WiFi Security Types
VSupport understands how crucial is the information which you share over the internet, be it professional or personal, regarding buying something online or sharing a confidential file on mail, or, the personal conversation you have with your near or dear ones. Hence, how important it becomes to have a security on your network so that no uninvited intruder gets connected with your network and have your personal information and files. These securities are necessary to help to from identity theft and other malicious acts.
There are several types of wireless security that you’ll come across-here’s is the quick rundown by Vsupport LLC
Wired Equivalent Privacy, or WEP, is the oldest of wireless security type, back then in 1999, was introduced. When a device i.e. laptop/ipad connects to a WEP-protected network, to create an “Initialization Vector”, the WEP key is added to some data.
For example, 128-bit hexadecimal key is comprised of 26 characters of keyboard combined with 24-bit IV.
So now, when a client or a device connect to an AP, it sends a request to authenticate, which is met by AP from a challenge reply. The challenge with the key will be encrypted by the client, then AP will decrypts it, and if the challenge it received will be matched from the original one it sent, the AP will authenticate the client or device.
This do sound secure but there was a loop in the security which can find a room for an intrusion, which was that the risk presents itself only when a client sends its request to the access point, the portion that contains IV is transmitted wirelessly in clear text (not encrypted). In addition, if there are several clients using the same WEP key on a network, the IV is simple compared to the key, and this IV has larger probability of repeating itself. So in a busy network, if a malicious user wants to connect or get the access of the network, can passively eavesdrop and collect IVs. With several number of IVs, it becomes easier to decrypt the key.
Undoubtedly, WEP was not the accurate Security for the network, so it created a need to create new securities.
The insecurities in WEP, gave a room for the discovery of WiFi Protected Access (WPA), which was ratified by WiFi Alliance in 2003. This was the enhanced version with new security standards, in which, Temporal Key Integrity Protocol (TKIP), was included which created a new message integrity check nicknamed “Michael”.
Though great deal of improvements were being offered by Michael but still there were few of the security issues with using a similar implementation.
The drawbacks of Michael gave birth to new security level up which was WPA2, which was introduced in 2004. WPA2 used security protocol based on Advanced Encryption Standard (AES), the preferred choice of Encryption by US Government. It is believed, that, the only people who will be using TKIP on a wireless network are those who are using hardware rated 802.11g only.
This is the latest technology introduced in 2009, WiFi protected Setup (WPS), on wireless access points. With this type of security, a user is able to connect his 0r other’s devices easily by putting 8 digit PIN number on client’s device. This PIN feature is sort of a shortcut for entering a longer WPA key. The basic idea behind this WPS technology, is that, the direct physical access to the AP to hit a button and read a sticker would provide more security with more authentication and a more secure implementation. Everything in WPS security was going extremely well and secure, until last winter, when the Achilles Heel in the implementation was discovered by a security researcher. Here’s how it works:
The final or the eight digit of the PIN number is a Checksum, which makes sure that 7 digits which matters the most don’t get corrupted. So there are about 10,000,000 possibilities between these 7 digits. This is a huge amount possibilities and still considered safe, but, there is a flaw in the checking process. When a PIN is being examined by the AP, the first 4 digits(10,000 possibilities) are checked separately from the rest of the 3 digits which has only around 1000 possibilities. Hence, the malicious users have to only make 11,000 guesses, which a computer can handle quite easily in matter of few hours.
WiFi Security Best-Practices
• Don't use WEP, which is easy to crack
• Don't use WPA, unless legacy devices on your network require it
• Don't use WPS, which can easily be brute-forced
• Do use WPA2 with a strong passphrase
Even if there is confusion with which security to be used on your network, get connected to VSupport Technicians over our TOLL FREE NUMBERS. TALK to them, VSupportTechSmarties will guide you well on how and which security will go best with your network.
Get Secure with VSupportLLC!
Stats always help us to know how much people appreciate our services and support which increases our zeal to help more.