DecryptedTech

407-617-7440 or consulting@decryptedtech.com

You are here: Home The Lab

Thursday20 January 2022

Wireless Encryption, Or How Secure is Secure

Written by
Code

Suppose I have a picture that I have been given. This picture is not something that the owner wants shown to the world so they have given me a list of people that can see it. When someone wants to see it I ask them who they are and if their name is on the list I show it to them. However, this plan is not working out that well so the owner decides to add some requirements. Now when someone wants to see the picture they have to show ID. Still people are getting around that with fake IDs, so now the owner gives out a special code word that is unique to each person while still maintaining the requirement for ID. To make things even more secure I have a picture of each person and a copy of their ID. What I have described here is a very simple explanation of the way that some of the different levels of encryption work; from the very basic to much more complex routines. In this article we will be talking about encryption as it relates to wireless access points and we can tell you up front you will be surprised at how insecure some of them are.

692gr-03

When it comes to technology there are things that we as consumers just expect to work. We do not have the time, or even the inclination, to worry about the details on these items, we just want to plug them in and go. One of these is our networking products, and in particular wireless networking. We see a device with the letter “n” on it and we automatically assume it is going to give us 300Mbps (Megabits Per Second). The problem with this approach is that wireless technology is as varied as versions of Windows 7 (another item we lump into one group… but that is another article) and cannot all be lumped into one category because of a specification number or letter on the box. With this in mind we are going to talk about some of the major points of wireless networking and how to spot the pretenders from products with real performance.

prize

This contest is now closed and we have our winner please check out our facebook page for more information.


Decryptedtech is having a new contest. It is a pretty simple one and involves a scavenger hunt of the site to find clues. In one of the articles we have posted in the last 14-days (starting from 7-24-2012) we have dropped a clue in the form of a mathematical problem. Solving this will get you to your next step where you must again find the clue and solve its meaning. In all cases typing the solution into the search bar will get you further along on your search. We will highlight the final location with instructions on what to do with the answer.  





For prizes we have some nice hardware for you gamers out there. You will get a CM Storm Sentinel Advanced II Gaming Mouse and a CMStorm Quick Fire Rapid!

prize

We do have some rules and information we need to state;

The winner will be the first person to email us the final answer. In the event of a tie we announce the names of the people that managed to send us the answer at the same time and then randomly pick one.

The winner will be notified via email, facebook, and an announcement on the site, they will have 3 days to claim their prize or it will be awarded to the next person in line.

This contest is open globally unless your country of residence prohibits the import of the products listed as prizes. If you are with-in North America your prizes will ship directly from Cooler Master, if you are outside North America the prizes will be shipped to use for final shipping outside of the North American Region. DecryptedTech is not responsible for any import taxes that may be added by your local customs. We are also not responsible for items lost or damaged during shipping. We will work with you to correct any issues you might have, but due to limitations will not always be able to resolve them.

Page 1 of 5