HP Deskjet 6980 User Guide - Macintosh - Page 31

Types of encryption, Encryption type, Description, Benefits, Limitations, U.S. government

Page 31 highlights

Encryption involves using a password to encode data sent over a wireless network in order to make the data unintelligible to eavesdroppers. Only devices that know the password can decode the data. Types of encryption The printer supports four types of encryption. Each type of encryption has its benefits and limitations. Encryption type Open System WEP encryption AES TKIP Description Benefits Limitations Devices on a network do not encrypt data. Least complicated strategy. Provides no protection against eavesdroppers. Devices on a network share a password, called a "WEP key" to encode and decode data. Simplest strategy that provides encryption. All devices must have the key. The WEP key does not change automatically. WEP encryption provides less security than both AES or TKIP. Advanced Encryption Standard (AES) is a U.S. government sponsored encryption method that uses a complex algorithm called "Rijndael." AES uses encryption keys to encode data. AES automatically changes the encryption keys after a certain time interval, thus making the wireless network less vulnerable to eavesdropping. Since the encryption key changes automatically, the data is more difficult for eavesdroppers to decode. All devices must have the key. Temporal Key Integrity Protocol (TKIP) uses encryption keys to encode data. TKIP automatically Since the encryption key changes automatically, the data is more difficult for eavesdroppers to decode. All devices must have the key. User's guide 29

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Encryption involves using a password to encode data sent over a wireless network in
order to make the data unintelligible to eavesdroppers. Only devices that know the
password can decode the data.
Types of encryption
The printer supports four types of encryption. Each type of encryption has its benefits
and limitations.
Encryption type
Description
Benefits
Limitations
Open System
Devices on a
network do not
encrypt data.
Least complicated
strategy.
Provides no
protection against
eavesdroppers.
WEP encryption
Devices on a
network share a
password, called a
"WEP key" to
encode and decode
data.
Simplest strategy
that provides
encryption.
All devices must
have the key. The
WEP key does not
change
automatically. WEP
encryption provides
less security than
both AES or TKIP.
AES
Advanced
Encryption
Standard (AES) is a
U.S. government
sponsored
encryption method
that uses a complex
algorithm called
"Rijndael." AES
uses encryption
keys to encode
data. AES
automatically
changes the
encryption keys
after a certain time
interval, thus
making the wireless
network less
vulnerable to
eavesdropping.
Since the
encryption key
changes
automatically, the
data is more difficult
for eavesdroppers
to decode.
All devices must
have the key.
TKIP
Temporal Key
Integrity Protocol
(TKIP) uses
encryption keys to
encode data. TKIP
automatically
Since the
encryption key
changes
automatically, the
data is more difficult
for eavesdroppers
to decode.
All devices must
have the key.
User's guide
29