What is wi fi protected access wpa

What is Wi-Fi protected access (WPA)?

What is WPA

Wireless networks have made the possibility of a smart world true. These networks allow users to connect various devices to networks without the need for long cable lines. Although the wireless network is effective in data transmission, it comes with its own limitations. Wireless networks are prone to security threats if not protected properly. Most broadband users use a router and Wi-Fi connection to connect multiple devices in their homes. These users should also look into the kind of security their wireless network offers. Therefore, a security standard for all these networks is much needed. WPA or Wi-Fi Protected Access does just that. Our today’s article will talk about the WPA security standard, its different versions, and its functionality in detail.

Let’s start with a little bit of background on wireless security and then move on to WPA.

What is WPA? When was it launched for wireless networks?

The IEEE or The Institute of Electrical and Electronics Engineers designed WEP or Wired Equivalent Privacy technology when wireless networks were introduced. The WEP worked as a secured blanket to protect the network and prevent unauthorized activities like eavesdropping, data breach, etc.

However, the WEP encryption technology came with its own weaknesses and was easily cracked by hackers in just 15 minutes. The much-needed WPA was launched in 2003 to replace WEP. In 2004, WEP was officially dropped and WPA took its place to act as a security blanket for all wireless networks.

Now, let’s understand the meaning.

WPA or Wi-Fi Protected Access is a security standard compulsory for all wireless networks. It helps the networks to be safe by using authentication and proper encryption methods. The WPA standard was designed by Wi-Fi Alliance as an interim standard that could be used in backward hardware too without any significant updates. It was followed by more secure standards like WPA 2 and WPA 3.

It uses passwords to ensure authentication for networks. Moreover, it supports authentication and RADIUS (Remote Authentication dial-in) servers. Microsoft’s NPS or Network Policy Server is sometimes configured by enterprises as a RADIUS proxy to manage enterprise-level authentication, authorization, and accounting requests.

Читайте также:  Закачать драйвер вай фай

Now that you have understood what WPA is and how it works, let’s understand what other versions of WPA brought to the wireless security world.

What are WPA2 and WPA3?

There have been three versions of WPA since its launch.

Technology has evolved with every version. We have already discussed the features of WPA 1. The first version of WPA was built on the legacy of WEP. It protects the network and data via encryption. The user has to give authentication for access. Even after this technology is in place, the wireless network with WPA 1 is prone to DoS (Denial of Service) attacks and more.

What is WPA2?

WPA2 is the second version of the WPA security standard. It is better than its predecessor and has fewer vulnerabilities. This particular protocol was launched in 2006 by IEEE. It can be on routers directly to enhance cyber security. WPA2 uses encryption of CCMP and TKIP mechanisms.

  • Personal WPA uses a pre-shared key called WPA2 pre-shared key or WPA-PSK. This key is shared among all users for authentication.
  • Different systems for enterprise-level networks.

WPA2 is better than the first gen in terms of encryption protocols, its take on penetration troubles, and enhanced authentication encryption.

What is WPA3?

The latest launch of 2018, WPA3 is the 3 rd certification standard for network security. It was made mandatory by the Wi-Fi alliance due to its better performance when it comes to safeguarding wireless networks.

WPA3 is better than its predecessors in many ways.

  • Uses 384-bit hashed message for sending keys between devices and routers for authentication
  • Better cryptographic strength
  • Rigorous authentication process and parameters
  • Uses SAE (Simultaneous authentication of equals) for offline attacks
  • Doesn’t use handshake encryption like WPA1 and WPA2 (passwords and normal authentications)
  • Users can’t use the PSK (pre-shared key) to decrypt
  • Every wireless user uses different keys. Therefore, other users can’t decrypt your data.

Summary of WPA in Wi-Fi

Here’s a short summary of the differences between multiple forms of WPA. The below table will help you understand each security certification easily.

Читайте также:  Local area network and wifi
Security Standard One-line meaning Working Cyber attacks Should you use it?
WEP (Wired Equivalent Privacy) The first version of the security standard for wireless networks Uses RC4 (outdated now) stream cipher along with 64- and 128- bit keys. These keys can be easily decrypted. Prone to almost all cyber-attacks due to very weak keys and outdated algorithms. No
WPA A better version of WEP. Compatible with WEP devices Uses RC4 with TKIP but has a longer 256-bit key (harder to decrypt) Easy to eavesdrop on traffic and get credentials, passwords, etc. (data breach) No
WPA2 Upgraded hardware for better encryption Replaced RC4. Uses a combination of TKIP with CCMP and AES algorithms for better security Prone to KRACK or Key Reinstallation attacks and offline dictionary attacks designed to steal data that is being transmitted over wireless networks No
(Yes if WPA3 isn’t available)
WPA3 Answer to KRACK and offline dictionary attacks – new authentication process Replaces handshake authentication with SAE – offers 192-bit encryption (harder to crack) Can get access by using EAP-pwd and is in range of the victim Yes

Click on a star to rate it!

No votes so far! Be the first to rate this post.

Источник

What Is Wi-Fi Protected Access (WPA)?

An MIT graduate who brings years of technical experience to articles on SEO, computers, and wireless networking.

  • The Wireless Connection
  • Routers & Firewalls
  • Network Hubs
  • ISP
  • Broadband
  • Ethernet
  • Installing & Upgrading
  • Wi-Fi & Wireless

Wi-Fi Protected Access is a Wi-Fi security technology developed in response to the weaknesses of Wired Equivalent Privacy standards. It improves upon WEP’s authentication and encryption features. WPA2, in turn, is an upgraded form of WPA; since 2006, every Wi-Fi-certified product must use it.

WPA Features

WPA provides stronger encryption than WEP using either of two standard technologies: Temporal key integrity protocol and advanced encryption standard. WPA also includes built-in authentication support that WEP does not.

WPA-2 vs WPA

Some implementations of WPA allow WEP clients to connect to the network, too, but the security is then reduced to WEP levels for all connected devices.

WPA includes support for remote authentication dial-in user service servers. In this setup, the server accesses device credentials so that users authenticate before they connect to the network. The server also holds extensible authentication protocol messages.

Читайте также:  Соединение локальных сетей wi fi

When a device successfully connects to a WPA network, keys generate using a four-way handshake that takes place with the access point (usually a router) and device.

When TKIP encryption is used, a message integrity code is included to make sure that the data is not spoofed. It replaces WEP’s weaker packet guarantee, which is called cyclic redundancy check.

What Is WPA-PSK?

WPA Pre-Shared Key is a variation of WPA designed for home networks. It’s a simplified but still powerful form of WPA.

Similar to WEP, a static key or passphrase is set, but WPA-PSK uses TKIP. WPA-PSK automatically changes the keys at preset intervals to make it difficult for hackers to find and exploit them.

Working With WPA

You’ll see options for using WPA for connecting to a wireless network and when setting up a network for others to connect to. It was designed to be supported on pre-WPA devices such as those that use WEP, but some work only with WPA after a firmware upgrade. Others are simply incompatible.

WPA pre-shared keys are vulnerable to attack, even though the protocol is more secure than WEP. Your best defense is a passphrase that’s strong enough to circumvent brute-force attacks.

Your wireless network’s name (SSID) and the key is usually printed on the bottom of your router. The network name and key shouldn’t be confused with the username and password, which are needed to access the router settings. If the WPA key has been changed, reset your router to return the key to the default.

The major difference between WPA and WPA2 is that WPA2 offers superior encryption. The latest standard is WPA3, which offers enhanced security for open networks.

On Windows 10, select the Wi-Fi icon in the taskbar, select Properties under the network you’re currently connected to, then look for the Security Type. On a Mac, hold down the Option key and select the Wi-Fi icon in the toolbar to see your network details. On Android, go to your Wi-Fi connections and tap the network to see its details.

Источник

Оцените статью
Adblock
detector