HP Deskjet 6988dt Printer User Manual

Page 32

Advertising
background image

Encryption type

Description

Benefits

Limitations

WEP encryption

Devices on a
network share a
password, called a
"WEP key" to
encode and decode
data.

Simplest strategy
that provides
encryption.

All devices must
have the key. The
WEP key does not
change
automatically. WEP
encryption provides
less security than
both AES or TKIP.

AES

Advanced
Encryption
Standard (AES) is a
U.S. government
sponsored
encryption method
that uses a complex
algorithm called
"Rijndael." AES
uses encryption
keys to encode
data. AES
automatically
changes the
encryption keys
after a certain time
interval, thus
making the wireless
network less
vulnerable to
eavesdropping.

Since the
encryption key
changes
automatically, the
data is more difficult
for eavesdroppers
to decode.

All devices must
have the key.

TKIP

Temporal Key
Integrity Protocol
(TKIP) uses
encryption keys to
encode data. TKIP
automatically
changes the
encryption keys
after a certain time
interval, thus
making the wireless
network less
vulnerable to
eavesdropping.

Since the
encryption key
changes
automatically, the
data is more difficult
for eavesdroppers
to decode.

All devices must
have the key.

Chapter 4

(continued)

30

HP Deskjet 6980 series

Advertising