This characteristic, along with several other security flaws and vulnerabilities - including problematic authentication mechanisms - makes WEP a risky choice for wireless security.
The small size of the IV increases the likelihood that users will recycle keys, however, making them easier to crack.
Wep vs wpa pre shared key update#
government lifted certain federal restrictions.Īn administrator must manually enter and update the key, which combines with a 24-bit initialization vector ( IV) in an effort to strengthen encryption. The standard originally specified a 40-bit, pre-shared encryption key a 104-bit key later became available after the U.S. WEP uses the RC4 (Rivest Cipher 4) stream cipher for authentication and encryption. After investigators traced a large-scale cyber attack against T.J.Maxx in 2009 back to vulnerabilities exposed by WEP, the Payment Card Industry Data Security Standard prohibited retailers and other entities that process credit card data from using WEP. From its inception in the late 1990s, however, WEP lacked the strength necessary to accomplish this aim.Ĭybersecurity experts identified several severe flaws in WEP in 2001, eventually leading to industrywide recommendations to phase out the use of WEP in both enterprise and consumer devices. Wi-Fi Alliance developed WEP - the first encryption algorithm for the 802.11 standard - with one main goal: prevent hackers from snooping on wireless data as it was transmitted between clients and APs. Network administrators should replace any wireless AP or router that supports WEP or WPA with a newer device that's compatible with WPA2 or WPA3. In that case, the next best option is WPA2, which is widely deployed in the enterprise space today.Īt this point, no one should use the original wireless security protocol, WEP, or even its immediate successor, WPA, as both are outdated and make wireless networks extremely vulnerable to outside threats. Some wireless APs do not support WPA3, however. As the most up-to-date wireless encryption protocol, WPA3 is the most secure choice. When choosing from among WEP, WPA, WPA2 and WPA3 wireless security protocols, experts agree WPA3 is best for Wi-Fi security. This article also takes a deep dive into the history and technical details of WEP, WPA, WPA2 and WPA3.
Find out below which is best for your wireless security needs.Įnterprises can use this side-by-side comparison of the four security protocols to explore which one they should use in their wireless networks and when. Most wireless access points (APs) come with the ability to enable one of four wireless encryption standards: Wired Equivalent Privacy ( WEP), Wi-Fi Protected Access, WPA2 or WPA3.