Got it

Differences among WEP, WPA, WPA2 and WPA3 wireless security protocols

Latest reply: Mar 19, 2022 09:33:00 499 17 8 0 0

Differences among WEP, WPA, WPA2 and WPA3 wireless security protocols

 

In wireless security, passwords are only half the battle. Choosing the proper level of encryption is just as vital, and the right choice will determine whether your wireless LAN is a house of straw or a resilient fortress.

 

Most wireless access points (APs) come with the ability to enable one of four wireless encryption standards: Wired Equivalent Privacy (WEP), Wi-Fi Protected Access, WPA2 or WPA3. Find out below which is best for your wireless security needs.

 

Enterprises can use this side-by-side comparison of the four security protocols to explore which one they should use in their wireless networks and when. This article also takes a deep dive into the history and technical details of WEP, WPA, WPA2 and WPA3.

 

WEP, WPA, WPA2 and WPA3: Which is best?

When choosing from among WEP, WPA, WPA2 and WPA3 wireless security protocols, experts agree WPA3 is best for Wi-Fi security. As the most up-to-date wireless encryption protocol, WPA3 is the most secure choice. Some wireless APs do not support WPA3, however. In that case, the next best option is WPA2, which is widely deployed in the enterprise space today.

 

At this point, no one should use the original wireless security protocol, WEP, or even its immediate successor, WPA, as both are outdated and make wireless networks extremely vulnerable to outside threats. Network administrators should replace any wireless AP or router that supports WEP or WPA with a newer device that's compatible with WPA2 or WPA3.

 

How does WEP work?

Wi-Fi Alliance developed WEP -- the first encryption algorithm for the 802.11 standard -- with one main goal: prevent hackers from snooping on wireless data as it was transmitted between clients and APs. From its inception in the late 1990s, however, WEP lacked the strength necessary to accomplish this aim.

 

Cybersecurity experts identified several severe flaws in WEP in 2001, eventually leading to industrywide recommendations to phase out the use of WEP in both enterprise and consumer devices. After investigators traced a large-scale cyber-attack against T.J.Maxx in 2009 back to vulnerabilities exposed by WEP, the Payment Card Industry Data Security Standard prohibited retailers and other entities that process credit card data from using WEP.

 

WEP uses the RC4 (Rivest Cipher 4) stream cipher for authentication and encryption. The standard originally specified a 40-bit, pre-shared encryption key; a 104-bit key later became available after the U.S. government lifted certain federal restrictions.

 

An administrator must manually enter and update the key, which combines with a 24-bit initialization vector (IV) to strengthen encryption. The small size of the IV increases the likelihood that users will recycle keys, however, making them easier to crack. This characteristic, along with several other security flaws and vulnerabilities -- including problematic authentication mechanisms -- makes WEP a risky choice for wireless security.

 

                                              

1

 

How does WPA work?

The numerous flaws in WEP revealed the urgent need for an alternative, but the deliberately slow and careful processes required to write a new security specification posed a conflict. In response, in 2003, Wi-Fi Alliance released WPA as an interim standard, while IEEE worked to develop a more advanced, long-term replacement for WEP.

 

WPA has discrete modes for enterprise users and for personal use. The enterprise mode, WPA-Extensible Authentication Protocol (WPA-EAP), uses more stringent 802.1x authentication and requires the use of an authentication server. The personal mode, WPA-Pre-Shared Key (WPA-PSK), uses pre-shared keys for simpler implementation and management among consumers and small offices.

 

Although WPA is also based on RC4, it introduced several enhancements to encryption -- namely, the use of the Temporal Key Integrity Protocol (TKIP). TKIP contained a set of the following functions to improve wireless LAN security:

  • use of 256-bit keys;

  • per-packet key mixing,      which generates a unique key for each packet;

  • automatic broadcast of      updated keys;

  • message integrity      check;

  • larger IV size using      48 bits; and

  • mechanisms to reduce      IV reuse.

 

Wi-Fi Alliance designed WPA to be backward-compatible with WEP to encourage quick, easy adoption. Network security professionals were able to support the new standard on many WEP-based devices with a simple firmware update. This framework, however, also meant the security WPA provided was not as comprehensive as it could have been.

 

How does WPA2 work?

As the successor to WPA, the WPA2 standard was ratified by IEEE in 2004 as 802.11i. Like its predecessor, WPA2 also offers enterprise and personal modes.

WPA2 replaces RC4 and TKIP with two stronger encryption and authentication mechanisms: Advanced Encryption Standard (AES) and Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP), respectively. Also meant to be backward-compatible, WPA2 supports TKIP as a fallback if a device cannot support CCMP.

 

Developed by the U.S. government to protect classified data, AES comprises three symmetric block ciphers. Each encrypts and decrypts data in blocks of 128 bits using 128-, 192- and 256-bit keys. Although the use of AES requires more computing power from APs and clients, ongoing improvements in computer and network hardware have mitigated performance concerns.

 

CCMP protects data confidentiality by allowing only authorized network users to receive data, and it uses cipher block chaining message authentication code to ensure message integrity.

 

WPA2 also introduced more seamless roaming, enabling clients to move from one AP to another on the same Wi-Fi network without having to reauthenticate, using Pairwise Master Key caching or pre-authentication.

 

A new Wi-Fi network connection begins with a cryptographic four-way handshake between an endpoint and AP in which both devices, through a series of back-and-forth messages, prove they know a preestablished authentication code -- PMK in enterprise mode and PSK in personal mode -- without either one revealing it explicitly. Upon authentication, the third step in the four-way handshake involves the AP passing a traffic encryption key to the client. If the endpoint doesn't acknowledge that it has received the key, the AP will assume a connectivity issue, resending and reinstalling it repeatedly. KRACK attackers -- who must be within physical range of both client and network -- can trigger, capture, analyze, manipulate, and replay those retransmissions until they are able to determine the key, break encryption and gain access to network data.

 

More commonly, the four-way handshake method also makes WPA2 networks with weak passcodes vulnerable to offline dictionary attacks, a type of brute-force attack that involves systematically trying hundreds, thousands, or millions of pre-compiled possible passwords, out of earshot of the target network. In this scenario, an attacker might capture a WPA2 handshake, take that information offline and use a computer program to compare it against a list of likely codes with the goal of finding one that aligns logically with the available handshake data. For obvious reasons, dictionary attacks are far less likely to succeed against long passwords with combinations of uppercase and lowercase letters, numbers, and special characters.

 

How does WPA3 work?

In 2018, Wi-Fi Alliance began certification for WPA3, the most recent wireless security standard and the one that experts now consider the most secure. As of July 2020, Wi-Fi Alliance requires all devices seeking Wi-Fi certification to support WPA3.

 

WPA3 mandates the adoption of Protected Management Frames, which help guard against eavesdropping and forging. It also standardizes the 128-bit cryptographic suite and disallows obsolete security protocols. WPA3-Enterprise has optional 192-bit security encryption and a 48-bit IV for heightened protection of sensitive corporate, financial, and governmental data. WPA3-Personal uses CCMP-128 and AES-128.

 

WPA3 addresses WPA2's KRACK vulnerability with a more secure cryptographic handshake, replacing the PSK four-way handshake with Simultaneous Authentication of Equals (SAE), a version of the Internet Engineering Task Force's dragonfly handshake in which either client or AP can initiate contact. Each device then transmits its authentication credentials in a discrete, one-off message, instead of in a give-and-take, multipart conversation. Importantly, SAE also eliminates the reuse of encryption keys, requiring a new code with every interaction. Without open-ended communication between AP and client or encryption key reuse, cybercriminals can't as easily eavesdrop or insert themselves into an exchange.

 

SAE limits users to active, on-site authentication attempts, flagging anyone who has exceeded a certain number of password guesses. This capability should make the typical Wi-Fi network more resistant to offline dictionary attacks. By mandating a new encryption passphrase for each connection, SAE also enables a feature called forward secrecy, which aims to prevent attackers who have cracked a passcode from using it to decrypt data they previously captured and saved.

 

Alongside WPA3, Wi-Fi Alliance also introduced a new protocol called Wi-Fi Easy Connect, which simplifies the onboarding process for IoT devices that don't have visual configuration interfaces via a mechanism such as a QR code scan. Finally, an additional feature called Wi-Fi Enhanced Open makes connecting to public Wi-Fi networks safer by automatically encrypting information between each client and AP using a new unique key.


Thanks for sharing
View more
  • x
  • convention:

Saqibaz
Saqibaz Created Mar 6, 2022 14:35:38 (5) (0)
Thank you for taking the time to review this post.  
Thanks for sharing!
View more
  • x
  • convention:

Saqibaz
Saqibaz Created Mar 6, 2022 14:36:07 (5) (0)
Thank you for taking the time to review this post.  
Good share
View more
  • x
  • convention:

Saqibaz
Saqibaz Created Mar 6, 2022 14:35:48 (5) (0)
Thank you for taking the time to review this post.  
Thanks for sharing!
View more
  • x
  • convention:

Saqibaz
Saqibaz Created Mar 6, 2022 14:35:57 (5) (0)
Thank you for taking the time to review this post.  
Thanks for sharing
View more
  • x
  • convention:

Saqibaz
Saqibaz Created Mar 7, 2022 05:02:21 (5) (0)
Thank you for taking the time to review this post.  
Thanks for sharing.
View more
  • x
  • convention:

Saqibaz
Saqibaz Created Mar 10, 2022 05:03:10 (5) (0)
Thank you for taking the time to review this post.  
Thanks for sharing!
View more
  • x
  • convention:

Saqibaz
Saqibaz Created Mar 10, 2022 05:03:16 (5) (0)
Thank you for taking the time to review this post.  
good
View more
  • x
  • convention:

Saqibaz
Saqibaz Created Mar 18, 2022 12:28:34 (3) (0)
Thank you for taking the time to review this post.  
Awesome
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.