HP Deskjet 6980 User Guide - Windows 2000 - Page 32

Encryption type, Description, Benefits, Limitations, U.S. government

Page 32 highlights

Chapter 4 (continued) Encryption type WEP encryption AES TKIP Description Benefits Limitations Devices on a network share a password, called a "WEP key" to encode and decode data. Simplest strategy that provides encryption. All devices must have the key. The WEP key does not change automatically. WEP encryption provides less security than both AES or TKIP. Advanced Encryption Standard (AES) is a U.S. government sponsored encryption method that uses a complex algorithm called "Rijndael." AES uses encryption keys to encode data. AES automatically changes the encryption keys after a certain time interval, thus making the wireless network less vulnerable to eavesdropping. Since the encryption key changes automatically, the data is more difficult for eavesdroppers to decode. All devices must have the key. Temporal Key Integrity Protocol (TKIP) uses encryption keys to encode data. TKIP automatically changes the encryption keys after a certain time interval, thus making the wireless network less vulnerable to eavesdropping. Since the encryption key changes automatically, the data is more difficult for eavesdroppers to decode. All devices must have the key. 30 HP Deskjet 6980 series

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182

Encryption type
Description
Benefits
Limitations
WEP encryption
Devices on a
network share a
password, called a
"WEP key" to
encode and decode
data.
Simplest strategy
that provides
encryption.
All devices must
have the key. The
WEP key does not
change
automatically. WEP
encryption provides
less security than
both AES or TKIP.
AES
Advanced
Encryption
Standard (AES) is a
U.S. government
sponsored
encryption method
that uses a complex
algorithm called
"Rijndael." AES
uses encryption
keys to encode
data. AES
automatically
changes the
encryption keys
after a certain time
interval, thus
making the wireless
network less
vulnerable to
eavesdropping.
Since the
encryption key
changes
automatically, the
data is more difficult
for eavesdroppers
to decode.
All devices must
have the key.
TKIP
Temporal Key
Integrity Protocol
(TKIP) uses
encryption keys to
encode data. TKIP
automatically
changes the
encryption keys
after a certain time
interval, thus
making the wireless
network less
vulnerable to
eavesdropping.
Since the
encryption key
changes
automatically, the
data is more difficult
for eavesdroppers
to decode.
All devices must
have the key.
Chapter 4
(continued)
30
HP Deskjet 6980 series