AES Encryption - Encrypted value lengths

HI all -
I am attempting to use CF 8's AES encryption feature, and
have not found a critical piece of info in the docs to enable me to
progress.
I am using the function to encrypt a password that can be
from 6 to 16 characters long, which will be stored in a database. I
am using generateSecretKey("AES"), and that gives me a 24 character
key that I'm storing for future decryption use. I find that when I
use the key to encrypt a 6 character password the resulting
encrypted string is 32 characters long, but when I encrypt a 16
character password I get a 64 character encrypted string. This is
the case whether I specify "HEX" or "UU" as the encoding.
Without knowing how the length of the resulting encoded
string is determined, I cannot know how large to make my database
column. (MySQL's AES encryption gives the formula 16 ×
(trunc(string_length / 16) + 1) to arrive at the resulting string's
length, but that formula doesn't yield the results I'm seeing in
CFMX). Can anyone point me to a doc, or explain to me how to
determine the column length for storing the resulting encrypted
value?

No. Only things like key, encoding and string size should
matter. If the encoding is "hex", 1-15 characters should produce
size 32, 16-31 characters should produce 64, etcetera. Unless space
is at a premium, you could always increase the field size if that
makes you feel more comfortable.
Well, the results are dictated by the AES standard and basic
string encoding rules, not CF. I highly doubt either one is going
to change any time soon ;-) I agree documentation is good. However,
unlike aes_encrypt, the encrypt function supports many different
algorithms. Most of which have a distinct set of rules. So it would
probably be difficult to provide accurate information about all of
them. Especially as the specifications for each one alone probably
spans volumes ;-)

Similar Messages

  • AES Encryption for Windows Phone

    Hi,
    We are developing a windows phone app and the same app is also being developed in Android and IOS. All three platforms are using a JSON web service for data access. Parameters to be passed are encrypted using AES algorithm.
    The web service uses the Encryption and Decryption as shown in the following link : 
    https://msdn.microsoft.com/en-us/library/system.security.cryptography.aesmanaged(v=vs.110).aspx
    The same is Encryption is available in IOS and Android and working fine.
    I am unable to achieve the same encryption in Windows Phone as System.Security.Cryptography is not available in Windows Phone. I did browse around and found a few alternatives as shown below but i am not getting the desired result i.e. Encrypted data is
    not the same and hence Decryption is not giving the same result in server side.
    public static byte[] Encrypt(string plainText, string pw, string salt)
    IBuffer pwBuffer = CryptographicBuffer.ConvertStringToBinary(pw, BinaryStringEncoding.Utf8);
    IBuffer saltBuffer = CryptographicBuffer.ConvertStringToBinary(salt, BinaryStringEncoding.Utf16LE);
    IBuffer plainBuffer = CryptographicBuffer.ConvertStringToBinary(plainText, BinaryStringEncoding.Utf16LE);
    // Derive key material for password size 32 bytes for AES256 algorithm
    KeyDerivationAlgorithmProvider keyDerivationProvider = Windows.Security.Cryptography.Core.KeyDerivationAlgorithmProvider.OpenAlgorithm("PBKDF2_SHA1");
    // using salt and 1000 iterations
    KeyDerivationParameters pbkdf2Parms = KeyDerivationParameters.BuildForPbkdf2(saltBuffer, 1000);
    // create a key based on original key and derivation parmaters
    CryptographicKey keyOriginal = keyDerivationProvider.CreateKey(pwBuffer);
    IBuffer keyMaterial = CryptographicEngine.DeriveKeyMaterial(keyOriginal, pbkdf2Parms, 32);
    CryptographicKey derivedPwKey = keyDerivationProvider.CreateKey(pwBuffer);
    // derive buffer to be used for encryption salt from derived password key
    IBuffer saltMaterial = CryptographicEngine.DeriveKeyMaterial(derivedPwKey, pbkdf2Parms, 16);
    // display the buffers – because KeyDerivationProvider always gets cleared after each use, they are very similar unforunately
    string keyMaterialString = CryptographicBuffer.EncodeToBase64String(keyMaterial);
    string saltMaterialString = CryptographicBuffer.EncodeToBase64String(saltMaterial);
    SymmetricKeyAlgorithmProvider symProvider = SymmetricKeyAlgorithmProvider.OpenAlgorithm("AES_CBC_PKCS7");
    // create symmetric key from derived password key
    CryptographicKey symmKey = symProvider.CreateSymmetricKey(keyMaterial);
    // encrypt data buffer using symmetric key and derived salt material
    IBuffer resultBuffer = CryptographicEngine.Encrypt(symmKey, plainBuffer, saltMaterial);
    byte[] result;
    CryptographicBuffer.CopyToByteArray(resultBuffer, out result);
    return result;
    public static string Decrypt(byte[] encryptedData, string pw, string salt)
    IBuffer pwBuffer = CryptographicBuffer.ConvertStringToBinary(pw, BinaryStringEncoding.Utf8);
    IBuffer saltBuffer = CryptographicBuffer.ConvertStringToBinary(salt, BinaryStringEncoding.Utf16LE);
    IBuffer cipherBuffer = CryptographicBuffer.CreateFromByteArray(encryptedData);
    // Derive key material for password size 32 bytes for AES256 algorithm
    KeyDerivationAlgorithmProvider keyDerivationProvider = Windows.Security.Cryptography.Core.KeyDerivationAlgorithmProvider.OpenAlgorithm("PBKDF2_SHA1");
    // using salt and 1000 iterations
    KeyDerivationParameters pbkdf2Parms = KeyDerivationParameters.BuildForPbkdf2(saltBuffer, 1000);
    // create a key based on original key and derivation parmaters
    CryptographicKey keyOriginal = keyDerivationProvider.CreateKey(pwBuffer);
    IBuffer keyMaterial = CryptographicEngine.DeriveKeyMaterial(keyOriginal, pbkdf2Parms, 32);
    CryptographicKey derivedPwKey = keyDerivationProvider.CreateKey(pwBuffer);
    // derive buffer to be used for encryption salt from derived password key
    IBuffer saltMaterial = CryptographicEngine.DeriveKeyMaterial(derivedPwKey, pbkdf2Parms, 16);
    // display the keys – because KeyDerivationProvider always gets cleared after each use, they are very similar unforunately
    string keyMaterialString = CryptographicBuffer.EncodeToBase64String(keyMaterial);
    string saltMaterialString = CryptographicBuffer.EncodeToBase64String(saltMaterial);
    SymmetricKeyAlgorithmProvider symProvider = SymmetricKeyAlgorithmProvider.OpenAlgorithm("AES_CBC_PKCS7");
    // create symmetric key from derived password material
    CryptographicKey symmKey = symProvider.CreateSymmetricKey(keyMaterial);
    // encrypt data buffer using symmetric key and derived salt material
    IBuffer resultBuffer = CryptographicEngine.Decrypt(symmKey, cipherBuffer, saltMaterial);
    string result = CryptographicBuffer.ConvertBinaryToString(BinaryStringEncoding.Utf16LE, resultBuffer);
    return result;
    public static string AES_Encrypt(string input, string pass)
    SymmetricKeyAlgorithmProvider SAP = SymmetricKeyAlgorithmProvider.OpenAlgorithm(SymmetricAlgorithmNames.AesEcbPkcs7);
    CryptographicKey AES;
    HashAlgorithmProvider HAP = HashAlgorithmProvider.OpenAlgorithm(HashAlgorithmNames.Md5);
    CryptographicHash Hash_AES = HAP.CreateHash();
    string encrypted = "";
    try
    byte[] hash = new byte[32];
    Hash_AES.Append(CryptographicBuffer.CreateFromByteArray(System.Text.Encoding.UTF8.GetBytes(pass)));
    byte[] temp;
    CryptographicBuffer.CopyToByteArray(Hash_AES.GetValueAndReset(), out temp);
    Array.Copy(temp, 0, hash, 0, 16);
    Array.Copy(temp, 0, hash, 15, 16);
    AES = SAP.CreateSymmetricKey(CryptographicBuffer.CreateFromByteArray(hash));
    IBuffer Buffer = CryptographicBuffer.CreateFromByteArray(System.Text.Encoding.UTF8.GetBytes(input));
    encrypted = CryptographicBuffer.EncodeToBase64String(CryptographicEngine.Encrypt(AES, Buffer, null));
    return encrypted;
    catch (Exception ex)
    return null;
    public static string AES_Decrypt(string input, string pass)
    SymmetricKeyAlgorithmProvider SAP = SymmetricKeyAlgorithmProvider.OpenAlgorithm(SymmetricAlgorithmNames.AesEcbPkcs7);
    CryptographicKey AES;
    HashAlgorithmProvider HAP = HashAlgorithmProvider.OpenAlgorithm(HashAlgorithmNames.Md5);
    CryptographicHash Hash_AES = HAP.CreateHash();
    string decrypted = "";
    try
    byte[] hash = new byte[32];
    Hash_AES.Append(CryptographicBuffer.CreateFromByteArray(System.Text.Encoding.UTF8.GetBytes(pass)));
    byte[] temp;
    CryptographicBuffer.CopyToByteArray(Hash_AES.GetValueAndReset(), out temp);
    Array.Copy(temp, 0, hash, 0, 16);
    Array.Copy(temp, 0, hash, 15, 16);
    AES = SAP.CreateSymmetricKey(CryptographicBuffer.CreateFromByteArray(hash));
    IBuffer Buffer = CryptographicBuffer.DecodeFromBase64String(input);
    byte[] Decrypted;
    CryptographicBuffer.CopyToByteArray(CryptographicEngine.Decrypt(AES, Buffer, null), out Decrypted);
    decrypted = System.Text.Encoding.UTF8.GetString(Decrypted, 0, Decrypted.Length);
    return decrypted;
    catch (Exception ex)
    return null;
    Both methods shown above are not giving the same result.
    I would require the following scenario :
    Plain Text : "login@123"
    Key : "0123456789abcdef"
    IV : "fedcba9876543210"
    Hex : 356F65678C82C137BDBB2A2C8F824A68
    Encrypted Text : 5oegåÇ¡7Ωª*,èÇJh
    Request you to please suggest alternative to obtain the same AES Encryption using a Key and IV in Windows Phone.
    Thanks in advance.
    Regards,
    Vinay D

    Hi,
    The encryption and decryption in : http://dotnetspeak.com/2011/11/encrypting-and-decrypting-data-in-winrt-2 is
    not giving me the desired result.
    I would require the following scenario :
    Plain Text : "login@123"
    Key : "0123456789abcdef"
    IV : "fedcba9876543210"
    Encrypted Text : 5oegåÇ¡7Ωª*,èÇJh
    But what i am getting from the above link is : 
    I would require the following scenario :
    Plain Text : "login@123"
    Key : "0123456789abcdef"
    IV : "fedcba9876543210"
    Encrypted Text : NW9lZ4yCwTe9uyosj4JKaA==
    As u can see the encrypted string is not the same and hence i would get a different decrypt string on the server.
    I cannot change the server as it is in production and working with Android and IOS.
    Regards,
    Vinay D

  • AES encryption with linux 64

    Hello
    We are using the AES encryption algorithm as one of our systems. To be able to use the AES did the installation of files and local_policy.jar US_export_policy.jar the JVM.
    On Windows and Linux 32-bit func, but did not work on Linux 64. returns the following error message: java.security.InvalidKeyException: Invalid AES key length: 31 bytes.
    The policys above are different JDK for Linux 64?
    What may be happening?

    I would suggest that you have not transferred your key correctly. You should note that keys are binary data and Strings should not be used to store binary data. It is possible that since you are using ASCII the two systems behave differently when converting a String to ASCII bytes. It would not surprise me if characters greater than 0x7f (which are not part of the ASCII set) are converted differently. Maybe somebody fixed a bug. Dump out in hex the bytes of your key created from key.getBytes("ASCII") in both systems and compare the two. I bet they are different.
    P.S. Please enclose the code in a pair of tags when posting code.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   

  • WPA2 AES encryption Key Sizes

    Hi all,
    Just looking at the AES standard, or wiki of it
    http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
    It mentions that AES supports the following (in the notes just at the bottom of the web page)
    Key sizes of 128, 160, 192, 224, and 256 bits are supported by the Rijndael algorithm, but only the 128, 192, and 256-bit key sizes are specified in the AES standard.
    Block sizes of 128, 160, 192, 224, and 256 bits are supported by the Rijndael algorithm, but only the 128-bit block size is specified in the AES standard.
    What does the WLCs use for an AES key size when you enable a WPA2 policy with AES encryption?
    Many thx
    Ken

    128 bits was supported on the autonomous code, so I'm sure the LWAPP solution also uses 128 bits with three possible key lengths 128, 192 and 256 bits.

  • Limit encrypted string length to 20 characters

    Hi,
    How do I limit encrypted string to 20 characters or 'x' number of characters?
    e.g. encrypting "hello" might produce the following out put -> "F1==iI09Poiui7@=1kjuyo" but if I wanted to limit the length 20 characters or less. Is there any
    possibility of doing this? If yes, Can someone help me out?
    Thanks
    Mathew

    mathewrond wrote:
    There are no constraints on input characters.
    I need to encrypt since the input data is confidential.
    The resultant encrypted data length can be equal or less than n* 2. This is because we have defined varchar(n*2) as the maximum length for a column in database, so we cannot have encrypted data beyond the length specified in database.You seem to be confusing characters and bytes.
    A String of length 'm' is transformed to bytes of length >= 'm' depending on the language and encoding scheme. Let us assume one uses utf-8 encoding then for western languages the length will usually be 'm' or just a bit greater than 'm'. For eastern languages this could be as much as '3*m' bytes but usually closer to '2*m' bytes. So, let as take the multiplier to be 'k' .
    Encrypting using a block cipher with a block length 'N' bytes then using PKCS5 padding one will end up with '(k*m/N +1)*N' bytes. If you then Base64 encode these encrypted bytes to convert to characters you will extend the length by a factor of about 4/3 ending up with '(((k*m/N +1)*N + 2)/3)*4' ASCII characters.
    Encrypting using a stream cipher you will end up with 'k*m' bytes which after Base64 encoding will become '((k*m+2)/3)*4' ASCII characters. BUT, of course you will need a different key for each value you encrypt. This makes it much more difficult to use and cannot be recommended.
    Since you have decided on using a varchar to hold the encrypted data you have to use Base64 encoding (or something similar). If you had chosen varbinary then you could have saved yourself the factor of 4/3 .
    Note - all division is assumed to be integer division. e.g. 7/3 == 2

  • Java API to read the Encrypted Values from Windows Registry settings

    Is there any Java API to read the Encrypted Values from Windows Registry settings ?
    My Java Application invokes a 3rd party Tool that writes the key/value to windows registry settings under : “HKLM\Software\<3rdparty>\dataValue”.
    This entry is in BINARY and encrypted with 3DES, using crypto API from Microsoft.
    3rd party software to encrypt the data stored in registry it
    either uses C++ code: and uses the call “CryptProtectData” and “CryptUnProtectData” or
    If it is a .NET (C#) it uses the call “Protect” or “UnProtect” from class “ProtectData” of WinCrypt.h from the library “Crypt32.lib.
    Note: The data is encrypted using auto-generated machinekey and there is no public key shared to decrypt the Encrypted data.
    Since the data is encrypted using auto-generated machinekey the same can be decrypted from a .Net / C++ application using CryptUnprotectData or UnProtect() API of WinCrypt.h from the library “Crypt32.lib.
    To know more about Auto-Generated MachineKey in Windows refer the links below
    http://aspnetresources.com/tools/machineKey
    http://msdn.microsoft.com/en-us/library/ms998288.aspx
    I need to find a way in Java to find the equivalent API to decrypt (CryptUnprotectData) and Microsoft will automatically use the correct key.
    But i couldn't find any informato related to Java APIs to enrypt or decrypt data using auto-generated machinekey.
    Is there a way to read the encrypted data from Windows regsitry settings that is encrypted using the Auto-Generated Machine Key ?
    Kindly let me know if Java provides any such API or mechanism for this.

    If the symmetric key is "auto-generated" and is not being stored anywhere on the machine, it implies that the key is being regenerated based on known values on the machine. This is the same principle in generating 3DES keys using PBE (password-based-encryption). I would review the documentation on the C# side, figure out the algorithm or "seed" values being used by the algorithm, and then attempt to use the JCE to derive the 3DES key using PBE; you will need to provide the known values as parameters to the PBE key-generation function in JCE. Once derived, it can be used to decrypt the ciphertext from the Regiistry in exactly the same way as the CAPI/CNG framework.
    An alternate way for Java to use this key, is to write a JNI library that will call the native Windows code to do the decryption; then the Java program does not need to know details about the key.
    That said, there is a risk that if your code can derive the key based on known seeds, then so can an attacker. I don't know what your applicatiion is doing, but if this is anything related to compliance for some data-security regulation like PCI-DSS, then you will fail the audit (for being unable to prove you have adequate controls on the symmetric key) if a knowledgable QSA probes this design.
    Arshad Noor
    StrongAuth, Inc.

  • Can't open a specific wesite with AES encryption on

    WRT54GX2 router  set up with WPA and AES encryption, will not open a website that I know is working (it's my ISP, webmail site).  When I change to TKIP the site opens normally, but my wireless printer then drops off the network.  Any one have a fix?

    I agree with toomanydonuts suggestion. You can try the steps which toomanydonuts has mentioned and i think that will make your computer and printer work wirelessly.

  • WPA2 Aes encryption on cisco 1121G AP

    hi
    i wanted to increase the security on my 1121G accesspoint by enabling wpa2 with aes encryption. in a test environment i set this up and i configured my wireless client to connect, my wireless client (ibm thinkpad t42p with 11a/b/g Wireless LAN Mini PCI Adapter II has the ability to either select WPA or WPA2 and whether you use TKIP or AES. i selected WPA2 and AES enter the encryption key which i had entered on the AP and i connected,
    i change the settings on the client to WPA and TKIP and entered the same encryption key and i managed to connect as well, which puzzles me, when i enter an incorrect encryption key it won't associate.
    is this normal behaviour or do you think i have configured something incorrectly on the 1121G AP?
    i have attached my config and have removed some personal data.
    many thanks
    rogier

    i have finally figured it out, it is the windows client or mac clients being very smart, if you configure your windows client to use WPA instead of WPA2 and select TKIP instead of AES encryption somehow it figures out this is incorrect and automatically sets the WPA to WPA2 settings and changes TKIP to AES encryption, i am amazed, i finally figured it out when a windows machine which did not have the windows patch to allow it to connect to WPA2 could not connect, only after installing the WPA2 patch would it connect. in the AP log it always showed as logging in with the WPA2 EAS encryption.
    i guess windows xp is a bit smarter than i originally thought

  • How to set a encrypted value on a ConfigurationProperty when working offlin

    So, I have a particular instance of configuration property that I am trying to modify when working on a domain offline, in particular during the configuration of a domain template in final.py.
    wls:/offline>ls()
    -rw- EncryptValueRequired true
    -rw- EncryptedValueEncrypted {3DES}istgZKedh7j6eu/9GdqXMg==
    -rw- Name IntegrityKeyPassword
    -rw- Notes null
    -rw- Value null
    wls:/offline>prompt()
    As I am working in offline mode cmo.setEncryptedValue() doesn't appear to work as it complains there is no such attribute. I can set "Value" but the server only reads the encrypted value so that doesn't help me.
    I did work out how to calculate the encrypted value using weblogic.security.Encryption; but I can't find a set(...) or cmo.setXXX(...) combination that works. It is very likely something very obvious,
    Thanks,
    Gerard Davison

    Hi Gersh
    Sorry for my late reply and thanks for your helpful information.
    I tried the second way of your information and I could configure it.  
    And I 'll try first way of your information.
    Regards,
    Keisuke

  • Accept Certificate when connecting to an SSID with WPA2-AES encryption.

    When I try to Connect my Iphone to an SSID with WPA2-AES encryption,i need to accept the certificate and gets authenticated.When i switchover to different SSID and reconnect again to the same WPA2-AES SSID i do not get the Certificate accept page.
    When i click on the Forget Network and deisconnect from the SSID and re-connect again,i will be prompted to acept the certificate.Is this a normal behavior in Iphone.
    Any suggestions would be greatly appreciated.
    Thanks and regards,
    Sendhil Balakrishnan

    Hi
    with the config i have i seem to be able to login using either tkip or aes, but i don't think i have got mixed mode configured on the AP so it should only accept WPA2-AES encryption but it also accepts TKIP making me believe something is configured incorrectly.
    should i change anything in the config on the AP to only allow WPA2-AES encryption?
    many thanks
    rogier

  • AES Encryption No Longer Working

    Last week we had users complaining that they could no longer connect to wireless.  They were receiving a limited or no connectivity message.  Upon researching the issue, I found that if I removed the AES encryption, from WPA2, users were able to connect again with TKIP.  In speaking to a few admins, they stated that TKIP was the preferred method that was chosen years ago.  My first question is this.....In our WLAN's, we had the options for WPA/TKIP-AES, and WPA2/TKIP-AES.  I'm assuming this would allow the PC to use whichever encryption method was preferred.  However, this doesn't seem to be the case.  The PC chose AES, which caused the issue that they were having.  Would this be something PC based?   I'm assuming the controller only gives the ability.  It won't actually dictate which encryption method is used, unless one of the options is turned off (like we did with AES).  My second question is this....TKIP, being a weaker encryption method, isn't what I want our users using.  How could I migrate to AES?  Are there specific instructions to move from TKIP to AES?  Is it more than just putting a check mark on the AES options, under WLAN security?  Thanks for any help!

    Its best to only use either WPA/TKIP or WPA2/AES, not both or a mix of either.  This does cause issues with devices so its hit or miss.  If you had configured everything for WPA2/TKIP, well... your stuck with a non standard IEEE setting, and you will have to just configure that on the WLC.  It's the same if you were using WPA/AES.  
    The best way to move to a standard, is if your devices were domain machines and you can push out a GPO.  Non domain machines, you would need to manually enter those unless you had a tool that manages them.

  • Enable AES encryption on 1310 Wireless bridge

         Hi All,
        I have requirment to enable the AES encryption on the management VLAN  traffic  between connected root and non root bridges . can any one share the configuration guidelines please ??
    below is the network setup  .
    Router<---->SW1 ( main office)--> Root-bridge < ---------->non root-bride------SW2 ( remote end site)
    Apart from the specific configuration on the wireless bridge is any extra configuration required on the Switch interfaces??
    Regards
    Lerner

    Hello,
    1. Make sure you are running version 12.3(7)JA or later since WPA2/AES was not always available for the 1310.
    2. How do you currently have the root/non-root configured?
    Ideally, adding AES shoudl be fairly straight forward.  Keep in mind we recommend using WPA2 with AES.
    configured on your root AND non-root:
    dot11 ssid
    authentication open
    authentication key-management wpa version 2
    interface do1
    encryption mode ciphers aes-ccm

  • What configurations need to Enable AES encryptions on call on Expressway-e ??

    hi guys
    i've cucm 10.5 without token, on this cucm i've one sx80 registered, the cucm is configured to B2B call using one expressway-c and express-e, the b2b call work fine, but now i need configured aes encrypcion to call from SX80 to internet endpoint and viceversa.
    what configurations i need to enable aes encryptions on expressway-e?
    thanks.

    Which browser are you using? Do you have Enable Java checked in it's preferences? When you get a message it's a good idea to write down exactly what it says rather than dismiss it and wonder later what it said about something.

  • AES Encryption example?

    I'm new to the cryptography area, so bear with me if I get things mixed up a bit.
    Here is what I need to do - using AES encryption.
    I have a stand-alone swing application that I need to encode certain sets of passwords and serial numbers.
    These will be stored in a database and compared against user input strings.
    Basically, I want to be able to store the key for the encryption in the program and use it for the encoding
    and decoding.
    I realize this is probably not the best way to handle this, but the security is not all that critical for this application.
    Basically we just don't want someone fetching the data from the database without having to use the application to decrypt it.
    I have seen several examples where a SecretKeySpec gets generated for each time the example is run,
    an example is http://java.sun.com/developer/technicalArticles/Security/AES/AES_v1.html
    but I have not been able to find anything where a "static" key is used for the encryption/decryption.
    Can someone help me out here?
    Thanks.

    From your usage description, there is no need to encrypt anything. Just store a hash (MD5, SHA-1, SHA256 etc) of the passwords and serial numbers. You then compare the hash of whatever the user enters with the hash stored in the DB.

  • Aironet 1252 AES encryption

    Dear all
    I have two cisco airenet 1252 autonamous access point that are configured as  point to point bridge. Now I want to confiure AES encryption or WPA2 using a pre-shared key however I do not see the option to do this . The only option I see under ciphers are:
    wep 128
    wep 40
    TKIP
    CKIP
    CMIC
    CKIP-CMIC
    TKIP+WEP 128
    TKIP+WEP 40
    AES CCMP
    AES CCMP + TKIP
    AES CCMP + TKIP + WEP 128
    AES CCMP + TKIP + WEP 40
    Is it possible to use either AES or WPA2 using a pre-shared key  on the 1252 autonamous access point? If possible please provide instruction preferably using the web interface.
    Regards,
    Screech

    Sure ..
    This is WPA2 Enterprise -- but you will see the PSK commands below
    http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a008054339e.shtml
    If you dont see these commands tehn you need to update your code.
    - Go to Security > Encryption Manager > Select Cipher > AES CCMP from the drop down menu > Apply
    - Go to Security > SSID Manager > Select (or create) the SSID > Link the SSID to the radio that you want
    - Open authentication should be selected
    - Key Management should be set to Mandatory
    - "Enable WPA" needs to be checked
    - Enter the Pre-Shared Key on the "WPA                                        Pre-shared Key" field.
    - Scroll down and click on the first apply (not the bottom one).
    "Satisfaction does not come from knowing the solution, it comes from knowing why." - Rosalind Franklin
    ‎"I'm in a serious relationship with my Wi-Fi. You could say we have a connection."

Maybe you are looking for

  • IPhone Calendar does not show all outlook events

    I have an iPhone 4. On my iPhone calendar, random events will be missing. My Outlook, ipad, and even iPod will all show the events. I have deleted and recreated the exchange mail & calendar. There is even other iphones on my same server who do NOT ha

  • Populating dates in a PDF form

    I am fairly new to Acrobat, so there may be a way to do this. I have an Excel form that I need to convert to a fillable PDF form. The problem I'm having is that I need a date to populate some fields when it is entered in a different field. I have a p

  • How to get a HD movie on to a DVD to use on a TV and keep the integrity of the video

    I made a high quality movie in aperture which I exported to the desktop as a Quicktime movie.   Then I created a One Step DVD from the movie.  The movie is 12 gb and the disk and it plays well on a HD TV through an HDMI cable.  I have been trying to

  • My touchsmart HP Pavilion 14N073CA has only HDMI

    Hey guys. ! have finished coding a project, and i'm about to present !t with a project0r in my university in order to gratuate. !'ve b0ught a new laptop, this touchsmart from canada, and i cared less for the details. now after ! finished my coding, i

  • Copy and then Past an Image into an APEX Application

    I need to allow my users to copy an image and then simply past it into my APEX application. Much like copy and past for text. Can this be done?