Intermec CK61 User Manual page 59

Mobile computer with windows mobile
Hide thumbs Also See for CK61:
Table of Contents

Advertisement

CK61 Handheld Computer User's Manual With Windows Mobile
Encryption Terminology
Acronym
Description
CKIP
Cisco Key Integrity Protocol. This protocol is Cisco's version
of the TKIP protocol, compatible with Cisco Aironet products.
TKIP
Temporal Key Integrity Protocol. This protocol is part of the
IEEE 802.11i encryption standard for wireless LANs, which
provides per-packet key mixing, a message integrity check and
a re-keying mechanism, thus overcoming most of the weak
points of WEP. This encryption is more difficult to crack than
the standard WEP. Weak points of WEP include: No Initiation
Vector (IV) reuse protection, weak keys, no protection against
message replay, no detection of message tampering, and no
key updates.
WEP
Wired Equivalent Privacy encryption. With preconfigured
WEP, both the client CK61 and access point are assigned the
same key, which can encrypt all data between the two devices.
WEP keys also authenticate the CK61 to the access point -
unless the CK61 can prove it knows the WEP key, it is not
allowed onto the network. WEP keys are only needed if they
are expected by your clients. There are two types available: 64-
bit (5-character strings, 12345) (default) and 128-bit (13-
character strings, 1234567890123).
Key Management Protocols Terminology
Acronym
Description
WPA
Wi-Fi Protected Access. This is an enhanced version of WEP
that does not rely on a static, shared key. It encompasses a
number of security enhancements over WEP, including
improved data encryption via TKIP and 802.11b/g
authentication with EAP. WiFi Alliance security standard is
designed to work with existing 802.11 products and to offer
forward compatibility with 802.11i.
WPA2
Wi-Fi Protected Access. Second generation of WPA security.
Like WPA, WPA2 provides enterprise and home Wi-Fi users
with a high level of assurance that their data remains
protected and that only authorized users can access their
wireless networks.
Chapter 2 — Connecting and Configuring the CK61
47

Advertisement

Table of Contents
loading

Table of Contents