Improved data encryption through the temporal key integrity protocol (TKIP). TKIP uses
a hashing algorithm to scramble the encryption keys and adds an integrity-checking
feature to ensure that the keys have not been tampered with.
User authentication, which is generally missing in WEP, through the extensible
authentication protocol (EAP). WEP regulates access to a wireless network based on a
computer's hardware-specific MAC address, which is relatively simple to be sniffed out
and stolen. EAP is built on a more secure public-key encryption system to ensure that
only authorized network users can access the network.
WPA is an interim standard that will be replaced with the IEEE's 802.11i standard upon its
completion.
WPA-Personal
Wi-Fi Protected Access-Personal provides a level of security in the small network or home
environment.
WPA-PSK (Wi-Fi
Protected-Access
Pre-Shared Key)
WPA-PSK mode does not use an authentication server. It can be used with the data
encryption types WEP or TKIP. WPA-PSK requires configuration of a pre-shared key (PSK).
You must enter a pass phrase or 64 hex characters for a pre-shared key of length 256-bits.
The data encryption key is derived from the PSK.
Back to Top
Back to Contents
Trademarks and Disclaimers
Intel® PROSet/Wireless WiFi Connection Utility User's Guide