numbers, called an encryption key.Before transmitting information over the airwaves, the wireless client or access point encrypts or scrambles the information.The access point or wireless client receiving the information uses the same key to decrypt or unscramble the information. Theinformation is only readable to WLAN devices that have the correct encryption key. The longer the key is, the stronger theencryption.TrueMobile 2300 supports both WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access).WEPWEP provides a way of creating an encrypted key that is shared between a wireless client (such as a notebook with a wirelessPC card) and the router. In Wireless Broadband Router, WEP is an optional feature that can be enabled or disabled. WhenWEP encryption is enabled, you must set the WEP key in the client to match the WEP key used by the access point becauseyou can ONLY connect to access points that have a matching WEP Key.Note: It is better to change keys frequently. The same algorithm is used for all the communications that should beprotected. If the same key is used, the same message will give exactly the same cipher text. Then, it will be possiblefor an eavesdropper to break the encrypted data. For this reason, it is strongly recommended to change keys often.There are two WEP encryption methods:40(64)-bit Encryption104(128)-bit Encryption40-bit and 64-bit encryption are identical. Some vendors use the term 40-bit; others use 64-bit. A wireless device that claims tohave 40-bit encryption interoperates with a device that claims to have 64-bit encryption, and vice versa. A 40(64)-bit keyconsists of 10 hexadecimal numbers, arrayed as follows:Key #1: 1011121314Key #2: 2021222324Key #3: 3031323334Key #4: 4041424344A 104(128)-bit key has several trillion times as many possible combinations than a 40(64)-bit key. It consists of 26 hexadecimalnumbers, arrayed as follows:Key (#1): 101112131415161718191A1B1CAll wireless clients and access points in a WLAN must use the same encryption method and key. The following two examplesstress how important this point is.Example 1The encryption method for an access point is 40(64)-bit. The method for a wireless client is 104(128)-bit encryption. The clientand access point cannot communicate with each other, even though the selected key is the same. To resolve this problem, setthe access point to use 104(128)-bit encryption.Example 2The encryption method is the same for the access point and wireless client. You select key 1 for the access point and key 2for the wireless client. The wireless client cannot communicate with the WLAN. To resolve this problem, select key 1 for thewireless client.CAUTION: Use the same key and encryption method for the wireless devices in the WLAN. Otherwise, theycannot communicate with each other.The Wireless Broadband Router uses either hexadecimal digits or ASCII characters to create encryption keys. Hexadecimaldigits include the numbers 0 to 9 and the letters A to F. For example, the decimal number 15 is represented as F in thehexadecimal numbering system.