Layer-4 wireless encryption

Source: Internet
Author: User

Wireless encryption is commonplace. For wireless users, encryption does not play any role, but can only prevent general security problems. However, in terms of password cracking, our encryption method is a fragile piece of paper. However, we must learn more about wireless encryption methods to protect our networks.

Wireless encryption method 1: WEP Encryption

A moderate-tech wireless hacker can quickly crack WEP encryption within two to three minutes. Although WEP has been proven to be outdated and inefficient, it is still supported in many modern wireless access points and routers.

In addition, it is still one of the most popular encryption methods used by individuals or companies. If you are using WEP wireless network encryption technology, if you pay great attention to the security of your network, do not use WEP as much as possible in the future, because it is really not very secure.

Wireless encryption method 2: WPA-PSK (TKIP) Encryption

Prior to the launch of the standard, the Wi-Fi alliance developed a security mechanism called WPA (Wi-FiProctedAccess) based on the draft 802.11i. It uses TKIP (temporary Key Integrity Protocol ), it uses the encryption algorithm RC4 used in WEP, so it does not need to modify the hardware of the original wireless device. WPA has the following problems in WEP: IV is too short, key management is too simple, and there is no effective protection for message integrity. The network security is improved through software upgrade.

WPA specifies two application modes: Enterprise mode and home mode (including small office ). Based on the two different application modes, WPA authentication also has two different methods.

For applications of large enterprises, "802.1x + EAP" is often used, and users provide the creden。 required for authentication. However, for some small and medium-sized enterprise networks or home users, WPA also provides a simplified mode that does not require dedicated Authentication servers. This mode is called "WPA pre-shared key (WPA-PSK)", which requires only one key in advance on each WLAN node (AP, wireless router, Nic, etc.

Wireless encryption method 3: WPA2-PSK (AES)

WPA2 is actually the second version of WPA. The reason why two versions of WPA appear is the commercial operation of the Wi-Fi Alliance.

Wireless encryption method 4: WPA-PSK (TKIP) + WPA2-PSK (AES)

This is the highest encryption mode in the current wireless route. Currently, this encryption mode is not used by many users due to compatibility issues. Currently, WPA-PSK (TKIP) and WPA2-PSK (AES) encryption modes are the most widely used. We believe that the encrypted wireless network will make our users feel at ease surfing the Internet.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.