• Administration
  • Spanish Classes
  • Society.
  • Culture.
  • English
    • Arabic
    • Bulgarian
    • Croatian
    • Czech
    • Danish
    • Dutch
    • English
    • Estonian
    • Finnish
    • French
    • Georgian
    • German
    • Greek
    • Hebrew
    • Hindi
    • Hungarian
    • Indonesian
    • Italian
    • Japanese
    • Korean
    • Latvian
    • Lithuanian
    • Norwegian
    • Persian
    • Polish
    • Portuguese
    • Romanian
    • Russian
    • Serbian
    • Slovak
    • Slovenian
    • Swedish
    • Thai
    • Turkish
    • Ukrainian
  • Twitter
  • Facebook
  • Instagram
  • WEP, WPA, WPA2, MAC Filtering
    • Science.
    • Get To Know Us
    • Psychology. Top Definitions
    • History. Top Definitions

    WEP, WPA, WPA2, MAC Filtering

    Miscellanea   /   by admin   /   November 13, 2021

    By Guillem Alsina González, in Sep. 2017

    When we connect to a wireless network (for example, our home Wi-Fi network), many times we have to give a password made up of letters and numbers to validate ourselves. What reason have these passwords? Why do they have this Format specific?

    Like any other service, access to Wi-Fi is protected by passwords, so that we can define who we want to enter our network and prevent access to all the rest

    Since the beginning of the definition of the IEEE 802.11 Wi-Fi standard, it has had the possibility of incorporating a password to identify yourself in the system, using technologies that have evolved as the user did. Wifi.

    The first method it was WEP, born in 1997, along with the same Wi-Fi specification.

    The WEP (Wired Equivalent Privacy) uses a password between 40 and 104 bits, and almost from the beginning, it was the subject of controversy due to its lack of security.

    Its main problem was that, by automated analysis of a good amount of network traffic, it was possible to end up discovering the password, which is why tools were quickly published that automated the attacks.

    instagram story viewer

    Protocol error correction is based on CRC (Cyclic Redundancy Check), which allows altering the information without having knowledge of the key, since only a few bits need to be modified.

    That is why WEP is currently deprecated, although it is still possible to find the ability to set a WEP password on routers and access points.

    You had to find one solution to the problems of weakness which featured WEP, so in 2003 WPA was born.

    WPA (Wi-Fi Protected Access) introduces a new element in the security equation: an authentication server.

    This server works with a technology called RADIUS, which allows to distribute a password by Username, although in most cases, a single password is used, since the group of users is very small. It also facilitates access to user accounts.

    This is practical, for example, in companies, since it allows a worker to unsubscribe his password, without having to change the password. passwords everyone else, which would be a little chaos. This is what a RADIUS server is for.

    The key rises to a total of 128 bits, with the possibility of dynamically changing the encryption keys of the information while the network is being used. Thanks to this, it is able to avoid key recovery attacks by analyzing large groups of packets, since by changing the key from time to time, the work done in the system is lost. hack.

    It also incorporates, with respect to WEP, an improved error correction, so that it is not possible to modify the information of each packet without knowing the key.

    A 12-character WPA password is said to be secure and, although it is not invulnerable, the amount of computing power and time to invest in discover it, in many cases make the effort useless, as long as it meets the requirements of mixing letters and numbers, capital letters and lowercase.

    While remaining vulnerable to certain attacks, WPA authentication greatly improves on WEP and does much more difficult for strangers to intrusion into Wi-Fi networks. WPA2 protection further enhances some aspects of the WPA.

    WPA2 authentication (the acronyms correspond to exactly the same words) differs, basically, in the use of AES encryption (Advanced Encryption Standard).

    Thanks to the use of AES (which replaces the WPA TKIP), a powerful algorithm encryption, the WPA2 authentication method can meet the requirements in safety of government from United States.

    Not all devices are compatible with all authentication and security methods but, whenever possible, we should opt for WPA2 or WPA, to the detriment of WEP. For this, we will have to deal with the configuration of our router or access point.

    Regardless of which of these methods we use, there is another thing we can do to ensure our Wi-Fi connections as much as possible.

    MAC filtering is an additional security measure in any Wi-Fi network, regardless of the technology used for the Wi-Fi password, and that is based on allowing or denying the connection of each computer based on the card identifier network.

    This identifier is the MAC (Media Access Control), a code unique, made up of 48 bits, which is expressed in hexadecimal format (letters and numbers), and which allows the device to be uniquely identified worldwide.

    In all routers and access points, we have the possibility to establish a list of MAC addresses allowed, so that only those devices whose MAC appears in the list of admitted.

    Photos: Fotolia - Elena / Sila5775

    Topics on WEP, WPA, WPA2, MAC Filtering
    Tags cloud
    • Miscellanea
    Rating
    0
    Views
    0
    Comments
    Recommend to friends
    • Twitter
    • Facebook
    • Instagram
    SUBSCRIBE
    Subscribe to comments
    YOU MIGHT ALSO LIKE
    • Concept in Definition ABC
      Miscellanea
      13/11/2021
      Concept in Definition ABC
    • Concept in Definition ABC
      Miscellanea
      13/11/2021
      Concept in Definition ABC
    • Definition of Underwear
      Miscellanea
      13/11/2021
      Definition of Underwear
    Social
    7232 Fans
    Like
    5475 Followers
    Follow
    4087 Subscribers
    Subscribers
    Categories
    Administration
    Spanish Classes
    Society.
    Culture.
    Science.
    Get To Know Us
    Psychology. Top Definitions
    History. Top Definitions
    Examples
    Kitchen
    Basic Knowledge
    Accounting
    Contracts
    Css
    Culture And Society
    Curriculum Vitae
    Right
    Design
    Art
    Job
    Polls
    Essays
    Writings
    Philosophy
    Finance
    Physics
    Geography
    Story
    Mexico History
    Asp
    Popular posts
    Concept in Definition ABC
    Concept in Definition ABC
    Miscellanea
    13/11/2021
    Concept in Definition ABC
    Concept in Definition ABC
    Miscellanea
    13/11/2021
    Definition of Underwear
    Definition of Underwear
    Miscellanea
    13/11/2021

    Tags

    • Basic Knowledge
    • Accounting
    • Contracts
    • Css
    • Culture And Society
    • Curriculum Vitae
    • Right
    • Design
    • Art
    • Job
    • Polls
    • Essays
    • Writings
    • Philosophy
    • Finance
    • Physics
    • Geography
    • Story
    • Mexico History
    • Asp
    • Administration
    • Spanish Classes
    • Society.
    • Culture.
    • Science.
    • Get To Know Us
    • Psychology. Top Definitions
    • History. Top Definitions
    • Examples
    • Kitchen
    Privacy

    © Copyright 2025 by Educational resource. All Rights Reserved.