Wireless Security

Wireless networking devices transmit information through radio waves. Unless security is implemented, an unauthorized person could intercept the information.

A common way of implementing security and protecting information is encryption. Before sending information, the wireless client or access point encrypts or scrambles information using an encryption key. The device receiving the information uses the same key to decrypt or unscramble the information. The information is readable only to wireless devices that have the correct encryption key.

The IEEE 802.11 wireless LAN standard specifies the Wired Equivalent Privacy (WEP) encryption and decryption algorithm. The standard includes two levels of security, using a 64-bit key or a 128-bit key. To implement WEP, use either one of these methods. For better security, use a 128-bit key. A 128-bit key has several trillion times as many possible combinations as a 64-bit key. For added security, change your keys often. Some vendors refer to 64-bit encryption as 40-bit. These are identical. A wireless device that supports 64-bit encryption interoperates with a device that supports 40-bit encryption.

The same device, host computer or front-end processor usually performs both encryption and decryption. The algorithm, like the pattern of a lock, is standardized and may be used by anyone, but the encrypted data is unreadable without the appropriate key, which is known only by the sender and receiver of the transmitted data. You should change your keys often for added protection.

 


Copyright© 2002 Intel Corporation. Legal Information