What are the types of encryption that I can use?
Only Federal Information Processing Standard (FIPS) 140-2 compliant encryption methods are authorized to be used for data transmissions over wireless networks. Wired Equivalent Privacy (WEP), the most commonly used wireless encryption method, is defined by the IEEE 802.11 standard and uses the RC4 algorithm to encrypt data. However, WEP is unacceptable due to significant issues facing the implementation of specific aspects of the encryption algorithm. Triple Data Encryption Standard (3DES) is an encryption method that produces an encrypted datastream. Advanced Encryption Standard (AES), a replacement for 3DES, uses symmetric block cipher to encrypt and decrypt data and supports key sizes of 128, 192, and 256 bits. 802.1x, often confused as an encryption method, is a port-based access control solution that is commonly paired with Extensible Authentication Protocol (EAP) to authenticate users via a third party authentication server.
Only Federal Information Processing Standard (FIPS) 140-2 compliant encryption methods are authorized to be used for data transmissions over wireless networks. Wired Equivalent Privacy (WEP), the most commonly used wireless encryption method, is defined by the IEEE 802.11 standard and uses the RC4 algorithm to encrypt data. However, WEP is unacceptable due to significant issues facing the implementation of specific aspects of the encryption algorithm. Triple Data Encryption Standard (3DES) is an encryption method that produces an encrypted datastream. Advanced Encryption Standard (AES), a replacement for 3DES, uses symmetric block cipher to encrypt and decrypt data and supports key sizes of 128, 192, and 256 bits. 802.1x, often confused as an encryption method, is a port-based access control solution that is commonly paired with Extensible Authentication Protocol (EAP) to authenticate users via a third party.