Wifi encryption and three security modes

With the development of science and technology, wireless technology is developing rapidly. Which wireless technologies do you know? We've heard the most about wifi and bluetooth. At present, with the increase of wifi coverage, more and more people are using wifi to surf the Internet. At home, restaurants, cinemas and other places are covered with wifi network, which is very important for our online demand. You may not hesitate to use wifi, whether it's safe or not, important to connect to the Internet and do what you love, which is the best. But with the development of science and technology, the security of wifi is becoming more and more serious, and the unsafe wifi will steal your information, even property, and you don't worry about it? If you suffer from unsafe wifi, I suggest you use a wifi jammer diy. You can protect your router and information security very well. So first you should know about the encryption of wifi and its three modes, here is your introduction.

Currently, there are several encryption technologies in the wireless network, and the most commonly used are WEP and WPA encryption methods. The wireless LAN's first security protocol, 802.11 Wired Equivalent Privacy (WEP), has been challenged. While WEP can stop a snooper from entering the wireless network, there is reason to doubt its security, because WEP is very easy to crack, like a plastic lock on the door.

WEP secure encryption mode

The rc4 PRNG algorithm developed by security company is used in WEP feature. Wired Equivalent Privacy (WEP) is a data encryption algorithm used to provide the protection capability Equivalent to a Wired LAN. Using the technology of wireless local area network (LAN), all the client and the wireless access point data to a Shared secret key to encrypt, the length of the key has 40 to 256 two kinds, the longer the key, hackers will need more time to them, thus can provide better security protection.

WPA secure encryption mode

WPA encryption the wi-fi Protected Access, the encryption features made it more difficult to invasion than WEP, so if you have a high request for data security, it must choose WPA encryption approach (Windows XP SP2 has supported WPA encryption).
WPA as IEEE 802.11 general upgrade of WEP encryption mechanism, on the safety of protection more carefully than WEP, mainly reflected in the aspects such as identity authentication, encryption mechanism and packet inspection, and it also improve the management capacity of the wireless network.

Comparison between WPA and WEP

Unlike WEP, WPA uses a static key to encrypt all communications. WPA constant conversion key. WPA adopts effective key distribution mechanism, which can be used in wireless network card application of different manufacturers. Another advantage of WPA is that it makes it possible to safely deploy wireless networks in public places and academic environments. Until then, they had been unable to use WEP. The drawback of WEP is that its encryption key is a static key rather than a dynamic key. This means that in order to update the key, the IT staff must personally visit each machine, which is not possible in the academic environment and public places. Another way is to keep the key constant, which makes it vulnerable to attack. Due to interoperability issues, the academic environment and public places have been unable to use proprietary security mechanisms.

Working principle of WPA

The WPA includes the Temporal Key Integrity Protocol (TKIP) and the 802.1x mechanism. TKIP provides dynamic key encryption and mutual authentication for mobile clients together with 802.1 x. WPA prevents hackers from hacking by generating unique encryption keys for each client on a regular basis. TKIP for WEP introduces a new algorithm, the new algorithm includes the extended 48 initial vector and the related rules of the sequence, packet key building, and information integrity code key generation and distribution function (also known as the "Michael" code). In the application, the WPA can be connected to a authentication server (such as remote authentication dialing into a user service) using 802.1x and EAP (a validation mechanism). This authentication server is used to hold the user certificate. This functionality enables effective authentication control and integration with existing information systems. Because WPA has the ability to run "pre-shared key mode", the WPA deployment in the SOHO environment does not require authentication servers. Like WEP, a client in advance Shared key (often referred to as the "password") should be preserved and access points in the pre Shared key match first, access points using the password authentication, if the password, the client is allowed to access to the access point.

WPA makes up for the security of WEP

In addition to the inability to resolve denial of service (DoS) attacks, WPA compensates for other security issues with WEP. By sending at least two packets of error keys per second, a hacker can disable a network that is protected by the WPA. When this happens, the access point will assume that trying to hack into the network, the access point will all connection is closed, one minute in order to avoid damage to network resources, the connection of illegal data served prevented network run indefinitely, this means that the user should be the backup process ready for critical applications.

The encryption of wifi network is very safe in the early stage, but as technology advances, the hacker has already broken the basic encryption method, so that our wifi can be a certain security problem, especially public wifi, what has the advantages and disadvantages of the public free wifi?