WEP, WPA, WPA2, and WPA3

All the abbreviations mean Wi-Fi security protocols that ensure the safety of users' communication over wireless networks.

Download Trojan Scanner & Remover

You may be interested in taking a look at our other antivirus tools:
Trojan Killer, Trojan Scanner and Online Virus Scanner.

WEP, WPA, WPA2, and WPA3: Differences and Comparison | Gridinsoft

WEP and WPA Meaning

November 20, 2023

Terminology for security technologies terrifies users who decide to uncover the meaning of things they face everyday. WEP, WPA, numbers, ciphers, keys – all this looks like a thing from another planet. Though, let us make all these things much easier to understand.

Across the entire existence of Wi-Fi as a technology, it gained a bunch of security standards. Contrary to a signal that goes through a cable, Wi-Fi signal travels by air, meaning everyone with the proper equipment can intercept it. Both WEP, WPA and its newer variants – WPA2 and WPA3 – are the way to secure the signal from such siphoning.

WEP, WPA, WPA2, WPA3 explained
Difference between Wi-Fi security protocols: WEP, WPA and WPA2/3

Wired Equivalent Privacy, or WEP, is the earliest Wi-Fi security standard, adopted back in 1999. It was supposed to do what its designation sounds like – providing the security equivalent of a wired connection of the time. Though, as it turned out soon after, there were a lot of design flaws that made it easily hackable even with the technologies of its epoch. Though, the problems of a novice technology were too bad and hard to fix to keep it going. Stopgap solutions like WEP2 or WEP+ never saw massive use since they were too hardware-reliant.

Wi-Fi Protected Access, or WPA, is what appeared in late 2000 to substitute the flawed technology. The Wi-Fi Alliance – the organization responsible for the development of Wi-Fi as a technology – developed WPA keeping in mind all the flaws made in WEP. This, essentially, led to the creation of a technology we use even these days. Together with using much more secure encryption, which was now protecting each separate Internet package with a unique key, it also featured a couple of new anti-spoofing tricks. The latter was especially useful against Man-in-the-Middle attacks, which were particularly popular at the time.

Further versions of the WPA are meant to keep the technology up to date. WPA2, introduced in 2004, brought the support of AES encryption and some enhancements to the package integrity protection features present in the original version. WPA3 is the newest version of the security protocol, presented in 2018, that hikes up the security to modern standards and patches some of the known vulnerabilities.

WEP, WPA, WPA2, WPA3 – what is better?

After all the information above, the obvious question arises – what is better? Well, the answer is pretty straightforward, but with some deviations depending on the purpose.

It is most likely obvious that WEP is a no-go these days. A firstling of Wi-Fi protection technologies, it has some severe design flaws; some of them were not corrected due to the technology abandonment back in 2004. Modern Wi-Fi routers do not even support WEP, leaving you to choose from WPA generations. And even for older hardware, there are the options for at least the original WPA or WPA2, so take your time and make the correct setup. It is about your safety, after all.

In the case of WPA, the choice is not that simple. Instead of one obviously bad option, we have 3. Nonetheless, by the rule “newer is better” we may already excise the original WPA. Why not together with WPA2? Because the latter is broadly supported, even by the most modern hardware, and has the early design flaws fixed. This already gives it a huge head start, and makes it viable for use in modern environments.

WPA2 is still an OK option for home usage. While corporate networks should comply with the latest security standards to prevent any hackery, a home Wi-Fi access point is not likely to face any protocol-based attacks. Moreover, if you’ve purchased a router before 2020, there is a huge chance that it does not support WPA3 at all. Some of the models though could get firmware updates that unlock that feature, and will probably bring some improvements – which are always a desirable thing.

Meanwhile, when we talk about corporate security, or the users really concerned about potential cyberattacks, WPA3 is the best choice. In the places where trade-offs are unacceptable, we recommend using the latest technologies available. This includes not only software, but also hardware – older devices may support WPA3, but have hardware vulnerabilities or incompatibility with certain technologies.

Personal or Enterprise?

While roaming through a router setup page, you could have noticed two WPA modes – Personal (or PSK) and Enterprise. In simple words, Enterprise is a more secure version that features more sturdy encryption and protection against dictionary attacks. At the same time, setting up the Enterprise requires quite a bit of network engineering skill. Though, as it comes from its name, this option is mostly suitable for corporate networks that require advanced security measures for obvious reasons.

For home users or small businesses, Personal mode will be enough. Though, the security measures that derive from common sense are still needed. Setting up a reliable password, adjusting the signal power to prevent it from reaching further than your place, giving the network a distinct name – all these steps will minimize the effectiveness of popular attack vectors.

How To Get Better Protection for Home Wi-Fi Network?

In addition to having the appropriate Wi-Fi security protocol, you also need to follow some critical cybersecurity tips concerning your Wi-Fi network security:

💡 Turn off the remote administration feature.

If you don't need this feature regularly, it would be better not to have it turned on. Because it's one of the common ways for threat actors to get your wifi settings and change them without you. See the administration section of your router to change this setting.

✨ Turn on MAC address filtering.

This setting will allow you to restrict devices connecting to your home network, giving permission only to those you registered. In such a way, you can enable additional security measures for your network.

🧱 Enable Firewall.

Most wifi routers have in-built firewalls, but sometimes they can be turned off. Make sure you have one in place and it's not disabled. Firewalls protect against network attacks from threat actors.

🏠 Place your router in the center of your home.

An obvious thing to do. If any hacker doesn't have access to your wifi router signal, they can't attack you by intercepting the signal. Don't place your router near windows or doors and make threat actors' life easier.

🔁 Regularly update the router firmware.

While some routers have the auto-update feature - most of them won't, so make sure your router firmware is updated. Because if there's any vulnerability found, threat actors will likely try to exploit it.

🔕 Hide your network from being seen by everyone.

You can use a unique feature to help you hide your network from people in the surrounding area. Changing your network's default name will make it harder for threat actors to hack into your network. Because every router has assigned by the manufacturer its SSID (Service Set identifier) and you can change it and make your network invisible.

❗ Don't use the default password and username.

Just saying that anything default can be easily looked up on the internet, and that's the first thing that threat actors will try to do. So be creative and make up your complex and strong password that no one outside your network will easily guess. The same goes for username - also, don't make it something obvious. A quick reminder that your strong password should consist of letters of all registers, numbers, and various characters.

Known attacks on WEP & WPA protocols

Both WEP and WPA are not invulnerable, even when we talk about the latest WPA revision. WEP though is worse by orders of magnitude, as it was bad back in early ‘00s, leave alone modern times. Let’s check out the most widespread approaches, beginning with WEP.

WEP Attacks

As WEP is not even supported by modern network routers, all the dangers and attacks related to this security technology are now historical legacy. Still, reviewing these attack vectors are important for understanding how network attacks were developing as the attack vector.

Network Eavesdropping

Due to the extremely poor strength of ciphering applied by WEP, it was pretty easy to eavesdrop on a Wi-Fi network protected with this protocol. Using special software, like an infamous aircrack-ng, it will not take long to retrieve the RC4 key, effectively allowing the threat actor to read any data sent through the router.

In fact, it was not even necessary to eavesdrop for a long time to be able to perform malicious activities. One packet may be enough to perform the attack – hackers can decrypt it and retrieve the info needed to malform a package. The latter leads to the real-time traffic decryption – a dream of any threat actor.

Caffe Latte Attack

Caffe Latte attack is outstanding for the fact that it could be performed without the connection to the target network. Instead, using an “evil twin” trick with their own Wi-Fi network, hackers may convince the user device into thinking it is connected to a corporate one, for example. Hackers make the victim’s device to send ARP requests, and get enough of them to scrape an RC4 key. Then, they are able to decrypt any of the Internet packages sent from the network, as well as convince the victim’s device into communicating with the fake access point as if it was a real one.

WPA Attacks

As WPA was intended to fix all the flaws present in the WEP, it lacks the vast majority of design flaws, leaving hackers to at least a mix of design features and setup mistakes. Moreover, WPA3 lacks the vast majority of known exploitable areas – and that is why it is recommended.

Weak Pre-Shared Key Security

In Personal mode, WPA protocol supposes sending the pre-shared security key (PSK) to the counterpart upon establishing the connection. Then, the server and the client exchange their own keys, the connection finalizes, and the normal Internet browsing continues. However, the way this key is transmitted is not entirely secure, and leaves the hackers with opportunities to recover it. And having one PSK, they can decrypt all the Internet packages sent with the use of this PSK both in the past and in future. That vulnerability is obviously not present in the Enterprise version, but is also fixed in WPA3.

Packet Decryption & Spoofing

A pretty complicated technique, that was a point of vast discussions in the past. Packet spoofing attack, also known as TKIP attack, bears on the ability to simply guess the identification key and thus take the packet instead of the actual receiver. The attack, actually, grows from the similar approach to hack WEP-protected networks, but includes a delay before repeating the request. Such a trick circumnavigates the protection present in the WPA mechanism, while allowing to pick the needed key and intercept all the further packages.

Frequently Asked Questions

What is better — WPA2 or WPA3?
Comparing these two security algorithms, WPA3 has a higher level of security than WPA2. WPA3 provides two operating modes for WPA3-Enterprise and WPA3-Personal. WPA3-Enterprise (Suite B) provides 192-bit encryption, and already WPA3-Personal (WPA3-PSK) is 128-bit.
What is the difference between WEP and WPA standards?
WPA is a protocol that was introduced in 2003, and the Wi-Fi Alliance replaced it with the WEP protocol. WPA is similar in structure to WEP but has improved user authorization and security key processing. WPA also uses the Time Key Integrity Protocol (TKIP), while WEP provides all authorized systems with the same key. Thus, the WAP operating principle allows an attacker to create his encryption key, according to the one used for the secure network.
What is WPA3 Personal?
WPA3-Personal, or WPA3-PSK is a security algorithm that performs password-based security and uses 128-bit data encryption. It refers to the WPA3-Personal mode, the third version of the WPA3 protocol suite. The WPA3 was designed to address deficiencies in the WPA2 protocol. At the same time, it has a higher level of WPA2 week security and provides two modes of operation for WPA3 Personal and WPA3-Enterprise.
How does WPA3 SAE work?
To provide better protection against password retrieval, WPA3 uses simultaneous authentication of equals (SAE). SAE is a auth method that sets the new authentication method - by using the hash of a generated key. As a result, WPA3-Enterprise is not only able to provide additional security for networks that transmit sensitive data but also offers the equivalent of 192-bit cryptographic stability.
How is SAE different from PSK?
The difference between SAE and PSK is that the former is more resistant to autonomous dictionary attacks. This is because the attacker can only learn the password, that is, repeat active attacks, and check whether the guessing of the password is correct or not.

聚圣源手绘家具土暖气男孩女孩起名字大全唐氏起名女孩名字设计工作室怎么起名美国vs西班牙盯盯拍商贸公司2个字起名大全北京电视台财经频道小鸭子儿童乐园《雷霆战将》不健全关系漫画免费阅读盛锦姝阎北铮小说免费阅读晞字起名寓意好不赘婿出山全文免费阅读给宝宝起名字的网站手机歌曲下载爱丽团购暴君闺女五岁半免费阅读备忘录软件和主人的十个约定维修部起名大全一个让我感动的日子起名字张家什么deadline是什么意思皇冠蛋糕起什么名字公司起名字什么名字好属狗的公司起名吉祥公司起名同名不同行业可以吗属猪的应该如何起名淀粉肠小王子日销售额涨超10倍罗斯否认插足凯特王妃婚姻让美丽中国“从细节出发”清明节放假3天调休1天男孩疑遭霸凌 家长讨说法被踢出群国产伟哥去年销售近13亿网友建议重庆地铁不准乘客携带菜筐雅江山火三名扑火人员牺牲系谣言代拍被何赛飞拿着魔杖追着打月嫂回应掌掴婴儿是在赶虫子山西高速一大巴发生事故 已致13死高中生被打伤下体休学 邯郸通报李梦为奥运任务婉拒WNBA邀请19岁小伙救下5人后溺亡 多方发声王树国3次鞠躬告别西交大师生单亲妈妈陷入热恋 14岁儿子报警315晚会后胖东来又人满为患了倪萍分享减重40斤方法王楚钦登顶三项第一今日春分两大学生合买彩票中奖一人不认账张家界的山上“长”满了韩国人?周杰伦一审败诉网易房客欠租失踪 房东直发愁男子持台球杆殴打2名女店员被抓男子被猫抓伤后确诊“猫抓病”“重生之我在北大当嫡校长”槽头肉企业被曝光前生意红火男孩8年未见母亲被告知被遗忘恒大被罚41.75亿到底怎么缴网友洛杉矶偶遇贾玲杨倩无缘巴黎奥运张立群任西安交通大学校长黑马情侣提车了西双版纳热带植物园回应蜉蝣大爆发妈妈回应孩子在校撞护栏坠楼考生莫言也上北大硕士复试名单了韩国首次吊销离岗医生执照奥巴马现身唐宁街 黑色着装引猜测沈阳一轿车冲入人行道致3死2伤阿根廷将发行1万与2万面值的纸币外国人感慨凌晨的中国很安全男子被流浪猫绊倒 投喂者赔24万手机成瘾是影响睡眠质量重要因素春分“立蛋”成功率更高?胖东来员工每周单休无小长假“开封王婆”爆火:促成四五十对专家建议不必谈骨泥色变浙江一高校内汽车冲撞行人 多人受伤许家印被限制高消费

聚圣源 XML地图 TXT地图 虚拟主机 SEO 网站制作 网站优化