WiFi Wireless all kinds of encryption way big competition

Source: Internet
Author: User

Where there is privacy, there is security protection. Encryption as an important security protection means, in the application of wireless network is extremely. With the popularity of wireless networks, in shopping malls, streets, restaurants to search for wireless signals is not surprising, these wireless hotspots are generally free to provide wireless networks for everyone to use, do not encrypt the signal. But for families, it's not a pleasant thing to have a broadband network that pays for itself without the wireless signal being encrypted and consuming a lot of bandwidth. For enterprises, wireless signal is absolutely not to the enterprises outside the reception.





all wireless networks provide some form of encryption. But wireless routers, wireless APs, or repeater wireless signal range is very difficult to control accurately, outside is also a great opportunity to access the wireless network, once they can access the internal network, the network is all the data transmission is transparent to them. If these data are not encrypted, hackers can use a number of packet sniffing tools to grasp the packet, analyze and peek into the privacy. Turn on wireless network encryption so that even if the data you transmit on the wireless network is intercepted, there is no way (or is not so easy) to read.





Two commonly used encryption WEP, WPA





Currently, several encryption technologies exist in wireless networks, most commonly using WEP and WPA two encryption methods. The first security protocol for wireless LANs, -802.11 Wired Equivalent Privacy (WEP), has been challenged by people. Although WEP prevents prying people from entering the wireless network, there is reason to suspect it is safe because WEP is easy to crack, like a plastic lock on a door.





WEP Secure encryption method




The RC4 PRNG algorithm developed by RSA Data security company is used in the
WEP feature. All known as Wired Peer-to-peer privacy (the Wired equivalent PRIVACY,WEP) is a data encryption algorithm for providing protection equivalent to a wired LAN. Using the technology's wireless LAN, the data for all clients and wireless access points is encrypted with a shared key, with a key length of 40 bits to 256 digits, and the longer the key, the more time the hacker needs to crack and thus provide better security protection.





WPA Secure encryption Method





WPA encryption, which is Wi-Fi Protected Access, has an encryption feature that makes it more difficult to invade than WEP, so if you have high data security requirements, you must choose WPA encryption (Windows XP SP2 already supports WPA encryption).





WPA, an upgraded version of the IEEE 802.11 universal encryption mechanism WEP, is more sophisticated on security protection than WEP, mainly in the areas of identity authentication, encryption mechanisms and packet checking, and it also improves the management of wireless networks.





WPA, wep contrast





WPA differs from WEP in that WEP uses a static key to encrypt all traffic. WPA's constant conversion key. WPA uses an effective key distribution mechanism to implement applications across different vendors ' wireless cards. Another advantage of WPA is that it makes it possible to securely deploy wireless networks in public and academic environments. Until then, these places have been unable to use WEP. The disadvantage of WEP is that its encryption key is a static key and not a dynamic key. This means that in order to update the key, IT personnel must personally access each machine, which is not possible in an academic environment or public place. Another option is to keep the key unchanged, which makes the user vulnerable to attack. Due to interoperability issues, the academic environment and public places have been unable to use proprietary security mechanisms.





WPA2: The strongest wireless encryption technology at the moment





WPA2 is the authentication form of the IEEE 802.11i standard validated by the WiFi Federation, WPA2 implements 802.11i mandatory elements, especially the Michael algorithm is generally recognized as completely safe ccmp (counter mode cipher block chain message Integrity Code protocol) message authentication codes replaced, The RC4 encryption algorithm is also replaced by AES.





in WPA/WPA2, PTK generation is dependent on PMK, and there are two ways of PMK, one is PSK mode, that is, preshared key mode (pre-shared Key,psk, also known as personal mode), in this way PMK=PSK; The other way requires authentication servers and sites to negotiate to produce PMK. Here's a formula to see the difference between WPA and WPA2:





WPA = IEEE 802.11i Draft 3 = IEEE 802.1x/eap + WEP (selective project)/tkip





WPA2 = IEEE 802.11i = IEEE 802.1x/eap + WEP (selective project)/tkip/ccmp





currently WPA2 encryption is very good security protection, as long as your wireless devices are supported WPA2 encryption, then you will experience the most secure wireless network life. Even the current hottest "RUB network card" also difficult to rub into your wireless network, users can rest assured that use.




is there a stronger encryption mode for
?





Perhaps some users have noticed that there is a WPA-PSK (TKIP) +WPA2-PSK (AES) option in the wireless network encryption mode without wires, is it more encryption than WPA2? The answer is yes, this is really the strongest wireless encryption method at the moment, However, since the compatibility of this encryption mode is problematic, it is difficult to connect properly after Setup is complete, so it is not recommended for ordinary users to select this encryption method.





Summary: Please watch your wireless network





through the above introduction, I believe that you have a wireless network of three encryption methods WEP, WPA, WPA2 have a more comprehensive understanding. For ordinary wireless users, we recommend that you choose WPA-PSK (TKIP) and WPA2-PSK (AES) Two encryption methods, they can maximize the security of your wireless network is the best choice at this stage, but if your wireless network card does not support WPA/WPA2 encryption, Then 128-bit WEP encryption will be your security protection line.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.