Where there is privacy, there is security protection. Encryption as an important security protection means, in the application of wireless network is extremely. With the popularity of wireless networks, in shopping malls, streets, restaurants to search for wireless signals is not surprising, these wireless hotspots are generally free to provide wireless networks for everyone to use, do not encrypt the signal. But for families, it's not a pleasant thing to have a broadband network that pays for itself without the wireless signal being encrypted and consuming a lot of bandwidth. For enterprises, wireless signal is absolutely not to the enterprises outside the reception.
all wireless networks provide some form of encryption. But wireless routers, wireless APs, or repeater wireless signal range is very difficult to control accurately, outside is also a great opportunity to access the wireless network, once they can access the internal network, the network is all the data transmission is transparent to them. If these data are not encrypted, hackers can use a number of packet sniffing tools to grasp the packet, analyze and peek into the privacy. Turn on wireless network encryption so that even if the data you transmit on the wireless network is intercepted, there is no way (or is not so easy) to read.
Two commonly used encryption WEP, WPA
Currently, several encryption technologies exist in wireless networks, most commonly using WEP and WPA two encryption methods. The first security protocol for wireless LANs, -802.11 Wired Equivalent Privacy (WEP), has been challenged by people. Although WEP prevents prying people from entering the wireless network, there is reason to suspect it is safe because WEP is easy to crack, like a plastic lock on a door.
WEP Secure encryption method
The RC4 PRNG algorithm developed by RSA Data security company is used in the
WEP feature. All known as Wired Peer-to-peer privacy (the Wired equivalent PRIVACY,WEP) is a data encryption algorithm for providing protection equivalent to a wired LAN. Using the technology's wireless LAN, the data for all clients and wireless access points is encrypted with a shared key, with a key length of 40 bits to 256 digits, and the longer the key, the more time the hacker needs to crack and thus provide better security protection.
WPA Secure encryption Method
WPA encryption, which is Wi-Fi Protected Access, has an encryption feature that makes it more difficult to invade than WEP, so if you have high data security requirements, you must choose WPA encryption (Windows XP SP2 already supports WPA encryption).
WPA, an upgraded version of the IEEE 802.11 universal encryption mechanism WEP, is more sophisticated on security protection than WEP, mainly in the areas of identity authentication, encryption mechanisms and packet checking, and it also improves the management of wireless networks.
WPA, wep contrast
WPA differs from WEP in that WEP uses a static key to encrypt all traffic. WPA's constant conversion key. WPA uses an effective key distribution mechanism to implement applications across different vendors ' wireless cards. Another advantage of WPA is that it makes it possible to securely deploy wireless networks in public and academic environments. Until then, these places have been unable to use WEP. The disadvantage of WEP is that its encryption key is a static key and not a dynamic key. This means that in order to update the key, IT personnel must personally access each machine, which is not possible in an academic environment or public place. Another option is to keep the key unchanged, which makes the user vulnerable to attack. Due to interoperability issues, the academic environment and public places have been unable to use proprietary security mechanisms.
WPA2: The strongest wireless encryption technology at the moment
WPA2 is the authentication form of the IEEE 802.11i standard validated by the WiFi Federation, WPA2 implements 802.11i mandatory elements, especially the Michael algorithm is generally recognized as completely safe ccmp (counter mode cipher block chain message Integrity Code protocol) message authentication codes replaced, The RC4 encryption algorithm is also replaced by AES.
in WPA/WPA2, PTK generation is dependent on PMK, and there are two ways of PMK, one is PSK mode, that is, preshared key mode (pre-shared Key,psk, also known as personal mode), in this way PMK=PSK; The other way requires authentication servers and sites to negotiate to produce PMK. Here's a formula to see the difference between WPA and WPA2:
WPA = IEEE 802.11i Draft 3 = IEEE 802.1x/eap + WEP (selective project)/tkip
WPA2 = IEEE 802.11i = IEEE 802.1x/eap + WEP (selective project)/tkip/ccmp
currently WPA2 encryption is very good security protection, as long as your wireless devices are supported WPA2 encryption, then you will experience the most secure wireless network life. Even the current hottest "RUB network card" also difficult to rub into your wireless network, users can rest assured that use.
is there a stronger encryption mode for
?
Perhaps some users have noticed that there is a WPA-PSK (TKIP) +WPA2-PSK (AES) option in the wireless network encryption mode without wires, is it more encryption than WPA2? The answer is yes, this is really the strongest wireless encryption method at the moment, However, since the compatibility of this encryption mode is problematic, it is difficult to connect properly after Setup is complete, so it is not recommended for ordinary users to select this encryption method.
Summary: Please watch your wireless network
through the above introduction, I believe that you have a wireless network of three encryption methods WEP, WPA, WPA2 have a more comprehensive understanding. For ordinary wireless users, we recommend that you choose WPA-PSK (TKIP) and WPA2-PSK (AES) Two encryption methods, they can maximize the security of your wireless network is the best choice at this stage, but if your wireless network card does not support WPA/WPA2 encryption, Then 128-bit WEP encryption will be your security protection line.