Do you have the router signal free to share with your neighbors? Big mistake! Exposing your wireless network opens the door for malicious people to use it for fraudulent acts.
In addition, your private information can be filtered and do the unimaginable with it, which is why knowing security measures for your wireless networks is a fundamental part of improving your privacy and security on the Internet.
I write these lines as a recommendation to create your own security measures on your network devices and learn the art of cryptography and how it applies to the variety of ciphers used to encode passwords.
What is an encryption technology to encode passwords?
The man in search of protecting his digital information from cyberattacks, has created a technology as a security measure, which consists of an encryption or protocol that allows hide data and be displayed only with decoding.
This encryption technology is the basis for creating passwords to access different computers and devices. Beyond protecting information against different attacks, it is also a method of authenticity of its origin, with the guarantee of having arrived without any type of alteration in its content.
Data encryption it is about transforming a set of data in a readable format to a hidden format so that it can be decoded only by the receiver. It becomes an indispensable instrument in the field of digital information security since there are cyber attacks with special interests on such data. The creation of one reliable password It is the key point to make a secure and inviolable protocol.
What are the types of encryption for wireless network passwords that exist?
Every day the WiFi connections They charge more boom both in homes and in offices and commercial premises. This is due to the practicality of its installation and the coverage it provides to the different mobile devices, which in reality have been responsible for putting aside the connections by networks positioning the router and modem as a new trend to stay connected.
This growth brings with it security measures that must be considered, since the signal is not only concentrated in the place where you want to have it, but it expands around it and can be the means of navigation for adjacent people.
Thus, it is essential to activate protocols or encryption security to our routers or modems that allow us to keep out unwanted people who put our integrity and our browsing speed at risk at all times.
To configure them it is necessary to enter the router or modem interface from the browser (Example 192.168.1.1.). Once you are at it, you can change the corresponding data. First of all, I want to leave you the different protocols to keep your wireless networks protected at all times, let’s start:
WEP – Wired Equivalent Privacy
Standard that guarantees the confidentiality of data within WLAN systems based on the 802.11 standard, as well as controls access through authentication mechanisms.
WEP uses a secret key that is shared between a wireless station and an access point, all data sent and received on them can be encrypted using this key.
The type of protocol used depends on the bits used:
- 64 bit. Requires 10 characters in hexadecimal digits or 8 ASCII characters.
- 128 bit. It requires 26 characters in hexadecimal digits or 12 ASCII characters.
WPA – WiFi Protected Access
It is a standard developed to ensure access to the web through a WiFi connection. It allows users to access information instantly from any wireless device through passwords.
When the modem enables the WPA, it adopts the legitimacy of the user with the use of the server where the passwords are stored, and much like the WEP, the same password needs to be entered on all the computers on the network. These are from 64 digits Hexadecimal or 8 ASCII characters in an encryption of 256 bits.
WPA2 – WiFi Protected Access 2
It is the improved WPA version developed to give greater protection in accessing the web. Its encryption method is much more secure so the password is required every time you want to connect a new device to the web. It presents three classifications:
WPA2 standard with TKIP (Temporal Key Integrity Protocol) protocol. It is used in older devices that do not have the ability to support a WPAS-PSK (AES) network, but are still used. Authenticate data using 802.1x / EAP or PSK.
WPA2 standard with highly secret data encryption capabilities using the AES encryption algorithm (Advanced Encryption Standard).
WPA2-PSK (TKIP / AES)
The default standard on many routers using WPA and WPA2 with TKIP and AES, which provides compatibility between old and new devices.
WPA3 – WiFi Protected Access 3
It is the most recent standard created as a successor to WPA2. Uses 128-bit encryption and confidentiality of shipping and forwarding. It replaces the exchange of pre-shared keys with simultaneous and equal ones, thus giving greater security. It also reduces the problem of weak passwords and facilitates the device configuration process without the display interface.
What are the most secure encryption for our WiFi signal and why choose them?
As I told you before it is essential keep wireless networks protected, since the modem signal expands around the surroundings, being exposed to the general public use. You do not know the intentions of each neighbor or of the visitors, as a precautionary measure, I recommend placing a high security encryption on your Internet devices that only people you trust can handle.
The development of telecommunications technology is creating new security protocols with greater degree of difficulty to be hacked by cybercrime, which is developing its skills to decipher any password and infiltrate any information.
For this reason they have improved the previous versions, thus giving you the opportunity to protect your WiFi signal from this group of people. Among the safest today are:
WPA2 – PSK (AES)
The encryption “Advanced Encryption Standard”(AES) is an algorithm included in WPA2, which was not designed to protect WiFi networks but to safeguard classified documents. Until now it is so secure that it has been used by different government entities in the United States since 1997. Therefore, it is recommended to keep confidential data hidden from view.
WPA3 – WiFi Protected Access 3
It is a more updated version of WPA3, created to improve the shortcomings of the previous one. It strengthens the applied cryptographic protocols that protect the confidentiality of the data and offers greater protection against password theft attacks.
Also has Perfect Forward Secrecy (Perfect forward secret) a property that guarantees the protection of the keys used from being decrypted by hackers. These characteristics of WPA3 make it a secure encryption to be applied in modern modems or routers compatible with it.
WPS: What is it and why should you disable it to keep your network secure?
Has it ever happened to you that you put such a complex password on your modem that you don’t even remember it anymore? Thinking of cases like this, the manufacturers of these types of device make it easier for you to use the network with the implementation of WPS in their new models.
The WiFi Protected Setup (Protected WiFi configuration) is a somewhat recent technology that allows the use of the Internet from the connected modem or router. It consists of an access that can be activated with just press the WPS button, without the need to enter the password created for your protection.
Actually, the procedure to do it is quite simple:
- Press the WPS button on the router or modem.
- In a period of time it will allow compatible devices to connect.
- Depending on the configuration of the router or modem, it will install it automatically or ask for a PIN that is attached to it.
With this mechanism it will be easier to connect to the Internet. But beware! You have to be aware of the precautions that you must take. Leaving it open will allow other people to take advantage of your signal in case of automatic installation, or you would even run the risk of having your PIN done.
Thus, it is advisable to keep it disabled as a security measure to these neighbors or criminals who are used to cyber crimes. Ultimately, this technology is to simplify your connectivity at a certain time, not to create improvements in the security of your network.
If you have any questions, leave them in the comments, we will answer you as soon as possible, and it will surely be of great help to more members of the community. Thank you! 😉