Belkin G+ User Manual page 18

Wireless notebook card
Hide thumbs Also See for G+:
Table of Contents

Advertisement

Available languages
  • EN

Available languages

  • ENGLISH, page 1
Using the Belkin Wireless Networking Utility
At the time of this User Manual's publication, there are
four encryption methods available.
Encryption Methods:
Name
64-Bit Wired
Equivalent
Privacy
Acronym
64-bit WEP
Security
Good
Features
Static keys
Encryption
keys based on
RC4 algorithm
(typically 40-bit
keys)
WEP
WEP is a common protocol that adds security to all Wi-Fi-compliant
wireless products. WEP gives wireless networks the equivalent level
of privacy protection as a comparable wired network.
64-Bit WEP
64-bit WEP was first introduced with 64-bit encryption, which includes
a key length of 40 bits plus 24 additional bits of system-generated data
(64 bits total). Some hardware manufacturers refer to 64-bit as 40-bit
encryption. Shortly after the technology was introduced, researchers
found that 64-bit encryption was too easy to decode.
128-Bit Wired
Wi-Fi Protected
Equivalent
Access-TKIP
Privacy
128-bit WEP
WPA-TKIP/AES
(or just WPA)
Better
Best
Static keys
Dynamic key
encryption
and mutual
authentication
More secure
TKIP (Temporal
than 64-bit
Key Integrity
WEP using a
Protocol) added
key length of
so that keys
104 bits plus
are rotated and
24 additional
encryption is
bits of system-
strengthened
generated data
16
16
Wi-Fi
Protected
Access 2
WPA2-AES (or
just WPA2)
Best
Dynamic key
encryption
and mutual
authentication
AES
(Advanced
Encryption
Standard)
does not
cause any
throughput
loss

Advertisement

Table of Contents
loading

Table of Contents