TKIP: Temporal Key Integrity Protocol (temporary key integration Protocol) is used to encrypt wireless security issues. TKIP is a layer of "shell" wrapped around the existing WEP password ", this encryption method eliminates known WEP disadvantages while using the WEP algorithm as much as possible. For example, the length of the key used by the WEP password is 40 BITs and 128 bits, the 40-bit key is very easy to crack, and all users in the same LAN share the same key. Losing a key will make the entire network insecure. The length of the key used by the TKIP password is 128 bits, which solves the problem that the length of the key used by the WEP password is too short. Another important feature of TKIP is to change the key used by each packet, which is the source of "dynamic" in its name. A key is generated by mixing multiple factors, including the basic key (pair-to-instantaneous key in TKIP), the MAC address of the transmitting station, and the serial number of the data packet. Hybrid operations are designed to minimize the requirements for wireless sites and access points, but still have sufficient password strength to prevent it from being easily decrypted. Another disadvantage of WEP is "replay attacks". Each packet transmitted using TKIP has a unique 48-bit serial number, because the 48-bit serial number takes thousands of years to repeat, no one can replay the old data packets from wireless connections: Because the serial number is incorrect, these data packets will be detected as out-of-order packets.
AES: Advanced Encryption Standard (Advanced Encryption Standard) is a standard used by the National Institute of Standards and Technology to encrypt electronic data, this algorithm combines the advantages of simple design, fast key installation, less memory space required, good operation on all platforms, support for parallel processing, and resistance to all known attacks. AES is an iterative and symmetric key group password that uses 128, 192, and 256-bit keys and uses 128-bit (16-byte) groups to encrypt and decrypt data. Unlike the public key pair, the symmetric key uses the same key to encrypt and decrypt data. The number of digits of the encrypted data returned by the group password is the same as that of the input data. Iterative encryption uses a loop structure in which input data is repeatedly replaced (permutations) and replaced (substitutions.
All in all, AES provides more advanced encryption technology than TKIP, And now wireless routers provide these two algorithms, but prefer AES. TKIP is not as secure as AES, And the throughput of the vro decreases by 3 to 5 when the TKIP algorithm is used, which greatly affects the performance of the vro.