WPA and WPA2.md
1 ## What are they? 2 3 WPA (Wi-Fi Protected Access) and WPA2 are security protocols designed to protect Wi-Fi networks. They replaced the easily cracked WEP (Wired Equivalent Privacy) standard. 4 5 ## Key Differences 6 7 | Feature | WPA | WPA2 | 8 |---|---|---| 9 | Encryption | TKIP (Temporary Key Integrity Protocol) | AES (Advanced Encryption Standard) | 10 | Security | Less secure, vulnerable to some attacks | More secure, recommended for all networks | 11 | Authentication | Pre-shared key (PSK) or Enterprise | PSK or Enterprise | 12 13 ## How they work 14 15 Both protocols use a four-way handshake process for key exchange and authentication: 16 17 **1. Connection Request:** A device sends a connection request to the router. 18 19 **2. Router Response:** The router responds with its network information. 20 21 **3. Key Generation & Exchange:** 22 * **PSK (Personal):** Both the device and router use the pre-shared password (your Wi-Fi password) and other information to generate a unique encryption key. This key is exchanged during the handshake. 23 * **Enterprise:** The device and an authentication server (e.g., RADIUS server) use more secure methods like digital certificates to authenticate and generate the encryption key. 24 25 **4. Connection Establishment:** Once the key is successfully exchanged and validated, the secure connection is established. 26 27 [Video explaining this process](https://youtu.be/-Q_WXeEf8Fw?si=ARof_o_bW9Sw_cNL&t=326) 28 29 ## Encryption 30 31 * **WPA (TKIP):** Uses a weaker encryption method vulnerable to some attacks. 32 * **WPA2 (AES):** Uses the robust Advanced Encryption Standard, providing significantly stronger protection. 33 34 ## Which one to use 35 36 **Always use WPA2 if available.** WPA is outdated and has known vulnerabilities. Most modern devices and routers support WPA2. 37 38 **Note:** WPA3 is the latest standard, offering even stronger security than WPA2. Consider upgrading to WPA3-compatible devices and routers for optimal protection. 39