If you want to know how to protect our wireless network, you should first understand the mainstream wireless encryption methods, that is, the WEP, WPA, WPA2, and WPA + WPA2 encryption methods often appear in the security settings of wireless routers.
WEP (Wired Equivalent Privacy, Equivalent Wired confidentiality ). A Data Encryption Algorithm that provides protection capabilities equivalent to wired LAN. Its security technology comes from the RSA Data Encryption technology named RC4 and is a necessary security protection layer for WLAN. Currently, 64-bit WEP encryption and 128-bit WEP encryption are common.
WPA (WiFi Protected Access, Wi-Fi network security Access ). The WPA protocol is a system that protects the security of wireless networks (WiFi). It is generated based on the previous generation of Wired Equivalent encryption (WEP) and solves the defects of the former WEP, it uses TKIP (temporary Key Integrity) protocol, which is IEEE 802. Transition Plan in 11i standard. The WPA-PSK mainly targets individual users.
WPA2, an upgraded version of WPA encryption. It is an IEEE 802 verified by the Wi-Fi Alliance. The 11i standard authentication form, WPA2 achieves 802. Mandatory elements of 11i, especially the Michael algorithm, are recognized as completely secure CCMP (full code protocol for block Chain messages in counter mode) the message authentication code is replaced, and the RC4 encryption algorithm is also replaced by AES (Advanced Encryption.
WPA-PSK + WPA2-PSK. It can be seen from the literal that the last one is the combination of the two encryption algorithms. WPA-PSK is also called WPA-Personal (WPA individual ). The WPA-PSK uses the TKIP encryption method to connect wireless devices and access points. The WPA2-PSK uses AES encryption to connect wireless devices with access points.
Several mainstream encryption algorithms used in wireless devices have been listed and described one by one. Are there any advantages or disadvantages for these security modes? Which security mode should users choose during use? Will they affect the speed of wireless transmission? Let's take a look.
1. WEP better than none
As an old-fashioned encryption method, WEP features a static key to encrypt all communications. This means that if the administrator wants to update the key, each host must be accessed in person, and the RSA Data Encryption technology of RC4 is predictable. It is easy for intruders to intercept and crack encryption keys, so that users' security protection is ineffective, therefore, we do not recommend that you select this security mode if you do not have.
2. Upgraded WPA
After WEP, people will expect to switch to the upgraded WPA. Unlike the previous static keys of WEP, WPA requires constant conversion of keys. WPA uses an effective key distribution mechanism to implement applications across wireless network adapters of different vendors. As an upgraded version of WEP, it is more secure than WEP, mainly reflected in identity authentication, encryption mechanism and packet inspection, and also improves the management capability of wireless networks.
3. endless pursuit: WPA2
WPA2 is an IEEE 802 verified by the Wi-Fi Alliance. The 11i standard authentication form, WPA2 achieves 802. The mandatory elements of 11i, especially the Michael algorithm, have been replaced by the fully secure CCMP (complete code protocol for the counter mode blockchain message) message authentication code, and the RC4 encryption algorithm has also been replaced by AES.
Currently, WPA2 provides excellent security protection capabilities. As long as your wireless network devices support WPA2 encryption, congratulations! Your wireless network is very secure.
4, strong cooperation: WPA-PSK + WPA2-PSK
As the saying goes, the mountains outside the building has a building, strong in its own strong hands, although WPA2 security protection capabilities are very good, but WPA-PSK (TKIP) + WPA2-PSK (AES) option is more superior than it, however, it is not absolutely perfect. Due to the compatibility problem of this encryption mode, it is difficult to connect normally after the configuration is complete, so it is somewhat flashy. You need to consider it before choosing.
Edit recommendations]