Difference between WEP and WPA
Last Updated :
25 Nov, 2020
1. Wired Equivalent Privacy (WEP) :
Wired Equivalent Privacy (WEP) is a security protocol for wireless networks which provides data confidentiality comparable to a traditional wired network. It was introduced in 1999. It provides wireless security through the use of an encryption key. It uses an old encryption method that is Rivest Cipher 4 (RC4). It uses 40 bit key and 24 bit random number.
2. Wi-Fi Protected Access (WPA) :
Wi-Fi Protected Access (WPA) is a security protocol which is used in securing wireless networks and designed to replace the WEP protocol. It was developed by the Wi-Fi Alliance in 2003. It was designed to replace the WEP protocol and it uses Rivest Cipher 4 (RC4) and Temporal Key Integrity Protocol (TKIP) for encryption. WPA key is 256 bit key.
Difference between WEP and WPA :
S.No. |
WEP |
WPA |
01. |
WEP stands for Wired Equivalent Privacy. |
WPA stands for Wi-Fi Protected Access. |
02. |
It is a security protocol for wireless networks which provides data confidentiality comparable to a traditional wired network. |
It is a security protocol which is used in securing wireless networks and designed to replace the WEP protocol. |
03. |
Wired Equivalent Privacy (WEP) was introduced in 1999 means before WPA. |
Wi-Fi Protected Access (WPA) was developed by the Wi-Fi Alliance in 2003 means after WEP. |
04. |
It provides wireless security through the use of an encryption key. |
It provides wireless security through the use of a password. |
05. |
Data Privacy (Encryption) method is Rivest Cipher 4 (RC4). |
Data Privacy (Encryption) method is Rivest Cipher 4 (RC4) and Temporal Key Integrity Protocol (TKIP). |
06. |
Authentication method in WEP is Open system authentication or shared key authentication. |
Authentication method in WPA is WPA-PSK and WPA-Enterprise. |
07. |
Data integrity is provided through CRC 32. |
Data integrity is provided through Message integrity code. |
08. |
It uses 40 bit key and 24 bit random number. |
WPA key is 256 bit key. |
09. |
Key management is not provided in WEP. |
Key management is provided through 4 way handshaking mechanism. |
10. |
In WEP no protection against reply attacks. |
In WPA sequence counter is implemented for reply protection. |
11. |
It is possible to deploy on current hardware infrastructure. |
It is possible to deploy on both previous and current hardware infrastructure. |
Share your thoughts in the comments
Please Login to comment...