Microchip Technology AC164149 Ficha De Dados
Sample Application Demonstrations
2013 Microchip Technology Inc.
Preliminary
DS52108A-page 41
FIGURE 4-9:
WPS AND SECURITY METHODS
4.5.7
Wireless Security
4.5.7.1
WIRED EQUIVALENT PRIVACY (WEP)
WEP security has two forms: 64-bit WEP, which uses a 40-bit key (WEP-40) and 128-
bit WEP, which uses a 104-bit key (WEP-104).
bit WEP, which uses a 104-bit key (WEP-104).
In the basic form, WEP keys have hexadecimal values, 5 bytes for WEP-40 and 13
bytes for WEP-104. Some routers, such as the Linksys WRT54G, increases the
random nature of the WEP key by adding an additional layer that converts an ASCII
passphrase into a hexadecimal key. The MRF24WB0MA/B or MRF24WG0MA/B Wi-
Fi
bytes for WEP-104. Some routers, such as the Linksys WRT54G, increases the
random nature of the WEP key by adding an additional layer that converts an ASCII
passphrase into a hexadecimal key. The MRF24WB0MA/B or MRF24WG0MA/B Wi-
Fi
®
PICtail™ will require a hexadecimal key.
To enable WEP security between the development board and AP, setup the AP for
security and program the development board with the correct WEP keys.
security and program the development board with the correct WEP keys.
Note:
Several disadvantages are identified in WEP, which results in hackable and
insecure networks. The use of WEP has been superceded by WPA/WPA2.
insecure networks. The use of WEP has been superceded by WPA/WPA2.