Related Articles

Related Articles

Difference between WEP and WPA
  • Last Updated : 25 Nov, 2020

1. Wired Equivalent Privacy (WEP) :
Wired Equivalent Privacy (WEP) is a security protocol for wireless networks which provides data confidentiality comparable to a traditional wired network. It was introduced in 1999. It provides wireless security through the use of an encryption key. It uses an old encryption method that is Rivest Cipher 4 (RC4). It uses 40 bit key and 24 bit random number.

2. Wi-Fi Protected Access (WPA) :
Wi-Fi Protected Access (WPA) is a security protocol which is used in securing wireless networks and designed to replace the WEP protocol. It was developed by the Wi-Fi Alliance in 2003. It was designed to replace the WEP protocol and it uses Rivest Cipher 4 (RC4) and Temporal Key Integrity Protocol (TKIP) for encryption. WPA key is 256 bit key.



Difference between WEP and WPA :

S.No. WEP WPA
01. WEP stands for Wired Equivalent Privacy. WPA stands for Wi-Fi Protected Access.
02. It is a security protocol for wireless networks which provides data confidentiality comparable to a traditional wired network. It is a security protocol which is used in securing wireless networks and designed to replace the WEP protocol.
03. Wired Equivalent Privacy (WEP) was introduced in 1999 means before WPA. Wi-Fi Protected Access (WPA) was developed by the Wi-Fi Alliance in 2003 means after WEP.
04. It provides wireless security through the use of an encryption key. It provides wireless security through the use of a password.
05. Data Privacy (Encryption) method is Rivest Cipher 4 (RC4). Data Privacy (Encryption) method is Rivest Cipher 4 (RC4) and Temporal Key Integrity Protocol (TKIP).
06. Authentication method in WEP is Open system authentication or shared key authentication. Authentication method in WPA is WPA-PSK and WPA-Enterprise.
07. Data integrity is provided through CRC 32. Data integrity is provided through Message integrity code.
08. It uses 40 bit key and 24 bit random number. WPA key is 256 bit key.
09. Key management is not provided in WEP. Key management is provided through 4 way handshaking mechanism.
10. In WEP no protection against reply attacks. In WPA sequence counter is implemented for reply protection.
11. It is possible to deploy on current hardware infrastructure. It is possible to deploy on both previous and current hardware infrastructure.

Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.

My Personal Notes arrow_drop_up
Recommended Articles
Page :