Two common encryption methods: WEP and WPA
Currently,WirelessThere are already several encryption technologies in the network. WEP and WPA are the most common encryption methods. 802.11 Wired Equivalent Privacy (WEP), the first security protocol for a wireless LAN, has been questioned. Although WEP can prevent hackers from entering the wireless network, there is still reason to doubt its security, because WEP is very easy to crack, just like a plastic lock on the door.
WEP Security Encryption Method
The WEP feature uses the rc4 prng algorithm developed by rsa Data security companies. Wired Equivalent Privacy (WEP) is a data encryption algorithm used to provide protection capabilities Equivalent to Wired LAN. When this technology is used in the wireless LAN, all client and Wireless Access Point Data are encrypted with a shared key. The key length ranges from 40 to 256 bits. The longer the key, hackers need more time to crack, so they can provide better security protection.
WPA security encryption
WPA encryption is Wi-Fi Protected Access. Its encryption feature makes it more difficult to intrude than WEP. Therefore, if there is a high requirement on data security, you must use the WPA encryption method (Windows XP SP2 already supports the WPA encryption method ).
As an upgraded version of IEEE 802.11's general encryption mechanism WEP, WPA is more secure than WEP, mainly reflected in identity authentication, encryption mechanism and packet inspection, it also improves the management capability of wireless networks.
Comparison of WPA and WEP
Unlike WEP, WPA uses a static key to encrypt all communications. WPA continuously converts keys. WPA uses an effective key distribution mechanism to implement applications across wireless network adapters of different vendors. Another advantage of WPA is that it makes it possible to securely deploy wireless networks in public and academic environments. Before that, WEP was never used in these sites. The disadvantage of WEP is that its encryption key is a static key rather than a dynamic key. This means that in order to update the key, IT personnel must access each machine in person, which is impossible in the academic environment and in public places. Another way is to keep the key unchanged, which makes the user vulnerable to attacks. Due to interoperability problems, academic environments and public places have never been able to use proprietary security mechanisms.
The most powerful wireless encryption technology "WPA2"
WPA2 is an IEEE 802.11i standard authentication form verified by the WiFi alliance. WPA2 implements the mandatory element of 802.11i, in particular, the Michael algorithm is replaced by the fully-secure CCMP (full code protocol for block Chain messages in counter mode) message authentication code, and the RC4 encryption algorithm is also replaced by AES.
In WPA/WPA2, PTK generation depends on PMK, while PMK can be generated in either of the following ways: PSK, that is, the pre-shared key mode (pre-shared key, PSK, also known as the personal mode). In this mode, PMK = PSK; another method is to authenticate the server and the site for negotiation to generate a PMK. The following describes the differences between WPA and WPA2 through the formula:
WPA = IEEE 802.11i draft 3 = IEEE 802.1X/EAP + WEP (selective project)/TKIP
WPA2 = IEEE 802.11i = IEEE 802.1X/EAP + WEP (selective project)/TKIP/CCMP
Currently, WPA2 provides excellent security protection capabilities. As long as your wireless devices support WPA2 encryption, you will experience the safest wireless network life. Even the most popular "primary network card", it is difficult for users to integrate your wireless network.
Is there a stronger encryption mode?
Maybe some users have noticed that there is a WPA-PSK (TKIP) + WPA2-PSK (AES) option in the wireless network encryption mode of wireless routing, is it a stronger encryption method than WPA2? The answer is yes. This is indeed the most powerful wireless encryption method at present. However, due to compatibility issues with this encryption mode, it is difficult to connect properly after the configuration is complete, therefore, this encryption method is not recommended for normal users.
WEP, WPA, and WPA2 have been introduced. I believe you have a better understanding of the three encryption methods in wireless networks. For ordinary wireless users, we recommend that you choose WPA-PSK (TKIP) and WPA2-PSK (AES) encryption, they can maximize your wireless network security, it is the best choice at this stage. However, if your wireless network card does not support WPA/WPA2 encryption, the 128-bit WEP encryption method will be the bottom line of your security protection.