SlideShare a Scribd company logo
1 of 14
WEP -WAP - WAP2
WEP
• WEP (Wired Equivalent Privacy) is the oldest and most common Wi-Fi security
protocol. It was the privacy component established in the IEEE 802.11, a set of
technical standards that aimed to provide a wireless local area network (WLAN)
with a comparable level of security to a wired local area network (LAN).
• The Wi-Fi Alliance ratified WEP as a security standard in 1999. Once touted to
offer the same security benefits as a wired connection, WEP has been plagued
over the years by many security flaws. And as computing power has increased,
these vulnerabilities have worsened. Despite efforts to improve WEP, it’s still
vulnerable to security breaches. The Wi-Fi Alliance officially retired WEP in 2004.
WEP
• Pros:
• Better than no security protocol — though not by much
• Cons:
• Riddled with security vulnerabilities
• Only 64-bit and 128-bit keys for encryption
• Fixed-key encryption
• Hard to configure
WPA
• ADV
• Addresses security vulnerabilities of the original wireless security standard, WEP
• TKIP encryption method is better than the fixed-key encryption used by WEP
• 256-bit key for encryption
• Cons:
• When rolled out onto WEP devices, TKIP can be exploited
• Similar security vulnerabilities to WEP
WAP 2
• WPA2 (Wi-Fi Protected Access 2) is the second generation of the Wi-Fi Protected
Access wireless security protocol. Like its predecessor, WPA2 was designed to secure
and protect Wi-Fi networks. WPA2 ensures that data sent or received over your
wireless network is encrypted, and only people with your network password have
access to it.
• A benefit of the WPA2 system was that it introduced the Advanced Encryption System
(AES) to replace the more vulnerable TKIP system used in the original WPA protocol.
Used by the US government to protect classified data, AES provides strong
encryption.
• Unfortunately, like it’s predecessor, WPA2-enabled access points (usually routers) are
vulnerable to attacks through WEP. To eliminate this attack vector, disable WEP and, if
possible, make sure your router’s firmware doesn’t rely on WEP.
WAP 2
• Pros:
• Addresses many security flaws of its predecessors
• Uses the strongest encryption method: AES
• Required by the Wi-Fi Alliance for use on all Wi-Fi certified products
• 256-bit key for encryption
• Cons:
• Still contains some security vulnerabiliLITES
WAP 3
• WPA3 (Wi-Fi Protected Access 3) is the newest wireless security protocol designed
to encrypt data using a frequent and automatic encryption type called Perfect
Forward Secrecy. It’s more secure than its predecessor, WPA2, but it hasn’t been
widely adopted yet. Not all hardware supports WPA3 automatically, and using this
protocol often requires costly upgr
KEY DIFFERNCE
• WEP protocol was released in 1999.
• WPA also called WiFi Protected Access was released in 2003
• WPA2 standard was ratified by IEEE in 2004
• WPA3 was released in 2018
SUPPORTED AUTHENTICATION
• WEP supports two authentication methods, Open System authentication
and Shared Key authentication.
• WPA uses pre-shared key and 802.1x authentication, which are more secure than
64-bit and 128-bit keys used by WEP.
• WPA2 is currently the most secure standard utilizing AES and a pre-shared key for
authentication.
• WPA3 uses Simultaneous Authentication of Equals (SAE) to provide stronger
defenses against password guessing.
SUPPORTED ENCRYPTION
• WEP encrypts traffic using RC4 stream cypher.
• WPA uses RC4 but adds longer 256-bit keys to encrypt data.
• WPA2 replaces RC4 and TKIP with CCMP and AES algorithm for stronger
encryption.
• WPA3 uses Advanced Encryption Standard mechanism for encryption.
KEY MANAGEMENT
• WEP has not got any features.
• WPA uses four way handshake mechanism.
• WPA2 also uses four way handshake mechanism.
• WPA3 uses Simultaneous Auhtentication of Equals handshake mechanism.
SUPPORTED CIPHER TYPE
• WEP and WPA uses stream cipher while WPA2 and WPA3 uses block cipher type.
Session Key Size
• WEP uses a shared secret key, which is 40 bits in length.
• WPA and WPA2 uses 128 bit session key.
• WPA3 uses 128 bit for personal use and 192 bit for enterprise use.
• Thank you for reading WEP vs WPA vs WPA2 vs WPA3 – WiFi Security Protocols
COMPARATIVE 2
COMPARATIVE 2

More Related Content

Similar to WEP .WAP WAP2.pptx

Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are youMarcus Dempsey
 
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi APEmbedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi APAhmed El-Arabawy
 
Wireless security837
Wireless security837Wireless security837
Wireless security837mark scott
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2Tushar Anand
 
Security standard
Security standardSecurity standard
Security standardlyndyv
 
Talk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bSylvain Martinez
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedIRJET Journal
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?Tom Isaacson
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting Shah Sheikh
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan finalPREMKUMAR
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected accessLopamudra Das
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-accessbhanu4ugood1
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
802 11 3
802 11 3802 11 3
802 11 3rphelps
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Mohammad Fareed
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...cmstiernberg
 

Similar to WEP .WAP WAP2.pptx (20)

Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi APEmbedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
 
Security standard
Security standardSecurity standard
Security standard
 
Talk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2b
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
 
WEP
WEPWEP
WEP
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
802 11 3
802 11 3802 11 3
802 11 3
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
 
WPA-3: SEA and Dragonfly
WPA-3: SEA and DragonflyWPA-3: SEA and Dragonfly
WPA-3: SEA and Dragonfly
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 

Recently uploaded

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

WEP .WAP WAP2.pptx

  • 1. WEP -WAP - WAP2
  • 2. WEP • WEP (Wired Equivalent Privacy) is the oldest and most common Wi-Fi security protocol. It was the privacy component established in the IEEE 802.11, a set of technical standards that aimed to provide a wireless local area network (WLAN) with a comparable level of security to a wired local area network (LAN). • The Wi-Fi Alliance ratified WEP as a security standard in 1999. Once touted to offer the same security benefits as a wired connection, WEP has been plagued over the years by many security flaws. And as computing power has increased, these vulnerabilities have worsened. Despite efforts to improve WEP, it’s still vulnerable to security breaches. The Wi-Fi Alliance officially retired WEP in 2004.
  • 3. WEP • Pros: • Better than no security protocol — though not by much • Cons: • Riddled with security vulnerabilities • Only 64-bit and 128-bit keys for encryption • Fixed-key encryption • Hard to configure
  • 4. WPA • ADV • Addresses security vulnerabilities of the original wireless security standard, WEP • TKIP encryption method is better than the fixed-key encryption used by WEP • 256-bit key for encryption • Cons: • When rolled out onto WEP devices, TKIP can be exploited • Similar security vulnerabilities to WEP
  • 5. WAP 2 • WPA2 (Wi-Fi Protected Access 2) is the second generation of the Wi-Fi Protected Access wireless security protocol. Like its predecessor, WPA2 was designed to secure and protect Wi-Fi networks. WPA2 ensures that data sent or received over your wireless network is encrypted, and only people with your network password have access to it. • A benefit of the WPA2 system was that it introduced the Advanced Encryption System (AES) to replace the more vulnerable TKIP system used in the original WPA protocol. Used by the US government to protect classified data, AES provides strong encryption. • Unfortunately, like it’s predecessor, WPA2-enabled access points (usually routers) are vulnerable to attacks through WEP. To eliminate this attack vector, disable WEP and, if possible, make sure your router’s firmware doesn’t rely on WEP.
  • 6. WAP 2 • Pros: • Addresses many security flaws of its predecessors • Uses the strongest encryption method: AES • Required by the Wi-Fi Alliance for use on all Wi-Fi certified products • 256-bit key for encryption • Cons: • Still contains some security vulnerabiliLITES
  • 7. WAP 3 • WPA3 (Wi-Fi Protected Access 3) is the newest wireless security protocol designed to encrypt data using a frequent and automatic encryption type called Perfect Forward Secrecy. It’s more secure than its predecessor, WPA2, but it hasn’t been widely adopted yet. Not all hardware supports WPA3 automatically, and using this protocol often requires costly upgr
  • 8. KEY DIFFERNCE • WEP protocol was released in 1999. • WPA also called WiFi Protected Access was released in 2003 • WPA2 standard was ratified by IEEE in 2004 • WPA3 was released in 2018
  • 9. SUPPORTED AUTHENTICATION • WEP supports two authentication methods, Open System authentication and Shared Key authentication. • WPA uses pre-shared key and 802.1x authentication, which are more secure than 64-bit and 128-bit keys used by WEP. • WPA2 is currently the most secure standard utilizing AES and a pre-shared key for authentication. • WPA3 uses Simultaneous Authentication of Equals (SAE) to provide stronger defenses against password guessing.
  • 10. SUPPORTED ENCRYPTION • WEP encrypts traffic using RC4 stream cypher. • WPA uses RC4 but adds longer 256-bit keys to encrypt data. • WPA2 replaces RC4 and TKIP with CCMP and AES algorithm for stronger encryption. • WPA3 uses Advanced Encryption Standard mechanism for encryption.
  • 11. KEY MANAGEMENT • WEP has not got any features. • WPA uses four way handshake mechanism. • WPA2 also uses four way handshake mechanism. • WPA3 uses Simultaneous Auhtentication of Equals handshake mechanism.
  • 12. SUPPORTED CIPHER TYPE • WEP and WPA uses stream cipher while WPA2 and WPA3 uses block cipher type. Session Key Size • WEP uses a shared secret key, which is 40 bits in length. • WPA and WPA2 uses 128 bit session key. • WPA3 uses 128 bit for personal use and 192 bit for enterprise use. • Thank you for reading WEP vs WPA vs WPA2 vs WPA3 – WiFi Security Protocols