HP Deskjet 6988dt Printer - Authentication and encryption

background image

Authentication and encryption

Wireless security is a complex and developing topic. This page gives a brief overview of
the basics involved in making a wireless network secure.
In the simplest terms, wireless security involves two strategies: authentication and
encryption.
A wireless security method, such as

WEP

or

WPA

, involves varying levels of

authentication and encryption.

Authentication
Definition

Authentication verifies the identity of a user or device before granting access to a network,
making it more difficult for unauthorized users to access network resources.

Chapter 4

28

HP Deskjet 6980 series

background image

In order to be authenticated and allowed to use a network, a device must supply a known
password to other devices on the network. If the device cannot supply the correct
password, it will not be able to use other devices on the network.

Types of authentication

The printer supports three types of authentication. Each type of authentication has its
benefits and limitations.

Authentication
type

Description

Benefits

Limitations

Open System

Devices on a
network identify
themselves with the
network name
(SSID) only.

Least complicated
strategy.

Provides little
protection against
unauthorized users.

Shared Key

Devices use a
shared master
secret to identify
themselves as
authorized
members of the
network.

Convenient to use
in conjunction with
WEP, since a WEP
key can serve as
the shared
authentication key.

All devices must
have the key. The
shared key does
not change
automatically.

WPA/PSK

Devices use a
single pre-shared
key (PSK) to
identify themselves
as authorized
members of the
network and to
generate an
encryption key.

The pre-shared key
and the encryption
keys are not
identical. Allows
smaller networks to
use WPA without
the need for an
authorization
server.

All devices must
have the key.

Encryption
Definition

Encryption involves using a password to encode data sent over a wireless network in
order to make the data unintelligible to eavesdroppers. Only devices that know the
password can decode the data.

Types of encryption

The printer supports four types of encryption. Each type of encryption has its benefits
and limitations.

Encryption type

Description

Benefits

Limitations

Open System

Devices on a
network do not
encrypt data.

Least complicated
strategy.

Provides no
protection against
eavesdroppers.

User's guide

29

background image

Encryption type

Description

Benefits

Limitations

WEP encryption

Devices on a
network share a
password, called a
"WEP key" to
encode and decode
data.

Simplest strategy
that provides
encryption.

All devices must
have the key. The
WEP key does not
change
automatically. WEP
encryption provides
less security than
both AES or TKIP.

AES

Advanced
Encryption
Standard (AES) is a
U.S. government
sponsored
encryption method
that uses a complex
algorithm called
"Rijndael." AES
uses encryption
keys to encode
data. AES
automatically
changes the
encryption keys
after a certain time
interval, thus
making the wireless
network less
vulnerable to
eavesdropping.

Since the
encryption key
changes
automatically, the
data is more difficult
for eavesdroppers
to decode.

All devices must
have the key.

TKIP

Temporal Key
Integrity Protocol
(TKIP) uses
encryption keys to
encode data. TKIP
automatically
changes the
encryption keys
after a certain time
interval, thus
making the wireless
network less
vulnerable to
eavesdropping.

Since the
encryption key
changes
automatically, the
data is more difficult
for eavesdroppers
to decode.

All devices must
have the key.

Chapter 4

(continued)

30

HP Deskjet 6980 series