Popular Wi-Fi encryption methods

Source: Internet
Author: User

If you want to know how to protect our wireless network, you should first understand the mainstream wireless encryption methods, that is, the WEP, WPA, WPA2, and WPA + WPA2 encryption methods often appear in the security settings of wireless routers.

WEP (Wired Equivalent Privacy, Equivalent Wired confidentiality ). A Data Encryption Algorithm that provides protection capabilities equivalent to wired LAN. Its security technology comes from the RSA Data Encryption technology named RC4 and is a necessary security protection layer for WLAN. Currently, 64-bit WEP encryption and 128-bit WEP encryption are common.

WPA (WiFi Protected Access, Wi-Fi network security Access ). The WPA protocol is a system that protects the security of wireless networks (WiFi). It is generated based on the previous generation of Wired Equivalent encryption (WEP) and solves the defects of the former WEP, it uses TKIP (temporary Key Integrity) protocol, which is IEEE 802. Transition Plan in 11i standard. The WPA-PSK mainly targets individual users.

WPA2, an upgraded version of WPA encryption. It is an IEEE 802 verified by the Wi-Fi Alliance. The 11i standard authentication form, WPA2 achieves 802. Mandatory elements of 11i, especially the Michael algorithm, are recognized as completely secure CCMP (full code protocol for block Chain messages in counter mode) the message authentication code is replaced, and the RC4 encryption algorithm is also replaced by AES (Advanced Encryption.

WPA-PSK + WPA2-PSK. It can be seen from the literal that the last one is the combination of the two encryption algorithms. WPA-PSK is also called WPA-Personal (WPA individual ). The WPA-PSK uses the TKIP encryption method to connect wireless devices and access points. The WPA2-PSK uses AES encryption to connect wireless devices with access points.

Several mainstream encryption algorithms used in wireless devices have been listed and described one by one. Are there any advantages or disadvantages for these security modes? Which security mode should users choose during use? Will they affect the speed of wireless transmission? Let's take a look.

1. WEP better than none

As an old-fashioned encryption method, WEP features a static key to encrypt all communications. This means that if the administrator wants to update the key, each host must be accessed in person, and the RSA Data Encryption technology of RC4 is predictable. It is easy for intruders to intercept and crack encryption keys, so that users' security protection is ineffective, therefore, we do not recommend that you select this security mode if you do not have.

2. Upgraded WPA

After WEP, people will expect to switch to the upgraded WPA. Unlike the previous static keys of WEP, WPA requires constant conversion of keys. WPA uses an effective key distribution mechanism to implement applications across wireless network adapters of different vendors. As an upgraded version of WEP, it is more secure than WEP, mainly reflected in identity authentication, encryption mechanism and packet inspection, and also improves the management capability of wireless networks.

3. endless pursuit: WPA2

WPA2 is an IEEE 802 verified by the Wi-Fi Alliance. The 11i standard authentication form, WPA2 achieves 802. The mandatory elements of 11i, especially the Michael algorithm, have been replaced by the fully secure CCMP (complete code protocol for the counter mode blockchain message) message authentication code, and the RC4 encryption algorithm has also been replaced by AES.

Currently, WPA2 provides excellent security protection capabilities. As long as your wireless network devices support WPA2 encryption, congratulations! Your wireless network is very secure.

4, strong cooperation: WPA-PSK + WPA2-PSK

As the saying goes, the mountains outside the building has a building, strong in its own strong hands, although WPA2 security protection capabilities are very good, but WPA-PSK (TKIP) + WPA2-PSK (AES) option is more superior than it, however, it is not absolutely perfect. Due to the compatibility problem of this encryption mode, it is difficult to connect normally after the configuration is complete, so it is somewhat flashy. You need to consider it before choosing.

Edit recommendations]

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.