Microchip Technology AC164149 Ficha De Dados

Página de 96
Sample Application Demonstrations
 2013 Microchip Technology Inc.
Preliminary
DS52108A-page 41
FIGURE 4-9:
WPS AND SECURITY METHODS
4.5.7
Wireless Security
4.5.7.1
WIRED EQUIVALENT PRIVACY (WEP)
WEP security has two forms: 64-bit WEP, which uses a 40-bit key (WEP-40) and 128-
bit WEP, which uses a 104-bit key (WEP-104).
In the basic form, WEP keys have hexadecimal values, 5 bytes for WEP-40 and 13 
bytes for WEP-104. Some routers, such as the Linksys WRT54G, increases the 
random nature of the WEP key by adding an additional layer that converts an ASCII 
passphrase into a hexadecimal key. The MRF24WB0MA/B or MRF24WG0MA/B Wi-
Fi
®
 PICtail™ will require a hexadecimal key.
To enable WEP security between the development board and AP, setup the AP for 
security and program the development board with the correct WEP keys.
Note:
Several disadvantages are identified in WEP, which results in hackable and 
insecure networks. The use of WEP has been superceded by WPA/WPA2.