Current location - Quotes Website - Signature design - What is the password for typing the network security key on the computer?
What is the password for typing the network security key on the computer?
The key is the password of wireless network security, which can be obtained in the router. This password is only needed for wireless network connection, and there is no key problem for wired connection. However, you must connect the router correctly to access the router and get the key.

Do you have a wireless router in your home? If it is not installed, the signal you found should belong to someone else's house. You need permission from others to connect and tell you the key.

If installed, you can use the desktop to enter the router setting interface, and you can find this key on the wireless parameter setting page.

The network key refers to the key used in the network. Internet is an open system, through which anyone can enjoy their own resources and get the information they need. When people exchange information on the Internet, such as chatting, sending and receiving emails, or logging into websites that need to provide personal information, these data packets containing important personal data are likely to be intercepted and cracked by third parties before reaching their final destination. Therefore, protecting personal privacy is the top priority of the Internet, and using encryption keys is the simplest and most effective method. The information needs to be rearranged and combined according to the rules before sending, which disrupts the original data order, so that even if the data packet is intercepted by a third party.

Encryption type

edit

classify

Generally speaking, there are three key encryption methods: symmetric encryption, asymmetric encryption and hash encryption.

An important factor of a key is its length bit, which you may have noticed when using a browser. In the help, we can find the key length of a certain browser. For example, the key length is 128, which means that the key contains 128 power password rule 2 (as shown in the figure), which is an astronomical number.

Maybe you will ask, is it necessary to have such a big key? You know, the computing power of computers is developing rapidly. If you have enough equipment and funds, cracking the key is not a problem. For example, a 64-bit key can be completely cracked in three days with the existing technical level if conditions permit. Of course, the cost of cracking is related to the value of the information itself. If the cost is far greater than the value of the information content, no one will be willing to do such a loss-making business, so the current key length of 128 bits is still safe enough.

Symmetric encryption

Encryption and decryption only use one key, so it can also be called single key encryption. It has no special requirements for the key itself, as long as the keys of both parties are the same. A user encrypts the data he needs to send into chaotic information through a key, and the receiver uses the same key to restore the received information into the original data. This method can encrypt and decrypt a large amount of information in a short time. However, if the key is intercepted during transmission, the subsequent encryption process will be useless. The advantage of this method is that using the same key saves the time needed for encryption and decryption, but it cannot guarantee the security of the key.

At present, RC5, RC6, Blowfish and Twofish all use symmetric key algorithms, among which the latter two algorithms have long digits and fast encryption and decryption speed.

Asymmetric encryption

A pair of keys are used for encryption and decryption. One is the public key, which is publicly released, and the other is the private key, which is kept by users themselves. Theoretically, as long as users' private keys are not lost or stolen, the encrypted information between them will never be cracked. But its disadvantage is also obvious, that is, the encryption speed is very slow. Because of a large number of mathematical operations, even a small amount of information encryption takes a lot of time.

Hash encryption

Through mathematical operation, information with different lengths is converted into 128-bit code to form hash value. By comparing whether this value is correct, the legitimacy of both parties can be determined. This can also be called a digital signature. After data transmission, we can compare the hash values to determine whether the information was intercepted and modified on the way, whether it was sent by a legitimate sender or received by a legitimate receiver. In this way, the problem of key loss can be prevented, because its encrypted part is randomly generated, and it cannot be decrypted without the correct hash value. But also has the ability of digital signature, which can prove the legal identity of the sender and the receiver. Undeniably, it is very suitable for the transmission of commercial information. At present, MD4, MD5 and SHA are used.

2 Importance

edit

At present, most tools and software for network transmission have keys. You can check the key length of using the tool through the "About …" option under the help menu.

Keys are not very important to individual users, but most websites or community forums require login details. In order to protect your privacy (such as user passwords and identity documents, which are still very important and should not be easily disclosed), you should also use tools or patches with high key numbers to increase security and prevent the loss of personal data. 、

Public key encryption technology uses asymmetric keys for encryption and decryption. Each pair of keys contains a public key and a private key. The public key is public and widely distributed, while the private key is never public, only one person knows it.

Only the private key can decrypt the data encrypted with the public key. On the contrary, only the public key can decrypt data encrypted with the private key. It is this asymmetry that makes public key cryptosystems so useful. Authentication using public key cryptosystem is a process of verifying identity, the purpose of which is to convince an entity that the other party is who he claims to be. Let's use a simple example to describe how to use public key cryptosystem to easily verify identity.

Encryption and decryption prototype

Suppose A wants to authenticate B, and B has a key pair, that is, a public key and a private key, and B reveals his public key to A (how he does it will be discussed later). Then, A generates a random message and sends it to B .. a->; Brand-Message B encrypts this message with its private key, and then returns the encrypted message to A .. b->; A B "A B"s-private-key A receives this message and decrypts it with the public key sent by B. She compares the decrypted message with the original message, and if they match, she knows that she is communicating with B. An intruder should not know B's private key, so he can't encrypt the random message that A wants to check correctly.

Set the security key of the wireless network. People who receive network signals may sometimes see personal information and files on the wireless network. This may lead to identity theft and other malicious acts. A network security key or password helps protect your wireless network from such unauthorized access. The setup network wizard will guide you through the setup process of the security key.

By clicking

Start button, and then click Control Panel to open Settings Network. In the search box, type a network, and then click Network and * * * Enjoy Center to set up a new connection or network and set up a new network. Warning It is recommended not to use wired peer-to-peer privacy (WEP) as a wireless network security method. Wi-Fi protected access (WPA or WPA2) is relatively safe. If you try to use WPA or WPA2, but they don't work, it is recommended that you upgrade your network adapter to an adapter that uses WPA or WPA2. All network devices, computers, routers and access points must also support WPA or WPA2. At present, there are three types of wireless network encryption methods: Wi-Fi protected access (WPA and WPA2), wired peer-to-peer privacy (WEP) and 802.1x. The following sections will introduce the first two types of encryption in detail. 802. 1x is usually used in enterprise networks and will not be discussed here. Protecting wireless computer network security systems (WPA and WPA2) WPA and WPA2 require users to provide security keys to connect. After the key is verified, the data sent between the computer or device and the access point will be encrypted.