Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Can you use WPA2-AES if wireless encryption algorithm has to be RC4?

Posted on 2015-01-11
3
266 Views
Last Modified: 2015-01-11
Can you use WPA2-AES if wireless encryption algorithm has to be RC4?

I've come across this question on a practice quiz and I'm not finding an explanation as to what the answer is.
Would I have to use WPA-TKIP as the strongest level of security ?
Or is WPA2-AES capable with RC4?
0
Comment
Question by:garryshape
3 Comments
 
LVL 84

Accepted Solution

by:
ozo earned 250 total points
ID: 40543261
You can use it, but not with the device on which the wireless encryption algorithm has to be RC4.
0
 
LVL 83

Assisted Solution

by:Dave Baldwin
Dave Baldwin earned 250 total points
ID: 40543264
This http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access#Encryption_protocol says that RC4 is used with TKIP and not AES.
0
 

Author Closing Comment

by:garryshape
ID: 40543299
ty
0

Featured Post

Networking for the Cloud Era

Join Microsoft and Riverbed for a discussion and demonstration of enhancements to SteelConnect:
-One-click orchestration and cloud connectivity in Azure environments
-Tight integration of SD-WAN and WAN optimization capabilities
-Scalability and resiliency equal to a data center

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
how to generate a csr to request an intermediate ca on os x 3 49
md5 password 3 74
Ruckus Zoneflex 7982 multiple SSIDs disconnects 11 75
WLC and radius 4 11
For Sennheiser, comfort, quality and security are high priority areas. This paper addresses the security of Bluetooth technology and the supplementary security that Sennheiser’s Contact Center and Office (CC&O) headsets provide.  
Ransomware is a growing menace to anyone using a computer or mobile device. Here are answers to some common questions about this vicious new form of malware.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question