Do you have the free router signal to share with your neighbors? Serious mistake! Exposing your wireless network opens the doors for malicious people to use it for fraudulent acts.
In addition, you can filter your private information and do with it the unimaginable, that is why knowing security measures for your wireless networks is an essential part of improving your privacy and Internet security.
I wrote these lines as a recommendation to create your own security measures on your network devices and learn about the art of cryptography and how it is applied in the variety of ciphers used to encrypt passwords.
Index:
What is an encryption technology to encrypt passwords?
The man in the search to protect his digital information from cyber attacks, has created a technology as a security measure, which consists of an encryption or protocol that allows to hide the data and be visualized only with decoding .
This encryption technology is the basis for the creation of passwords for access to different equipment and devices. Beyond the protection of information against different attacks, it is also a method of authenticity of its origin, with the guarantee of having arrived without some kind of alteration in its content.
Data encryption is about transforming a data set in readable format to a hidden format so that it can only be decoded by the receiver. It becomes an indispensable instrument in the issue of digital information security since there are cyber attacks with special interests on such data. Creating a trusted password is the key point in making a secure and inviolable protocol.
What are the types of encryption for wireless network passwords that exist?
Every day Wi-Fi connections charge more in both homes and offices and commercial premises. This is due to the practicality of its installation and the coverage it provides to the different mobile devices, who have actually been responsible for setting aside network connections by positioning the router and modem as a new trend for stay connected .
This growth brings with it security measures that must be considered, since the signal is not only concentrated in the place where you want to have it, but it expands around it and can be the means of navigation for adjacent people.
Therefore, it is essential to activate security protocols or encryption to our routers or modems that allow us to keep unwanted people who jeopardize our integrity and speed of navigation at all times .
To configure them it is necessary to enter the router or modem interface from the browser (Example 192.168.1.1.). Already in it you can change the corresponding data. First of all, I want to leave you the different protocols to keep your wireless networks protected at all times, let’s start:
WEP – Wired Equivalent Privacy (Wired Equivalent Privacy)
Standard that guarantees the confidentiality of data within WLAN systems based on the 802.11 standard, as well as controls access through authentication mechanisms.
WEP uses a secret key that is shared between a wireless station and an access point, all data sent and received on them can be encrypted using this key.
The type of protocol used depends on the bits used:
- 64 bits . Requires 10 characters in hexadecimal digits or 8 ASCII characters.
- 128 bits . Requires 26 characters in hexadecimal digits or 12 ASCII characters.
WPA – WiFi Protected Access
It is a standard developed to ensure access to the web via WiFi connection. It allows users to access information instantly from any wireless device through passwords.
When the modem enables WPA, it adopts the legitimacy of the user with the use of the server where the passwords are stored, and in a manner very similar to the WEP, the same password needs to be entered on all the computers in the network. These are 64 digits hexadecimal or 8 ASCII characters in an encryption of 256 bits .
WPA2 – WiFi Protected Access 2 (WiFi Protected Access 2 )
It is the improved version WPA developed to give greater protection in the access of the web. Its encryption method is much more secure, so the password entry is required every time you want to connect a new device to the web. Presents three classifications :
WPA2-PSK (TKIP)
Standard WPA2 with TKIP protocol (Temporal Key Integrity Protocol). It is used in older devices that do not have the ability to support a WPAS-PSK (AES) network, but are still used. Authenticate data using 802.1x / EAP or PSK .
WPA2-PSK (AES)
Standard WPA2 with highly secret data encryption capability using the AES encryption algorithm (Advanced Encryption Standard).
WPA2-PSK (TKIP / AES)
Default standard on many routers that use WPA and WPA2 with TKIP and AES, which offers compatibility between old and new devices.
WPA3 – WiFi Protected Access 3 (WiFi Protected Access 3 )
It is the most recent standard created as a successor to WPA2. Use 128-bit encryption and send and forward confidentiality. It replaces the exchange of pre-shared keys with simultaneous and equal ones, thus giving greater security. It also reduces the problem of weak passwords and facilitates the process of configuring devices without the display interface.
What are the safest encryption for our WiFi signal and why choose them ?
As I told you before, it is essential to keep wireless networks protected , since the modem signal expands around the area and is exposed to public use in general. You do not know the intentions of each neighbor or visitors, as a precautionary measure, I recommend that you place a high security encryption on your Internet devices that only people you trust can handle.
The development of telecommunications technology is creating new security protocols with greater degree of difficulties to be hacked by cybercrime , which is developing its skills to crack any password and infiltrate any information.
For this reason the previous versions have improved, giving you the opportunity to protect your WiFi signal from this group of people. Among the safest today, are:
WPA2 – PSK (AES)
Encryption “ Advanced Encryption Standard ” (AES) is an algorithm included in WPA2, which was not designed to protect WiFi networks but to protect classified documents . So far it is so safe that it has been used by the different governmental entities of the United States since 1997. Therefore, it is recommended to keep confidential data hidden from view.
WPA3 – WiFi Protected Access 3
It is a more updated version of WPA3, created to improve the deficiencies of the previous one. It enhances the cryptographic protocols applied that protect the confidentiality of the data and offers greater protection against attacks of password theft.
In addition, it has a Perfect Forward Secrecy property that guarantees the protection of the keys used not to be decrypted by hackers. These features of WPA3 make it a secure encryption to apply to modern modems or routers compatible with it.
WPS: What is it and why should you deactivate it to keep your network secure ?
Has it ever happened to you that you put a password so complex to your modem that you don’t even remember it? Thinking about cases like this, the manufacturers of these types of devices make it easy for you to use the network with the implementation of WPS in their new models.
The WiFi Protected Setup is a somewhat recent technology that allows Internet use from the connected modem or router. It consists of an access that can be activated with just pressing the WPS button , without entering the password created for your backup.
Actually, the procedure to do so is quite simple:
- Press the WPS button on the router or modem.
- In a period of time it will allow compatible devices to connect.
- Depending on the router or modem configuration will install it automatically or ask for a PIN that is attached to it.
With this mechanism the Internet connection will be easier. But be careful! You have to be aware of the precautions you should take. Leaving it open will give the freedom for other people to take advantage of your signal in case of automatic installation, or even run the risk of hacking your PIN.
Therefore, it is advisable to keep it disabled as a security measure to these neighbors or to criminals who usually do cybercrime. After all, this technology is to simplify your connectivity at a given time, not to create improvements in the security of your network.