What Is a WEP Key?
WEP encryption is the earliest technology used in wireless encryption. The new upgrade program is a bit different from the previous settings. Of course, the functions are richer than before. Let us take a look at how to use WEP. When selecting "Automatic Selection", "Open System", and "Shared Key" for "Security Authentication Type" in the wireless "Basic Settings", WEP encryption technology is used, and "Automatic Selection" is a wireless router. Negotiate with the client automatically as "open system" or "shared key".
- Chinese name
- wep encryption
- Configuration
- Wireless router configuration
- safety
- WEP encryption has a 100% cracking method
- Meaning
- The earliest technology used in wireless encryption
- WEP encryption is the earliest technology used in wireless encryption. The new upgrade program is a bit different from the previous settings. Of course, the functions are richer than before. Let us take a look at how to use WEP. When selecting "Automatic Selection", "Open System", and "Shared Key" for "Security Authentication Type" in the wireless "Basic Settings", WEP encryption technology is used, and "Automatic Selection" is a wireless router. Negotiate with the client automatically as "open system" or "shared key".
- Below we take the wireless broadband router TL-WR641G and wireless network card TL-WN620G of TP-LINK as examples to explain the wireless network WEP encryption application;
wep encrypted wireless router configuration
- Wireless router configuration
- First, the wireless router configuration
- 1. Enable WEP encryption.
- Open the router management interface, "Wireless Settings"-> "Basic Settings":
- Teach you how to set up a wireless router WEP encryption application
- Select "Automatic Selection" for "Security Authentication Type", because "Automatic Selection" is to automatically negotiate one among "Open System" and "Shared Key", and the security of the two authentication methods is not different.
- Select "Hexadecimal" for "Key Format Selection", and set WEP encryption application for wireless router
- Select "Automatic Selection" for "Security Authentication Type", because "Automatic Selection" is to automatically negotiate one among "Open System" and "Shared Key", and there is no difference in the security of the two authentication methods.
- Select "Hexadecimal" for "Key Format Selection" and optionally "ASCII". The settings here have no impact on security, because "Hexadecimal" is required when setting "Individual Key". So it is recommended to use "hexadecimal".
- "Key selection" must be filled in the position of "Key 2", this must be set here, because under the new upgrade procedure, key 1 must be empty, in order to cooperate with the use of a separate key (the separate key will (Introduced in the following MAC address filtering), if not set, you may not be connected. The key type is 64/128/152 bits. After selecting the corresponding number of bits, the length of the "key type" will change. In this example, we have entered the 26-bit parameter 11111111111111111111111111 Because "Key Format Selection" is "Hexadecimal", "Key Content" can be filled with characters 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, a, b, c , D, e, f, remember to save after setting.
- If you do not need to use the "individual key" function, the network card only needs to be simply configured into the encryption mode, the key format, the key content must be the same as the router, and the key setting must be set to the location of "WEP key 2" (and the router Correspondence), you can connect to the router at this time.
- 2. Use of individual keys. The MAC address filtering here can specify that some MAC addresses can access the wireless network and others cannot. The "individual key" function can specify a separate key for a single MAC, and this key is only the network card with this MAC address. Yes, other network cards cannot be used, which adds a certain degree of security. Open "Wireless Settings"-> "MAC Address Filtering" and "Add New Entry" on the "MAC Address Filtering" page. The following interface is the interface for filling in parameters:
- As shown in the figure above: "MAC Address" parameter we filled in is the MAC address 00-0A-EB-88-65-06 of the TL-WN620G in this example, "Type" can be selected from "Allow" / "Forbidden" / " 64-bit key "/" 128-bit key "/" 152-bit key ". In this example, a 64-bit key is selected. "Allow" and "prohibit" simply allow or prohibit the passage of a certain MAC address. This is the same as the previous MAC address function, which is not the focus here. The "key" is filled with 10 digits AAAAAAAAAA, there is no "key format selection" here, only "hexadecimal" input is supported. The "Status" selection takes effect. Finally, click Save. After saving, you will return to the previous interface. The result is as follows:
- Note that the state of the "MAC Address Filtering Function" above is "Enabled". If it is "Disabled", the button on the right will change to "Enable Filtering". Click this button to enable this function. At this point, the configuration of the wireless router is complete! By the way, how to obtain the MAC address of the network card? You can refer to the "Network Classroom" document "Router Configuration Guide" on our website. Running the command ipconfig / all through the DOS interface of the computer will pop up similar Information, the red line outline part "Physical Address" corresponds to the MAC address of the network card in the connected state;
- Teach you how to set up a wireless router WEP encryption application (2)
wep encrypted wireless network card configuration
- Second, the configuration of the network card TL-WN620G Open the main interface of the TL-WN620G client application-"User File Management"-> "Modify", a user configuration file management dialog box will pop up. The first is the "General" page, which is filled with the same SSID as the wireless router-this example is "TP-LINK", as shown below:
- Then click on the "Advanced" page. The red line outlines the selection of the authentication mode, which can remain the same as the wireless router. Since the "automatic selection" mode is selected on our router, no matter what mode is selected here, it can be connected. If this option is gray, please configure the parameters of the "Security" page first, and then come back here to configure;
- First select "Pre-Shared Key (Static WEP)", and then click the "Configure ..." button to enter the interface for setting the shared key:
- The parameters outlined with red lines above are explained: 1) "Key Format" must be selected as "Hexadecimal (0-9, AF); 2), a total of two keys need to be filled in. Key 1 corresponds to The individual key set under the router "Wireless Configuration"-> "MAC Address Filtering" page, this example is a 64-bit key AAAAAAAAAA; Key 2 corresponds to the router "Wireless Configuration"-> "Basic Settings" page Set the public key. This example is a 128-bit key: 11111111111111111111111111. 3) Finally, select "WEP key 1". (Note the dot after "WEP key 1") 4). Separate key And the location of the public key cannot be changed. After the configuration is complete, click "OK" twice in a row to return to the main interface of the client application. We can see that the network card and wireless router have established a connection, as shown in the following figure:
- At this time we enter the router "Wireless Settings"-"Host Status", you can see the MAC address of the connected network card; on the "Host Status" page, the first one in the table shows the MAC address of the wireless router;
wep encryption security overview
- WEP (Wired Equivalent Privacy). Just by name, WEP seems to be a secure encryption protocol for wired networks, but it is not. The WEP standard has been created in the early days of wireless networks. Its security technology is derived from the RSA data encryption technology named RC4, which is a necessary security protection layer for wireless local area networks (WLANs). Currently common are 64-bit WEP encryption and 128-bit WEP encryption.
- With the once upgrade of wireless security, WEP encryption has appeared a 100% cracking method. By capturing and injecting and obtaining enough data packets, WEP secrets can be completely destroyed. Hackers can verify it in just 5 minutes. Crack the 10-digit WEP password.
- how to respond:
- Wireless networks currently recommend using WPA / WPA2 (AES) encryption mode to completely abandon WEP encryption.
wep encryption authentication method
- WEP specifies two types of authentication: Open System and Shared Key. "Open system" means no certification. Any site can try to communicate. Shared key authentication requires 4 steps:
- 1. The initial station sends an authentication request to the receiving end, usually an AP.
- 2. The AP sends back a clear text verification message.
- 3. The site uses RC4 to encrypt the message and sends it back to the AP.
- 4. The AP decrypts the message. If it matches the sent message, the requesting site is configured with the correct key to prove that it is authorized to use the network.
- Both sites can then exchange messages freely, using the RC4 method for each encryption and decryption, and using the same key during the authentication process. [1]