Devolo dLAN 200 AVpro WP Manual page 7

Hide thumbs Also See for dLAN 200 AVpro WP:
Table of Contents

Advertisement

tection for your dLAN network against unauthorised access. Two attack methods
would be possible, but AESpro security ensures they can not be successful:
A "brute force" attack could be started as one way to find the suitable key
for decrypting the data. In such an attack, all possible letter and number
combinations in the chip are tested one after the other. But given the huge
number of key combinations and a maximum transmission rate between the
PC and the chip of 100 Mbps (Ethernet port), a brute force attack of this kind
would require an average of 45.000 years in order to succeed.
Another type of attack would be to intercept encrypted raw data. Based on
the raw data, it might be possible to obtain certain clues regarding the key,
and thus to gain access to the raw data. However, with dLAN technology,
the encrypted raw data cannot be intercepted from the power circuit,
because the chip does not forward encrypted data directly to the network
interface. In the chip, the signal is both encrypted and modulated directly,
so an attacker would only be able to gain access to the modulated data.
However, this is useless to him, because he has no way to back-modulate
the signal.
Conformity and environmental compatibility
dLAN devices made by devolo fulfil the strict EU industrial standards and comply
with the current standards for electromagnetic radiation. You can find further
information on CE conformity and environmental compatibility in the appendix
to this manual.
|
Introduction
|
devolo dLAN 200 AVpro WP
7
|

Advertisement

Table of Contents
loading

Table of Contents