Belkin F5D9010uk User Manual page 20

Wireless g plus mimo notebook card
Table of Contents

Advertisement

Using the Belkin Wireless Networking Utility
At the time of publication, four Encryption Methods are
available:
Encryption Methods:
Name
64-Bit Wired
Equivalent
Privacy
Acronym
64-bit WEP
Security
Good
Features
Static keys
Encryption
keys based on
RC4 algorithm
(typically 40-bit
keys)
WEP
WEP is a common protocol that adds security to all Wi-Fi-compliant
wireless products. WEP gives wireless networks the equivalent level
of privacy protection as a comparable wired network.
64-Bit WEP
64-bit WEP was first introduced with 64-bit encryption, which includes
a key length of 40 bits plus 24 additional bits of system-generated
data (64 bits total). Some hardware manufacturers refer to 64-bit
as 40-bit encryption. Shortly after the technology was introduced,
researchers found that 64-bit encryption was too easy to decode.
128-Bit Wired
Wi-Fi Protected
Equivalent
Access-TKIP
Privacy
128-bit WEP
WPA-TKIP/AES
(or just WPA)
Better
Best
Static keys
Dynamic key
encryption
and mutual
authentication
More secure
TKIP (Temporal
than 64-bit
Key Integrity
WEP using a
Protocol) added
key length of
so that keys
104 bits plus
are rotated and
24 additional
encryption is
bits of system-
strengthened
generated data
17
17
Wi-Fi
Protected
Access 2
WPA2-AES (or
just WPA2)
Best
Dynamic key
encryption
and mutual
authentication
AES
(Advanced
Encryption
Standard)
does not
cause any
throughput
loss
1
2
3
4
5
6

Advertisement

Table of Contents
loading

This manual is also suitable for:

F5d9010

Table of Contents