use authentication servers for network access. Introduction 1-9

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102

Introduction 1-9
Encryption
Wireless networks use radio signals for network communications,
which can be easily monitored by someone eavesdropping on the
network. To deter eavesdropping and to help ensure data privacy,
encryption of wireless communications may be used.
WEP (Wired Equivalent Privacy) encryption protocols were
developed to provide a basic level of data privacy. WEP protocols
use encryption keys to encrypt and decrypt wireless
communications.
Note
WEP encryption levels are sometimes called “40-bit”,
“64-bit”, “104-bit” or “128-bit” encryption. Both 40-bit
and 64-bit encryption are really the same, as are 104-
bit and 128-bit encryption. When entering WEP keys,
the user specifies 40 bits for 64-bit encryption, or 104
bits for 128-bit encryption. An additional 24
initialization vector (IV) bits are automatically added
for a total of 64 bits and 128 bits, respectively. In this
guide, we will use “40/64-bit” and “104/128-bit” to
specify these WEP encryption levels.
For basic encryption, static WEP keys are configured on each device
on the wireless network. WEP keys are considered
static
because
they remain the same unless manually reconfigured. For example,
on a typical Infrastructure mode network that uses static WEP
encryption, a change to the WEP key on an Access Point will require
a manual change to the WEP key on each wireless device.
For advanced encryption methods,
dynamic
encryption protocols
are used. For dynamic encryption protocols, encryption keys are
automatically changed at routine intervals making them difficult to
decipher. Dynamic encryption protocols, such as dynamic WEP and
TKIP (Temporal Key Integrity Protocol), are typically used on
highly-secure networks that use authentication servers for network
access.