Refused to be smashed by the wireless network encryption method

  

I don't know if you have been plagued by the nuisance of the network card, in fact, as long as you set up your own network, the network card will be invisible, the most important is still encryption In terms of methods, ordinary encryption methods can't resist the NIC or some hackers. Today, teach you how to encrypt.

So, how to protect our wireless network security? The most direct way is to give our wireless security lock, which is to set a password for our wireless network, which is equivalent to a The key, the user can hold this key to access our wireless network, so the hard-hitting person has to be "indecent".

To know how to protect our wireless network, first of all, we must first understand the mainstream wireless encryption method, which is WEP, WPA, WPA2 and the security settings often found in wireless routers. WPA+WPA2 encryption methods.

WEP (Wired Equivalent Privacy). A data encryption algorithm used to provide protection equivalent to wired LAN. Its security technology is derived from RSA data encryption technology called RC4, which is the necessary security layer for wireless LAN WLAN. Currently common are 64-bit WEP encryption and 128-bit WEP encryption.

WPA (WiFi Protected Access). The WPA protocol is a system that protects wireless network (WiFi) security. It is based on the previous generation of Wired Equivalent Privacy (WEP) and solves the problem of the predecessor WEP. It uses TKIP (Temporal Key Integrity). The protocol is a transitional solution in the IEEE 802.11i standard. Among them, WPA-PSK is mainly for individual users.

WPA2, an upgraded version of WPA encryption. It is the authentication form of the IEEE 802.11i standard verified by the WiFi Alliance. WPA2 implements the mandatory element of 802.11i. In particular, the Michael algorithm is recognized as a completely secure CCMP (Counter Mode Cipher Block Chain Message Complete Code Protocol) message authentication code. Instead, the RC4 encryption algorithm is also replaced by AES (Advanced Encryption).

WPA-PSK+WPA2-PSK. It can be seen from the literal, it is obvious that the last one is a combination of two encryption algorithms, which can be said to be a strong combination. WPA-PSK is also called WPA-Personal (WPA Personal). WPA-PSK uses TKIP encryption to link wireless devices to access points. WPA2-PSK uses AES encryption to link wireless devices to access points.

Several mainstream encryption algorithms for wireless devices are listed, and they are also introduced one by one. How many security modes are better or worse? Which security should users choose during use? Modes? Will they have any effect on the speed of wireless transmission? Let's take a look.

1, better than no WEP

WEP as an old-fashioned encryption method, it is characterized by using a static key to encrypt all communications, which means that if the network administrator In order to update the key, each host must be accessed in person, and the RSA data encryption technology adopted by the RC4 is predictable. It is easy for an intruder to intercept and crack the encryption key, so that the user's security protection is ineffective. It is not recommended to choose this security mode if it is a last resort.

2, upgraded WPA

After WEP, people will turn to their upgraded WPA. Unlike the previous WEP static key, WPA needs to constantly convert keys. WPA uses an effective key distribution mechanism that can be implemented across wireless NICs from different vendors. As an upgraded version of WEP, it is more secure than WEP in security protection, mainly in the aspects of identity authentication, encryption mechanism and packet inspection, and it also improves the management capabilities of wireless networks.

Copyright © Windows knowledge All Rights Reserved