Securing your wi-fi® network, Wired equivalent privacy (wep), 25 securing your wi-fi® network – Dynex DX-WGRTR User Manual

Page 25: Setting up your wireless router

Advertising
background image

Setting up your wireless router

25

Securing your Wi-Fi® Network

Here are a few different ways you can maximize the security of your wireless network and
protect your data from prying eyes and ears. This section is intended for the home, home
office, and small office user.
At the time of this User Manual's publication, there are four encryption methods available.

Wired Equivalent Privacy (WEP)

WEP is a common protocol that adds security to all Wi-Fi-compliant wireless products. WEP
gives wireless networks the equivalent level of privacy protection as a comparable wired
network.
64-Bit WEP—64-bit WEP was first introduced with 64-bit encryption, which includes a key
length of 40 bits plus 24 additional bits of system-generated data (64 bits total). Some
hardware manufacturers refer to 64-bit as 40-bit encryption. Shortly after the technology
was introduced, researchers found that 64-bit encryption was too easy to decode.
128-Bit Encryption—As a result of 64-bit WEP’s potential security weaknesses, a more
secure method of 128-bit encryption was developed. 128-bit encryption includes a key
length of 104 bits plus 24 additional bits of system-generated data (128 bits total). Some
hardware manufacturers refer to 128-bit as 104-bit encryption. Most of the new wireless
equipment in the market today supports both 64-bit and 128-bit WEP encryption, but you
might have older equipment that only supports 64-bit WEP. All wireless products from Dynex
will support both 64-bit and 128-bit WEP.

64-Bit Wired

Equivalent

Privacy

128-Bit Wired

Equivalent

Privacy

Wi-Fi Protected

Access-TKIP

Wi-Fi Protected

Access 2

Acronym

64-bit WEP

128-bit WEP

WPA-TKIP/AES (or just
WPA)

WPA2-AES (or just
WPA2)

Security

Good

Better

Best

Best

Features

Static keys

Static keys

Dynamic key
encryption and
mutual
authentication

Dynamic key
encryption and
mutual
authentication

Encryption keys based
on RC4 algorithm
(typically 40-bit keys)

More secure than
64-bit WEP using a
key length of 104 bits
plus 24 additional bits
of system generated
data

TKIP (Temporal Key
Integrity Protocol)
added so that keys are
rotated and
encryption is
strengthened

AES (Advanced
Encryption Standard)
does not cause any
throughput loss

Advertising