Datasheet
Sample Application Demonstrations
2013 Microchip Technology Inc. Preliminary DS52108A-page 41
FIGURE 4-9: WPS AND SECURITY METHODS
4.5.7 Wireless Security
4.5.7.1 WIRED EQUIVALENT PRIVACY (WEP)
WEP security has two forms: 64-bit WEP, which uses a 40-bit key (WEP-40) and 128-
bit WEP, which uses a 104-bit key (WEP-104).
In the basic form, WEP keys have hexadecimal values, 5 bytes for WEP-40 and 13
bytes for WEP-104. Some routers, such as the Linksys WRT54G, increases the
random nature of the WEP key by adding an additional layer that converts an ASCII
passphrase into a hexadecimal key. The MRF24WB0MA/B or MRF24WG0MA/B Wi-
Fi
®
PICtail™ will require a hexadecimal key.
To enable WEP security between the development board and AP, setup the AP for
security and program the development board with the correct WEP keys.
Note: Several disadvantages are identified in WEP, which results in hackable and
insecure networks. The use of WEP has been superceded by WPA/WPA2.