ZyXEL Communications P-2612HW-F1 - Specifikace Strana 41

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 83
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 40
All contents copyright (c) 2011 ZyXEL Communications Corporation.
41
Wireless Application Notes
Wireless Introduction
WEP Configuration (Wired Equivalent Privacy) Introduction
The 802.11 standard describes the communication that occurs in the wireless
LANs.
The Wired Equivalent Privacy (WEP) algorithm is used to protect wireless
communication from eavesdropping, because the wireless transmissions are easier
to intercept than transmissions over wired networks, and wireless is a shared
medium. Everything that is transmitted or received over a wireless network can be
intercepted.
The WEP relies on a secret key that is shared between a mobile station (e.g. a
laptop with a wireless Ethernet card) and an access point (i.e. a base station). The
secret key is used to encrypt packets before they are transmitted, and an integrity
check is used to ensure that packages are not modified during the transition. The
standard does not discuss how the shared key is established. In practice, most
installations use a single key that is shared between all mobile stations and access
points APs.
The WEP employs the key encryption algorithm, Ron's Code 4 Pseudo Random
Number Generator (RC4 PRNG). The same key is used to encrypt and decrypt the
data.
Zobrazit stránku 40
1 2 ... 36 37 38 39 40 41 42 43 44 45 46 ... 82 83

Komentáře k této Příručce

Žádné komentáře