
Encryption type Description Benefits Limitations
WEP encryption Devices on a
network share a
password, called a
"WEP key" to
encode and decode
data.
Simplest strategy
that provides
encryption.
All devices must
have the key. The
WEP key does not
change
automatically. WEP
encryption provides
less security than
both AES or TKIP.
AES Advanced
Encryption
Standard (AES) is a
U.S. government
sponsored
encryption method
that uses a complex
algorithm called
"Rijndael." AES
uses encryption
keys to encode
data. AES
automatically
changes the
encryption keys
after a certain time
interval, thus
making the wireless
network less
vulnerable to
eavesdropping.
Since the
encryption key
changes
automatically, the
data is more difficult
for eavesdroppers
to decode.
All devices must
have the key.
TKIP Temporal Key
Integrity Protocol
(TKIP) uses
encryption keys to
encode data. TKIP
automatically
changes the
encryption keys
after a certain time
interval, thus
making the wireless
network less
vulnerable to
eavesdropping.
Since the
encryption key
changes
automatically, the
data is more difficult
for eavesdroppers
to decode.
All devices must
have the key.
Chapter 4
(continued)
30 HP Deskjet 6980 series