EasyManuals Logo

Aztech Wireless N USB Adapter User Manual

Aztech Wireless N USB Adapter
29 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #22 background imageLoading...
Page #22 background image
User Manual
Encryption Mode
WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message
Integrity Check (MIC) and IEEE 802.1X. WPA2 use Advanced Encryption Standard (AES) in
the Counter mode with Cipher block chaining Message authentication code Protocol
(CCMP) to offer stronger encryption than TKIP.
The encryption mechanism used for WPA(2) and WPA(2)-PSK are the same. The only
difference between them is that WPA(2)-PSK uses a simple common password, instead
of user specific credentials. The common password approach makes WPA(2)-PSK
susceptible to brute-force password-guessing attacks but it’s still an improvement over
WEP as it employs a consistent, single, alphanumeric password to derive a PMK which is
used to generate unique temporal encryption keys.
Page 22 of 29

Other manuals for Aztech Wireless N USB Adapter

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Aztech Wireless N USB Adapter and is the answer not in the manual?

Aztech Wireless N USB Adapter Specifications

General IconGeneral
BrandAztech
ModelWireless N USB Adapter
CategoryAdapter
LanguageEnglish

Related product manuals