Introduction to wireless network encryption protocols used in wireless encryption

Source: Internet
Author: User
Keywords Wireless encryption
Tags communication communication protocol data information key network network encryption operation security
The following article is mainly about wireless encryption is commonly used in wireless network encryption protocol, in the actual operation of the widely used wireless network encryption protocol mainly includes WEP encryption protocol and WPA encryption protocol two. The widely used wireless network encryption protocol mainly includes WEP encryption protocol and WPA encryption protocol. WEP protocol is also called Wired Equivalent encryption protocol, this kind of wireless communication protocol is often those who are eager to produce and sell wireless equipment in a relatively short period of time to put together the informal wireless encryption communication standards, from the current view of the wireless network encryption protocol There are a considerable number of security vulnerabilities exist, The wireless data information used in this encryption protocol is vulnerable to attack; The WPA protocol is also known as the Wi-Fi Protection Access Protocol, which is typically used to improve or replace a WEP encryption protocol with a significant security vulnerability that can be used to encrypt the transmission of data information using two techniques, One technique is the temporary key Integrity Technology (TKIP), under which the WPA encryption protocol uses a 128-bit key, while clicking a mouse for each packet can achieve the purpose of changing the key. The encryption technology can be compatible with current wireless hardware devices and WEP encryption protocols; another technology is Extensible Authentication Technology (EAP), which provides wireless users with more secure and flexible network access with this technical support, and is more secure and advanced than the WEP protocol. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' style= ' width:580px; Height:394px "alt=" wireless encryption commonly used in wireless network encryption Protocol "srcwidth=" 580 "srcheight=" 394 "zoomrate=" 1 "src=" http://images.51cto.com/files /uploadimg/20100927/1649300.jpg "/> Above the relevant content is the wireless encryption of the commonly used wireless network encryption protocol introduced, hope you can have some harvest." "Responsible editor: Sun Chaohua TEL: (010) 68476606" Original: Introduction to wireless network encryption protocol used in radio encryption return to network security home

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.