{"id":1173,"date":"2025-04-05T10:36:38","date_gmt":"2025-04-05T10:36:38","guid":{"rendered":"https:\/\/learnlearn.uk\/ibcs\/?page_id=1173"},"modified":"2025-04-05T10:40:21","modified_gmt":"2025-04-05T10:40:21","slug":"wireless-network-encryption","status":"publish","type":"page","link":"https:\/\/learnlearn.uk\/ibcs\/wireless-network-encryption\/","title":{"rendered":"Wireless Network Encryption"},"content":{"rendered":"<div class=\"responsive-tabs\">\n<h2 class=\"tabtitle\">WEP<\/h2>\n<div class=\"tabcontent\">\n\n<h3>WEP (Wired Equivalent Privacy)<\/h3>\n<p>WEP was one of the first encryption standards for wireless networks, introduced in the late 1990s as part of the original IEEE 802.11 standard. Its goal was to provide confidentiality on wireless networks comparable to that of wired networks.<\/p>\n<p>WEP uses the RC4 encryption algorithm and a static key, typically 64 or 128 bits in length. However, due to several cryptographic flaws\u2014particularly in the key scheduling algorithm\u2014WEP is vulnerable to several forms of attack, including packet sniffing and replay attacks.<\/p>\n<p><strong>Key Characteristics:<\/strong><br \/>\n&#8211; Based on RC4 stream cipher.<br \/>\n&#8211; Uses a static encryption key (manually configured).<br \/>\n&#8211; Easy to implement but extremely insecure by today\u2019s standards.<br \/>\n&#8211; Can be cracked within minutes using readily available tools.<\/p>\n<p><strong>Status:<\/strong><br \/>\nWEP has been deprecated by the Wi-Fi Alliance and should not be used under any circumstances.<\/p>\n\n<\/div><h2 class=\"tabtitle\">WPA<\/h2>\n<div class=\"tabcontent\">\n\n<h3>WPA (Wi-Fi Protected Access)<\/h3>\n<p>WPA was introduced in 2003 as a temporary solution to address WEP&#8217;s shortcomings while the IEEE worked on a long-term standard (WPA2). WPA still used the RC4 algorithm but introduced TKIP (Temporal Key Integrity Protocol) to dynamically change encryption keys during sessions, making it more secure than WEP.<\/p>\n<p>While WPA improved security, it was still vulnerable to certain attacks, especially if a weak passphrase was used.<\/p>\n<p><strong>Key Features:<\/strong><br \/>\n&#8211; Uses TKIP for dynamic key management.<br \/>\n&#8211; Still based on RC4, but with enhancements.<br \/>\n&#8211; Includes Message Integrity Check (MIC) to prevent packet tampering.<br \/>\n&#8211; Backward-compatible with WEP hardware (with firmware updates).<\/p>\n<p><strong>Vulnerabilities:<\/strong><br \/>\n&#8211; Susceptible to dictionary attacks.<br \/>\n&#8211; TKIP is now considered insecure for high-security environments.<\/p>\n<p><strong>Status:<\/strong><br \/>\nStill supported on many devices but has largely been phased out in favor of WPA2 and WPA3.<\/p>\n\n<\/div><h2 class=\"tabtitle\">WPA2<\/h2>\n<div class=\"tabcontent\">\n\n<h3>WPA2 (Wi-Fi Protected Access 2)<\/h3>\n<p>WPA2, introduced in 2004, became the mandatory standard for Wi-Fi certification in 2006. It replaced TKIP with CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) and adopted AES (Advanced Encryption Standard) for much stronger security.<\/p>\n<p>WPA2 is available in two main modes:<br \/>\n&#8211; <strong>WPA2-Personal (PSK):<\/strong> Uses a pre-shared key, suitable for home use.<br \/>\n&#8211; <strong>WPA2-Enterprise:<\/strong> Uses a RADIUS server and 802.1X authentication, ideal for businesses and institutions.<\/p>\n<p><strong>Key Features:<\/strong><br \/>\n&#8211; AES-based encryption (more secure than RC4).<br \/>\n&#8211; Support for fast roaming (802.11r).<br \/>\n&#8211; Optional support for Protected Management Frames (PMF).<\/p>\n<p><strong>Vulnerabilities:<\/strong><br \/>\n&#8211; Susceptible to brute-force attacks if weak passwords are used.<br \/>\n&#8211; Vulnerable to KRACK (Key Reinstallation Attacks) if devices are unpatched.<\/p>\n<p><strong>Status:<\/strong><br \/>\nStill widely used and supported, though WPA3 is beginning to replace it in modern devices.<\/p>\n\n<\/div><h2 class=\"tabtitle\">WPA3<\/h2>\n<div class=\"tabcontent\">\n\n<h3>WPA3 (Wi-Fi Protected Access 3)<\/h3>\n<p>WPA3 was introduced in 2018 to enhance the security of wireless networks in both personal and enterprise environments. It addresses many of WPA2\u2019s shortcomings and includes several new features aimed at improving authentication and data protection.<\/p>\n<p><strong>Key Innovations:<\/strong><br \/>\n&#8211; <strong>SAE (Simultaneous Authentication of Equals):<\/strong> Replaces PSK, offering better resistance to offline dictionary attacks.<br \/>\n&#8211; <strong>Forward Secrecy:<\/strong> Prevents attackers from decrypting old data even if a key is compromised later.<br \/>\n&#8211; <strong>Enhanced Open:<\/strong> Encrypts data even in open networks (e.g., public Wi-Fi) using Opportunistic Wireless Encryption (OWE).<br \/>\n&#8211; <strong>192-bit Security Suite:<\/strong> For WPA3-Enterprise, meeting high-security government and enterprise standards.<\/p>\n<p><strong>Advantages Over WPA2:<\/strong><br \/>\n&#8211; More secure key exchange process.<br \/>\n&#8211; Protection even on open, password-less networks.<br \/>\n&#8211; Mandatory PMF support for preventing deauthentication attacks.<\/p>\n<p><strong>Limitations:<\/strong><br \/>\n&#8211; Limited device support (mostly newer hardware).<br \/>\n&#8211; Compatibility issues with legacy devices in mixed environments.<\/p>\n<p><strong>Status:<\/strong><br \/>\nThe most secure Wi-Fi standard available and recommended for all new devices and networks. Adoption is growing steadily as more routers and devices support it.<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>WEP (Wired Equivalent Privacy) WEP was one of the first encryption standards for wireless networks, introduced in the late 1990s as part of the original IEEE 802.11 standard. Its goal was to provide confidentiality on wireless networks comparable to that of wired networks. WEP uses the RC4 encryption algorithm and a static key, typically 64&hellip;&nbsp;<a href=\"https:\/\/learnlearn.uk\/ibcs\/wireless-network-encryption\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Wireless Network Encryption<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Wireless Network Encryption - IB Computer Science<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/ibcs\/wireless-network-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wireless Network Encryption - IB Computer Science\" \/>\n<meta property=\"og:description\" content=\"WEP (Wired Equivalent Privacy) WEP was one of the first encryption standards for wireless networks, introduced in the late 1990s as part of the original IEEE 802.11 standard. Its goal was to provide confidentiality on wireless networks comparable to that of wired networks. WEP uses the RC4 encryption algorithm and a static key, typically 64&hellip;&nbsp;Read More &raquo;Wireless Network Encryption\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/ibcs\/wireless-network-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"IB Computer Science\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-05T10:40:21+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/wireless-network-encryption\/\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/wireless-network-encryption\/\",\"name\":\"Wireless Network Encryption - IB Computer Science\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#website\"},\"datePublished\":\"2025-04-05T10:36:38+00:00\",\"dateModified\":\"2025-04-05T10:40:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/wireless-network-encryption\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/ibcs\/wireless-network-encryption\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/wireless-network-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"IB Computer Science\",\"item\":\"https:\/\/learnlearn.uk\/ibcs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wireless Network Encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#website\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/\",\"name\":\"IB Computer Science\",\"description\":\"- learnlearn..uk\",\"publisher\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/ibcs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#organization\",\"name\":\"IB Computer Science\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png\",\"contentUrl\":\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png\",\"width\":300,\"height\":41,\"caption\":\"IB Computer Science\"},\"image\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wireless Network Encryption - IB Computer Science","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/ibcs\/wireless-network-encryption\/","og_locale":"en_GB","og_type":"article","og_title":"Wireless Network Encryption - IB Computer Science","og_description":"WEP (Wired Equivalent Privacy) WEP was one of the first encryption standards for wireless networks, introduced in the late 1990s as part of the original IEEE 802.11 standard. Its goal was to provide confidentiality on wireless networks comparable to that of wired networks. WEP uses the RC4 encryption algorithm and a static key, typically 64&hellip;&nbsp;Read More &raquo;Wireless Network Encryption","og_url":"https:\/\/learnlearn.uk\/ibcs\/wireless-network-encryption\/","og_site_name":"IB Computer Science","article_modified_time":"2025-04-05T10:40:21+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/ibcs\/wireless-network-encryption\/","url":"https:\/\/learnlearn.uk\/ibcs\/wireless-network-encryption\/","name":"Wireless Network Encryption - IB Computer Science","isPartOf":{"@id":"https:\/\/learnlearn.uk\/ibcs\/#website"},"datePublished":"2025-04-05T10:36:38+00:00","dateModified":"2025-04-05T10:40:21+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/ibcs\/wireless-network-encryption\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/ibcs\/wireless-network-encryption\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/ibcs\/wireless-network-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"IB Computer Science","item":"https:\/\/learnlearn.uk\/ibcs\/"},{"@type":"ListItem","position":2,"name":"Wireless Network Encryption"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/ibcs\/#website","url":"https:\/\/learnlearn.uk\/ibcs\/","name":"IB Computer Science","description":"- learnlearn..uk","publisher":{"@id":"https:\/\/learnlearn.uk\/ibcs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/ibcs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/learnlearn.uk\/ibcs\/#organization","name":"IB Computer Science","url":"https:\/\/learnlearn.uk\/ibcs\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/","url":"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png","contentUrl":"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png","width":300,"height":41,"caption":"IB Computer Science"},"image":{"@id":"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/"}}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"learnlearnadmin","author_link":"https:\/\/learnlearn.uk\/ibcs\/author\/learnlearnadmin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"WEP (Wired Equivalent Privacy) WEP was one of the first encryption standards for wireless networks, introduced in the late 1990s as part of the original IEEE 802.11 standard. Its goal was to provide confidentiality on wireless networks comparable to that of wired networks. WEP uses the RC4 encryption algorithm and a static key, typically 64&hellip;&nbsp;Read&hellip;","_links":{"self":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages\/1173"}],"collection":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/comments?post=1173"}],"version-history":[{"count":5,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages\/1173\/revisions"}],"predecessor-version":[{"id":1178,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages\/1173\/revisions\/1178"}],"wp:attachment":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/media?parent=1173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}