Saturday, 10 November 2012 16:36

Wireless Encryption, Or How Secure is Secure

Code

Suppose I have a picture that I have been given. This picture is not something that the owner wants shown to the world so they have given me a list of people that can see it. When someone wants to see it I ask them who they are and if their name is on the list I show it to them. However, this plan is not working out that well so the owner decides to add some requirements. Now when someone wants to see the picture they have to show ID. Still people are getting around that with fake IDs, so now the owner gives out a special code word that is unique to each person while still maintaining the requirement for ID. To make things even more secure I have a picture of each person and a copy of their ID. What I have described here is a very simple explanation of the way that some of the different levels of encryption work; from the very basic to much more complex routines. In this article we will be talking about encryption as it relates to wireless access points and we can tell you up front you will be surprised at how insecure some of them are.