Question about D-Link DES 3226 (DES-3226) 24x10/100 Mbps Networking Switch

1 Answer

Assume you have a secret that you encrypt and publicly post the cipher text. You use a 56 bit key variable and then split the key variable into 2 equal size Each segment of 28 bits each you give one of these segment to trustee A and give the other to trustee to B If one of these trustees tries to breack the cipher ,how many key variable would the trustee have to key in an advantage in order to be successfull

Posted by on

1 Answer

  • Level 3:

    An expert who has achieved level 3 by getting 1000 points

    Top Expert:

    An expert who has finished #1 on the weekly Top 10 Fixya Experts Leaderboard.

    Superstar:

    An expert that got 20 achievements.

    All-Star:

    An expert that got 10 achievements.

  • D-Link Master
  • 75,807 Answers

This is the wrong forum for this type of question.

Posted on Jul 25, 2017

2 Suggested Answers

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
goodluck!

Posted on Jan 02, 2017

  • 112 Answers

SOURCE: are trying to enter the WEP key and it is not

It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption.

Note: Your network will slow down and wireless signal may degrade when enabling encryption due to the added overhead.

Step 1 Log into the web configuration of the router by opening up a web browser and typing in the IP address of the router (192.168.0.1).

Click here if you cannot access the web-based configuration.

Step 2 Enter your username (admin) and your password (blank by default). Click OK . Click the Home tab and click the Wireless button on the left hand side of the screen.

di614_128wep.gif

Step 3 Select Enable next to the WEP radio buttons. For WEP encryption select 64, 128, or 256-bit encryption. For the Key type select HEX. If you have an option for Authentication type, select Shared Key.

Step 4 Select Key 1. Enter a Hex encryption key that you make up. The length of the encryption key will depend on what you selected under WEP Encryption.

  • 64-bit encryption 10 characters
  • 128-bit encryption 26 characters
  • 256-bit encryption 58 characters (available on DI-614+ only)

    The encryption key is HEX, meaning 0-9 and A-F are valid characters. For example, A4583DFF1A (64-bit HEX key).

    Step 5 Click on the Apply button then click on the Continue button to save your settings.
  • Posted on Jun 25, 2010

    Add Your Answer

    Uploading: 0%

    my-video-file.mp4

    Complete. Click "Add" to insert your video. Add

    ×

    Loading...
    Loading...

    Related Questions:

    1 Answer

    In network security + acronyms what is 3DES and definition


    Triple Data Encryption Standard (DES) is a type of computerized cryptography where block cipher algorithms are applied three times to each data block. The key size is increased in Triple DES to ensure additional security through encryption capabilities. Each block contains 64 bits of data. Three keys are referred to as bundle keys with 56 bits per key. There are three keying options in data encryption standards:
    1. All keys being independent
    2. Key 1 and key 2 being independent keys
    3. All three keys being identical
    Key option #3 is known as triple DES. The triple DES key length contains 168 bits but the key security falls to 112 bits.
    What is Triple DES Definition from Techopedia

    Jun 04, 2014 | ITT Night Quest 5001 Goggles

    1 Answer

    D-LINK DIR-615 finding encryption key


    What website? The wireless dongle, what Make, Model? I assume it's a USB connection on the TV? Did it come with the TV? What is asking for the Key? The TV wireless setup? Is your D-Link Secured with a security Key (password)?

    Jan 24, 2013 | Computers & Internet

    1 Answer

    I want to set up password on my router


    Step 1 Open a web browser and type the IP address of the DIR series router into the address bar (default is http://192.168.0.1). Press Enter

    Step 2 The default username is admin (all lower case) and the default password is blank (nothing). Click on OK.

    Step 3 Click on the Setup tab at the top and then click on Wireless Settings on the lefthand side.
    Step 4 From the Wireless Security Mode dropdown menu, select WPA-Personal encryption.

    Step 5 From the WPA Mode dropdown, Under WPA, select the form of WPA you would like to use.

    Use WPA or WPA2 mode to achieve a balance of strong security and best compatibility. This mode uses WPA for legacy clients while maintaining higher security with stations that are WPA2 capable. Also the strongest cipher that the client supports will be used.

    For best security, use WPA2 Only mode. This mode uses AES(CCMP) cipher and legacy stations are not allowed access with WPA security.

    For maximum compatibility, use WPA Only. This mode uses TKIP cipher. Some gaming and legacy devices work only in this mode. To achieve better wireless performance use WPA2 Only security mode (or in other words AES cipher).


    Step 6 In the Pre-Shared Key box, enter the desired Pre-shared key.

    This is the "password" that allows communication between you're encrypted client (e.g. the PSP or your wireless computer) and the encrypted wireless signal coming from the router. This password must contain at least 8 characters, the characters can be anything you can create from your keyboard.

    Step 7 Click on Save Settings

    May 07, 2011 | D-Link AirPlus Xtreme G DI-624 Wireless...

    1 Answer

    I need to know my wep key or ssid codes, whats the difference? i need it to set up for my ps3 online


    WEP (wired equivalent privacy)

    The privacy protocol specified in IEEE 802.11 to provide wireless LAN users protection against casual eavesdropping. WEP refers to the intent to provide a privacy service to wireless LAN users similar to that provided by the physical security inherent in a wired LAN.


    When WEP is active in a wireless LAN, each 802.11 packet is encrypted separately with an RC4 cipher stream generated by a 64-bit RC4 key. This key is composed of a 24-bit initialization vector (IV) and a 40-bit WEP key. The encrypted packet is generated with a bitwise exclusive OR (XOR) of the original packet and the RC4 stream. The IV is chosen by the sender and can be changed periodically so every packet won't be encrypted with the same cipher stream. The IV is sent in the clear with each packet. An additional 4-byte Integrity Check Value (ICV) is computed on the original packet and appended to the end. The ICV (be careful not to confuse this with the IV) is also encrypted with the RC4 cipher stream.

    WEP has been widely criticized for a number of weaknesses:

    Key management and key size
    Key management is not specified in the WEP standard; without interoperable key management, keys will tend to be long-lived and of poor quality. Most wireless networks that use WEP have one single WEP key shared between every node on the network. Access points and client stations must be programmed with the same WEP key. Since synchronizing the change of keys is tedious and difficult, keys are seldom changed. Also, the 802.11 standard does not specify any WEP key sizes other than 40 bits. 

    The IV is too small

    WEP's IV size of 24 bits provides for 16,777,216 different RC4 cipher streams for a given WEP key, for any key size. Remember that the RC4 cipher stream is XOR-ed with the original packet to give the encrypted packet that is transmitted, and the IV is sent in the clear with each packet. The problem is IV reuse. If the RC4 cipher stream for a given IV is found, an attacker can decrypt subsequent packets that were encrypted with the same IV or can forge packets.

    Weakness: The ICV algorithm is not appropriate
    The WEP ICV is based on CRC-32, an algorithm for detecting noise and common errors in transmission. CRC-32 is an excellent checksum for detecting errors, but an awful choice for a cryptographic hash. Better-designed encryption systems use algorithms such as MD5 or SHA-1 for their ICVs. 

    Authentication messages can be easily forged

    SSID (Service Set IDentifier)
    The SSID (Service Set IDentifier) is a token which identifies an 802.11 (Wi-Fi) network. 


    The SSID is a secret key which is set by the network administrator.

    You must know the SSID to join an 802.11 network. However, the SSID can be discovered by network sniffing. By default, the SSID is part of the packet header for every packet sent over the WLAN.
    SSID Security Issues

    The fact that the SSID is a secret key instead of a public key creates a key management problem for the network administrator. Every user of the network must configure the SSID into their system. If the network administrator seeks to lock a user out of the network, the administrator must change the SSID of the network, which will require reconfiguration of the SSID on every network node. Some 802.11 NICs allow you to configure several SSIDs at one time.
    Default SSID's

    Most 802.11 access point vendors allow the use of an SSID of "any" to enable an 802.11 NIC to connect to any 802.11 network. This is known to work with wireless equipment from Buffalo Technologies, Cisco, D-Link, Enterasys, Intermec, Lucent, and Proxim. Other default SSID's include "tsunami", "101", "RoamAbout Default Network Name", "Default SSID", and "Compaq".
    Disabling SSID Broadcasting

    Many Wireless Access Point (WAP) vendors have added a configuration option which lets you disable broadcasting of the SSID. This adds little security because it is only able to prevent the SSID from being broadcast with Probe Request and Beacon frames. The SSID must be broadcast with Probe Response frames. In addition, the wireless access cards will broadcast the SSID in their Association and Reassociation frames. Because of this, the SSID cannot be considered a valid security tool.
    An SSID by any other name

    The SSID is also referred to as the ESSID (Extended Service Set IDentifier).


    Airsnort, Aircrack 2.1, Cain & Abel are some of the wireless packet sniffing tools which can decode the authorization key.

    Dec 23, 2009 | D-Link ADSL2/2+ Modem/Wireless Router...

    3 Answers

    Wep key


    it all depends. There is usually a way to set it if you connect directly to the router, with a cable, then open up the website 192.168.1.1
    When you open that up, you will basically be viewing your router's web page, and in the wireless security settings you can manually set your WEP key. these settings are in different places for different routers, but that's the general idea.

    Aug 10, 2009 | RCA Thomson Digital Cable Modem (DCM305R)

    1 Answer

    Zebra QL 420+ wireless printer works only without cipher/TKIP


    Hi
    With Label Vista
    • Go to Printer Tab
    • Define the com Port settings (use serial or usb)
    • Go to Printer settings

    in network tab :
    • Put your network configuration ( IP address or DHCP,submask, gateway; ESSID, port number .....)

    In 802.1X WPA
    • Select WPA WPA2
    • Authentification PSK
    • Put the username and password in EAP section

    Mar 16, 2009 | Zebra QL 420 Plus Thermal Label Printer

    1 Answer

    Encryption and decryption(urgent)


    Dazzling_ysi: If you do a project youare supposed to do research and not get the answer handed to you. You can ask for help with it and resources and a solution field is not big enough anyhow to write a "project". But to help you with it, this is a very goodresource on the topic:

    http://eprint.iacr.org/2003/181.pdf

    Let me citate some lines that I think even answer though shortly your question with FULL credit to the author:

    " The advantage of multiple encryption: is that it provides bettersecurity because even if some component ciphers are broken or some ofthe secret keys are compromised, the confidentiality can still bemaintained by the remaining encryptions."

    Disadvantage and danger:
    " If a multiple encryption has a branch thatends with a parallel block, we are then able to construct an adversaryA that breaks it with only one key exposure query and one decryptionquery.
    If a multiple encryption has a branch that ends with a sequentialblock, we may then be able to construct an adversary A that breaks itwith only one key exposure query on the last component and onedecryption query."

    For more on the topic please read the pdf.

    Jan 28, 2009 | Computers & Internet

    1 Answer

    IE 7.0 Change it into High Encryption.


    u can change the cipher strength by edit the properites of the IE7.0
    or change in "services" which is in control panel -> Administrative Tools

    Mar 13, 2008 | Microsoft Office Outlook 2003 for PC

    Not finding what you are looking for?
    D-Link DES 3226 (DES-3226) 24x10/100 Mbps Networking Switch Logo

    Related Topics:

    29 people viewed this question

    Ask a Question

    Usually answered in minutes!

    Top D-Link Computers & Internet Experts

    Prashant M
    Prashant M

    Level 3 Expert

    2260 Answers

    Doctor PC
    Doctor PC

    Level 3 Expert

    7733 Answers

    Les Dickinson
    Les Dickinson

    Level 3 Expert

    18391 Answers

    Are you a D-Link Computer and Internet Expert? Answer questions, earn points and help others

    Answer questions

    Manuals & User Guides

    Loading...