Difference between WEP and WPA
1. Wired Equivalent Privacy (WEP) :
Wired Equivalent Privacy (WEP) is a security protocol for wireless networks which provides data confidentiality comparable to a traditional wired network. It was introduced in 1999. It provides wireless security through the use of an encryption key. It uses an old encryption method that is Rivest Cipher 4 (RC4). It uses 40 bit key and 24 bit random number.
2. Wi-Fi Protected Access (WPA) :
Wi-Fi Protected Access (WPA) is a security protocol which is used in securing wireless networks and designed to replace the WEP protocol. It was developed by the Wi-Fi Alliance in 2003. It was designed to replace the WEP protocol and it uses Rivest Cipher 4 (RC4) and Temporal Key Integrity Protocol (TKIP) for encryption. WPA key is 256 bit key.
Difference between WEP and WPA :
S.No. | WEP | WPA |
---|---|---|
01. | WEP stands for Wired Equivalent Privacy. | WPA stands for Wi-Fi Protected Access. |
02. | It is a security protocol for wireless networks which provides data confidentiality comparable to a traditional wired network. | It is a security protocol which is used in securing wireless networks and designed to replace the WEP protocol. |
03. | Wired Equivalent Privacy (WEP) was introduced in 1999 means before WPA. | Wi-Fi Protected Access (WPA) was developed by the Wi-Fi Alliance in 2003 means after WEP. |
04. | It provides wireless security through the use of an encryption key. | It provides wireless security through the use of a password. |
05. | Data Privacy (Encryption) method is Rivest Cipher 4 (RC4). | Data Privacy (Encryption) method is Rivest Cipher 4 (RC4) and Temporal Key Integrity Protocol (TKIP). |
06. | Authentication method in WEP is Open system authentication or shared key authentication. | Authentication method in WPA is WPA-PSK and WPA-Enterprise. |
07. | Data integrity is provided through CRC 32. | Data integrity is provided through Message integrity code. |
08. | It uses 40 bit key and 24 bit random number. | WPA key is 256 bit key. |
09. | Key management is not provided in WEP. | Key management is provided through 4 way handshaking mechanism. |
10. | In WEP no protection against reply attacks. | In WPA sequence counter is implemented for reply protection. |
11. | It is possible to deploy on current hardware infrastructure. | It is possible to deploy on both previous and current hardware infrastructure. |
Contact Us