User manual
For 64bits encryption, 10 hexadecimal
3
values must be presented in the key field.
While 128 bits encryption, 26 hexadecimal values must be in the key field.
Authentication Type
Share Key: Encryption algorithm used on each of the computers or access points
might different. Hosts must discover which algorithm other remote hosts use
before proper communication could be established.
Open System: The IEEE 802.11 default authentication method, which is a very
simple, two-step process. First the station wanting to authenticate with another
station sends an authentication management frame containing the sending
station’s identity. The receiving station then sends back a frame alerting whether it
recognizes the identity of the authenticating station.
WEP standard did not specify which algorithm or the procedure to be used. In
practice, most installation uses a single algorithm that is shared between all mobile
stations and access points.
How is encryption key generated?
Firstly, 24bits IV is generated. This IV is then pass through an encryption
algorithm generator with your data. The generator will generate the appropriate
length of bits that represents your encrypt data.
3
Hexadecimal numbers range from 0 ~ 9 and A ~ F.
80