Intermec CK61 User Manual page 55

Mobile computer with windows ce
Hide thumbs Also See for CK61:
Table of Contents

Advertisement

CK61 Handheld Computer User's Manual With Windows CE
There are many schemes available to implement these features. Use
the following tables to understand the common terminology for
wireless network security.
Encryption Terminology
Acronym
Description
AES
Advanced Encryption Standard. A block cipher, a type of
symmetric key cipher that uses groups of bits of a fixed length
- called blocks. A symmetric key cipher is a cipher using the
same key for both encryption and decryption. As implemented
for wireless, this is also known as CCMP, which implements
AES as TKIP and WEP are implementations of RC4.
CKIP
Cisco Key Integrity Protocol. This protocol is Cisco's version
of the TKIP protocol, compatible with Cisco Aironet products.
TKIP
Temporal Key Integrity Protocol. This protocol is part of the
IEEE 802.11i encryption standard for wireless LANs, which
provides per-packet key mixing, a message integrity check and
a re-keying mechanism, thus overcoming most of the weak
points of WEP. This encryption is more difficult to crack than
the standard WEP. Weak points of WEP include: No Initiation
Vector (IV) reuse protection, weak keys, no protection against
message replay, no detection of message tampering, and no
key updates.
WEP
Wired Equivalent Privacy encryption. With preconfigured
WEP, both the client CK61 and access point are assigned the
same key, which can encrypt all data between the two devices.
WEP keys also authenticate the CK61 to the access point -
unless the CK61 can prove it knows the WEP key, it is not
allowed onto the network. WEP keys are only needed if they
are expected by your clients. There are two types available: 64-
bit (5-character strings, 12345) (default) and 128-bit (13-
character strings, 1234567890123).
Chapter 2 — Connecting and Configuring the CK61
43

Advertisement

Table of Contents
loading

Table of Contents