Authentication and encryption
Wireless security is a complex and developing topic. This page gives a brief overview of
the basics involved in making a wireless network secure.
In the simplest terms, wireless security involves two strategies: authentication and
encryption.
A wireless security method, such as
WEP
or
WPA
, involves varying levels of
authentication and encryption.
Authentication
Definition
Authentication verifies the identity of a user or device before granting access to a network,
making it more difficult for unauthorized users to access network resources.
Chapter 4
28
HP Deskjet 6980 series
In order to be authenticated and allowed to use a network, a device must supply a known
password to other devices on the network. If the device cannot supply the correct
password, it will not be able to use other devices on the network.
Types of authentication
The printer supports three types of authentication. Each type of authentication has its
benefits and limitations.
Authentication
type
Description
Benefits
Limitations
Open System
Devices on a
network identify
themselves with the
network name
(SSID) only.
Least complicated
strategy.
Provides little
protection against
unauthorized users.
Shared Key
Devices use a
shared master
secret to identify
themselves as
authorized
members of the
network.
Convenient to use
in conjunction with
WEP, since a WEP
key can serve as
the shared
authentication key.
All devices must
have the key. The
shared key does
not change
automatically.
WPA/PSK
Devices use a
single pre-shared
key (PSK) to
identify themselves
as authorized
members of the
network and to
generate an
encryption key.
The pre-shared key
and the encryption
keys are not
identical. Allows
smaller networks to
use WPA without
the need for an
authorization
server.
All devices must
have the key.
Encryption
Definition
Encryption involves using a password to encode data sent over a wireless network in
order to make the data unintelligible to eavesdroppers. Only devices that know the
password can decode the data.
Types of encryption
The printer supports four types of encryption. Each type of encryption has its benefits
and limitations.
Encryption type
Description
Benefits
Limitations
Open System
Devices on a
network do not
encrypt data.
Least complicated
strategy.
Provides no
protection against
eavesdroppers.
User's guide
29
Encryption type
Description
Benefits
Limitations
WEP encryption
Devices on a
network share a
password, called a
"WEP key" to
encode and decode
data.
Simplest strategy
that provides
encryption.
All devices must
have the key. The
WEP key does not
change
automatically. WEP
encryption provides
less security than
both AES or TKIP.
AES
Advanced
Encryption
Standard (AES) is a
U.S. government
sponsored
encryption method
that uses a complex
algorithm called
"Rijndael." AES
uses encryption
keys to encode
data. AES
automatically
changes the
encryption keys
after a certain time
interval, thus
making the wireless
network less
vulnerable to
eavesdropping.
Since the
encryption key
changes
automatically, the
data is more difficult
for eavesdroppers
to decode.
All devices must
have the key.
TKIP
Temporal Key
Integrity Protocol
(TKIP) uses
encryption keys to
encode data. TKIP
automatically
changes the
encryption keys
after a certain time
interval, thus
making the wireless
network less
vulnerable to
eavesdropping.
Since the
encryption key
changes
automatically, the
data is more difficult
for eavesdroppers
to decode.
All devices must
have the key.
Chapter 4
(continued)
30
HP Deskjet 6980 series