User's Manual
Jh^c\i]ZLZW"7VhZY6YkVcXZYJhZg>ciZg[VXZ
hZXi^dc
'
&
(
)
*
+
,
-
.
&%
&&
&'
H
ZXjg^c
\
ndjgL^";^
C
Z
il
d
g`
(EREAREA
F
EWDI
FF
ERENTWA
Y
S
Y
OUCANMAXIMIZETHESECURIT
Y
O
F
Y
OUR
W
IRELESSNETWORKANDPROTECTYOURDATA
F
ROMPRYIN
G
EYESANDEARS
4
HISSECTIONISINTENDED
F
ORTHEHOME
HOMEO
FF
ICE
ANDSMALLO
FF
ICE
U
SER!TTHETIMEO
F
THIS5SER-ANUALSPUBLICATIONTHEREARETHREE
E
NCRYPTIONMETHODSAVAILABLE
C
VbZ
+
)"W^iL^gZY
:
fj^kVaZci
E
g^kVX
n
&
'-
"W^iL^gZY
:
fj^kVaZci
E
g^kVX
n
L
^";^EgdiZXiZY
6
XXZhh"I@>E
L^i]EgdiZXiZY
6
XXZh
h
!
CRON
Y
M
BI
T
7%0
BI
T
7%0
70!
4+)0
7
0!!%
3
3
ECURIT
Y
'
OO
D
"ETTER
"
EST "ES
T
&EA
T
U
R
ES
3TATICKEYS 3TATICKEYS
$
YNAM
I
C
K
EY
E
NCRYPTION
A
N
D
M
U
T
UA
L
A
UTHENTICATION
$
YNAM
I
C
K
EY
E
NCRYPTION
A
N
D
M
U
T
UA
L
A
UTHENTICATION
%
NCRYPTION
K
E
Y
SBASED
ON2
#
A
L
GOR
I
T
H
M
T
Y
PICALL
Y
BITKEYS
-
ORESECURE
THANBIT
7%0
US
I
NG
A
K
EY
L
ENGT
H
OF
BI
T
S
PL
US
ADDI
T
IO
N
AL
B
IT
S
O
F
S
YSTEM
G
ENERATE
D
DA
T
A
4+)0
TEMPORAL
K
EYINTEGRITY
P
ROTOCOL
ADD
E
D
SO
TH
AT
K
E
Y
SARE
R
O
T
A
T
ED
A
N
D
E
NCRYPT
I
ON
I
S
S
TREN
G
THENED
!%
3
!DVANCED
%NCR
Y
PTION
3
TANDARD
DOES
NO
T
CAUSEAN
Y
TH
ROU
GH
PUT
LOSS
L
:EL^gZY:
f
j^kVaZciEg^kVX
n
7%0
I
SACOMMONPROTOCO
L
T
H
ATA
DD
SSECUR
I
T
Y
TOA
LL
7I
&I
COMP
LI
ANT
WI
RE
L
ESSPRO
D
UCTS
7%0
WAS
D
ES
I
GNE
D
TOG
I
VEW
I
RE
L
ESSNETWOR
K
ST
H
E
E
QUIVALENTLEVELO
F
PRIVAC
Y
PROTECTIONASACOMPARABLEWIREDNETWORK
+
)"7
^
iL:E
BIT7%0WAS
F
IRSTINTRODUCEDWITHBITENCRYPTIONWHICHINCLUDE
S
A
KEYLEN
G
THO
F
BITSPLUSADDITIONALBITSO
F
SYSTEM
G
ENERATED
D
ATABITSTOTAL3OMEHARDWAREMANUFACTURERSREFERTOBIT
A
SBITENCRYPTION3HORTLYAFTERTHETECHNOLOGYWASINTRODUCED
R
ESEARCHERSFOUNDTHATBITENCR
Y
PTIONWASTOOEAS
Y
TODECODE